diff --git a/azure-keyvault-core/pom.xml b/azure-keyvault-core/pom.xml index 01cf213..649015a 100644 --- a/azure-keyvault-core/pom.xml +++ b/azure-keyvault-core/pom.xml @@ -8,7 +8,7 @@ com.microsoft.azure azure-keyvault-parent - 1.1-alpha-1 + 1.1-alpha-2 ../pom.xml diff --git a/azure-keyvault-cryptography/pom.xml b/azure-keyvault-cryptography/pom.xml index 75ff620..4cbe47c 100644 --- a/azure-keyvault-cryptography/pom.xml +++ b/azure-keyvault-cryptography/pom.xml @@ -9,7 +9,7 @@ com.microsoft.azure azure-keyvault-parent - 1.1-alpha-1 + 1.1-alpha-2 ../pom.xml @@ -57,12 +57,12 @@ com.microsoft.azure azure-keyvault-core - 1.1-alpha-1 + 1.1-alpha-2 com.microsoft.azure azure-keyvault-webkey - 1.1-alpha-1 + 1.1-alpha-2 diff --git a/azure-keyvault-extensions/pom.xml b/azure-keyvault-extensions/pom.xml index a07fc7f..78269a6 100644 --- a/azure-keyvault-extensions/pom.xml +++ b/azure-keyvault-extensions/pom.xml @@ -8,7 +8,7 @@ com.microsoft.azure azure-keyvault-parent - 1.1-alpha-1 + 1.1-alpha-2 ../pom.xml @@ -68,22 +68,22 @@ com.microsoft.azure azure-keyvault-core - 1.1-alpha-1 + 1.1-alpha-2 com.microsoft.azure azure-keyvault-cryptography - 1.1-alpha-1 + 1.1-alpha-2 com.microsoft.azure azure-keyvault - 1.1-alpha-1 + 1.1-alpha-2 com.microsoft.azure azure-keyvault-webkey - 1.1-alpha-1 + 1.1-alpha-2 com.microsoft.azure diff --git a/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultClientIntegrationTestBase.java b/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultClientIntegrationTestBase.java index 6618177..344299f 100644 --- a/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultClientIntegrationTestBase.java +++ b/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultClientIntegrationTestBase.java @@ -8,6 +8,9 @@ import com.microsoft.azure.keyvault.KeyVaultClient; import com.microsoft.azure.keyvault.authentication.KeyVaultCredentials; import com.microsoft.azure.keyvault.models.Attributes; +import com.microsoft.azure.keyvault.models.DeletedCertificateBundle; +import com.microsoft.azure.keyvault.models.DeletedKeyBundle; +import com.microsoft.azure.keyvault.models.DeletedSecretBundle; import com.microsoft.azure.management.resources.core.AzureTestCredentials; import com.microsoft.azure.management.resources.core.InterceptorManager; import com.microsoft.azure.management.resources.core.TestBase; @@ -309,6 +312,60 @@ public void write(int b) { } } + + protected static DeletedCertificateBundle pollOnCertificateDeletion(String vaultBaseUrl, String certificateName) + throws Exception { + int pendingPollCount = 0; + while (pendingPollCount < 21) { + DeletedCertificateBundle certificateBundle = keyVaultClient.getDeletedCertificate(vaultBaseUrl, + certificateName); + if (certificateBundle == null) { + if (isRecordMode()) { + Thread.sleep(10000); + } + pendingPollCount += 1; + continue; + } else { + return certificateBundle; + } + } + throw new Exception("Deleting certificate delayed"); + } + + protected static DeletedKeyBundle pollOnKeyDeletion(String vaultBaseUrl, String certificateName) throws Exception { + int pendingPollCount = 0; + while (pendingPollCount < 21) { + DeletedKeyBundle deletedKeyBundle = keyVaultClient.getDeletedKey(vaultBaseUrl, certificateName); + if (deletedKeyBundle == null) { + if (isRecordMode()) { + Thread.sleep(10000); + } + pendingPollCount += 1; + continue; + } else { + return deletedKeyBundle; + } + } + throw new Exception("Deleting key delayed"); + } + + protected static DeletedSecretBundle pollOnSecretDeletion(String vaultBaseUrl, String secretName) throws Exception { + int pendingPollCount = 0; + while (pendingPollCount < 50) { + DeletedSecretBundle deletedSecretBundle = keyVaultClient.getDeletedSecret(vaultBaseUrl, secretName); + if (deletedSecretBundle == null) { + if (isRecordMode()) { + Thread.sleep(10000); + } + pendingPollCount += 1; + continue; + } else { + return deletedSecretBundle; + } + } + throw new Exception("Deleting secret delayed"); + } + @After public void afterTest() throws IOException { diff --git a/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultKeyResolverBCProviderTest.java b/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultKeyResolverBCProviderTest.java index c4612b7..767ba16 100644 --- a/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultKeyResolverBCProviderTest.java +++ b/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultKeyResolverBCProviderTest.java @@ -77,9 +77,10 @@ public void tearDown() throws Exception { @Test public void KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverBCProviderTest() throws InterruptedException, ExecutionException { + String TEST_KEY_NAME = KEY_NAME + "1"; try { // Create a key on a vault. - CreateKeyRequest request = new CreateKeyRequest.Builder(getVaultUri(), KEY_NAME, JsonWebKeyType.RSA).build(); + CreateKeyRequest request = new CreateKeyRequest.Builder(getVaultUri(), TEST_KEY_NAME, JsonWebKeyType.RSA).build(); KeyBundle bundle = keyVaultClient.createKey(request); if ( bundle != null ) @@ -100,7 +101,10 @@ public void KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverBCProviderTest() finally { // Delete the key - keyVaultClient.deleteKey( getVaultUri(), KEY_NAME ); + keyVaultClient.deleteKey( getVaultUri(), TEST_KEY_NAME ); + pollOnKeyDeletion( getVaultUri(), TEST_KEY_NAME ); + keyVaultClient.purgeDeletedKey( getVaultUri(), TEST_KEY_NAME); + } } } @@ -121,9 +125,10 @@ public void KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverBCPr byte[] CEK = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, (byte) 0x88, (byte) 0x99, (byte) 0xAA, (byte) 0xBB, (byte) 0xCC, (byte) 0xDD, (byte) 0xEE, (byte) 0xFF }; byte[] EK = { 0x1F, (byte) 0xA6, (byte) 0x8B, 0x0A, (byte) 0x81, 0x12, (byte) 0xB4, 0x47, (byte) 0xAE, (byte) 0xF3, 0x4B, (byte) 0xD8, (byte) 0xFB, 0x5A, 0x7B, (byte) 0x82, (byte) 0x9D, 0x3E, (byte) 0x86, 0x23, 0x71, (byte) 0xD2, (byte) 0xCF, (byte) 0xE5 }; + String TEST_SECRET_NAME = SECRET_NAME + "1"; try { - SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); + SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), TEST_SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); SecretBundle secretBundle = keyVaultClient.setSecret( request ); if ( secretBundle != null ) @@ -162,7 +167,10 @@ public void KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverBCPr finally { // Delete the secret - keyVaultClient.deleteSecret( getVaultUri(), SECRET_NAME ); + keyVaultClient.deleteSecret( getVaultUri(), TEST_SECRET_NAME ); + pollOnSecretDeletion( getVaultUri(), TEST_SECRET_NAME ); + keyVaultClient.purgeDeletedSecret( getVaultUri(), TEST_SECRET_NAME ); + } } } @@ -182,8 +190,9 @@ public void KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverBCPr byte[] CEK = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, (byte) 0x88, (byte) 0x99, (byte) 0xAA, (byte) 0xBB, (byte) 0xCC, (byte) 0xDD, (byte) 0xEE, (byte) 0xFF }; byte[] EK = { (byte) 0x96, 0x77, (byte) 0x8B, 0x25, (byte) 0xAE, 0x6C, (byte) 0xA4, 0x35, (byte) 0xF9, 0x2B, 0x5B, (byte) 0x97, (byte) 0xC0, 0x50, (byte) 0xAE, (byte) 0xD2, 0x46, (byte) 0x8A, (byte) 0xB8, (byte) 0xA1, 0x7A, (byte) 0xD8, 0x4E, 0x5D }; + String TEST_SECRET_NAME = SECRET_NAME + "2"; try { - SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); + SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), TEST_SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); SecretBundle secretBundle = keyVaultClient.setSecret( request ); if ( secretBundle != null ) @@ -223,7 +232,9 @@ public void KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverBCPr finally { // Delete the key - keyVaultClient.deleteSecret( getVaultUri(), SECRET_NAME ); + keyVaultClient.deleteSecret( getVaultUri(), TEST_SECRET_NAME ); + pollOnSecretDeletion( getVaultUri(), TEST_SECRET_NAME ); + keyVaultClient.purgeDeletedSecret( getVaultUri(), TEST_SECRET_NAME); } } } catch (Exception ex) { @@ -242,8 +253,10 @@ public void KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverBCPr byte[] CEK = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, (byte) 0x88, (byte) 0x99, (byte) 0xAA, (byte) 0xBB, (byte) 0xCC, (byte) 0xDD, (byte) 0xEE, (byte) 0xFF }; byte[] EK = { 0x64, (byte) 0xE8, (byte) 0xC3, (byte) 0xF9, (byte) 0xCE, 0x0F, 0x5B, (byte) 0xA2, 0x63, (byte) 0xE9, 0x77, 0x79, 0x05, (byte) 0x81, (byte) 0x8A, 0x2A, (byte) 0x93, (byte) 0xC8, 0x19, 0x1E, 0x7D, 0x6E, (byte) 0x8A, (byte) 0xE7 }; + String TEST_SECRET_NAME = SECRET_NAME + "3"; + try { - SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); + SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), TEST_SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); SecretBundle secretBundle = keyVaultClient.setSecret( request ); if ( secretBundle != null ) @@ -283,7 +296,9 @@ public void KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverBCPr finally { // Delete the key - keyVaultClient.deleteSecret( getVaultUri(), SECRET_NAME ); + keyVaultClient.deleteSecret( getVaultUri(), TEST_SECRET_NAME ); + pollOnSecretDeletion( getVaultUri(), TEST_SECRET_NAME ); + keyVaultClient.purgeDeletedSecret( getVaultUri(), TEST_SECRET_NAME ); } } } catch ( Exception ex ) { diff --git a/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultKeyResolverDefaultProviderTest.java b/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultKeyResolverDefaultProviderTest.java index 4e3190d..2df4c05 100644 --- a/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultKeyResolverDefaultProviderTest.java +++ b/azure-keyvault-extensions/src/test/java/com/microsoft/azure/keyvault/extensions/test/KeyVaultKeyResolverDefaultProviderTest.java @@ -78,9 +78,10 @@ public void tearDown() throws Exception { @Test public void KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverDefaultProviderTest() throws InterruptedException, ExecutionException { + String TEST_KEY_NAME = KEY_NAME + "1"; try { // Create a key on a vault. - CreateKeyRequest request = new CreateKeyRequest.Builder(getVaultUri(), KEY_NAME, JsonWebKeyType.RSA).build(); + CreateKeyRequest request = new CreateKeyRequest.Builder(getVaultUri(), TEST_KEY_NAME, JsonWebKeyType.RSA).build(); KeyBundle keyBundle = keyVaultClient.createKey(request); try @@ -96,7 +97,9 @@ public void KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverDefaultProviderT finally { // Delete the key - keyVaultClient.deleteKey( getVaultUri(), KEY_NAME ); + keyVaultClient.deleteKey( getVaultUri(), TEST_KEY_NAME ); + pollOnKeyDeletion( getVaultUri(), TEST_KEY_NAME ); + keyVaultClient.purgeDeletedKey( getVaultUri(), TEST_KEY_NAME ); } } catch(Exception ex) { fail(ex.getMessage()); @@ -114,8 +117,10 @@ public void KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverDefa byte[] CEK = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, (byte) 0x88, (byte) 0x99, (byte) 0xAA, (byte) 0xBB, (byte) 0xCC, (byte) 0xDD, (byte) 0xEE, (byte) 0xFF }; byte[] EK = { 0x1F, (byte) 0xA6, (byte) 0x8B, 0x0A, (byte) 0x81, 0x12, (byte) 0xB4, 0x47, (byte) 0xAE, (byte) 0xF3, 0x4B, (byte) 0xD8, (byte) 0xFB, 0x5A, 0x7B, (byte) 0x82, (byte) 0x9D, 0x3E, (byte) 0x86, 0x23, 0x71, (byte) 0xD2, (byte) 0xCF, (byte) 0xE5 }; + String TEST_SECRET_NAME = SECRET_NAME + "1"; + try { - SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); + SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), TEST_SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); SecretBundle secretBundle = keyVaultClient.setSecret(request); if ( secretBundle != null ) @@ -155,7 +160,9 @@ public void KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverDefa finally { // Delete the key - keyVaultClient.deleteSecret( getVaultUri(), SECRET_NAME ); + keyVaultClient.deleteSecret( getVaultUri(), TEST_SECRET_NAME ); + pollOnSecretDeletion( getVaultUri(), TEST_SECRET_NAME ); + keyVaultClient.purgeDeletedSecret( getVaultUri(), TEST_SECRET_NAME ); } } } catch ( Exception ex ) { @@ -174,8 +181,10 @@ public void KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverDefa byte[] CEK = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, (byte) 0x88, (byte) 0x99, (byte) 0xAA, (byte) 0xBB, (byte) 0xCC, (byte) 0xDD, (byte) 0xEE, (byte) 0xFF }; byte[] EK = { (byte) 0x96, 0x77, (byte) 0x8B, 0x25, (byte) 0xAE, 0x6C, (byte) 0xA4, 0x35, (byte) 0xF9, 0x2B, 0x5B, (byte) 0x97, (byte) 0xC0, 0x50, (byte) 0xAE, (byte) 0xD2, 0x46, (byte) 0x8A, (byte) 0xB8, (byte) 0xA1, 0x7A, (byte) 0xD8, 0x4E, 0x5D }; + String TEST_SECRET_NAME = SECRET_NAME + "2"; + try { - SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); + SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), TEST_SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); SecretBundle secretBundle = keyVaultClient.setSecret( request ); if ( secretBundle != null ) @@ -228,7 +237,9 @@ public void KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverDefa finally { // Delete the key - keyVaultClient.deleteSecret( getVaultUri(), SECRET_NAME ); + keyVaultClient.deleteSecret( getVaultUri(), TEST_SECRET_NAME ); + pollOnSecretDeletion( getVaultUri(), TEST_SECRET_NAME ); + keyVaultClient.purgeDeletedSecret( getVaultUri(), TEST_SECRET_NAME ); } } } catch ( Exception ex ) { @@ -247,8 +258,10 @@ public void KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverDefa byte[] CEK = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, (byte) 0x88, (byte) 0x99, (byte) 0xAA, (byte) 0xBB, (byte) 0xCC, (byte) 0xDD, (byte) 0xEE, (byte) 0xFF }; byte[] EK = { 0x64, (byte) 0xE8, (byte) 0xC3, (byte) 0xF9, (byte) 0xCE, 0x0F, 0x5B, (byte) 0xA2, 0x63, (byte) 0xE9, 0x77, 0x79, 0x05, (byte) 0x81, (byte) 0x8A, 0x2A, (byte) 0x93, (byte) 0xC8, 0x19, 0x1E, 0x7D, 0x6E, (byte) 0x8A, (byte) 0xE7 }; + String TEST_SECRET_NAME = SECRET_NAME + "3"; + try { - SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); + SetSecretRequest request = new SetSecretRequest.Builder(getVaultUri(), TEST_SECRET_NAME, _base64.encodeAsString(keyBytes)).withContentType("application/octet-stream").build(); SecretBundle secretBundle = keyVaultClient.setSecret( request ); if ( secretBundle != null ) @@ -307,7 +320,9 @@ public void KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverDefa finally { // Delete the key - keyVaultClient.deleteSecret( getVaultUri(), SECRET_NAME ); + keyVaultClient.deleteSecret( getVaultUri(), TEST_SECRET_NAME ); + pollOnSecretDeletion( getVaultUri(), TEST_SECRET_NAME ); + keyVaultClient.purgeDeletedSecret( getVaultUri(), TEST_SECRET_NAME ); } } } catch ( Exception ex ) { diff --git a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverBCProviderTest.json b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverBCProviderTest.json index 5b49ca2..562fa2f 100644 --- a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverBCProviderTest.json +++ b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverBCProviderTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:53:56 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -21,21 +21,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "72dcb83a-3410-4fd4-8dec-307536ceb9d5", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "833fa574-220a-490b-93bc-f5e61e3b98fd", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:53:58 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "661", + "content-length" : "674", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "b81fc3f4-def6-4bcb-85dc-6920d69ba4d6", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/48b62b3ede7744569920e4a35acf6601\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"njZZak4ugkmCJXgbyfAAEXFa50d3SVOnfxUR2tJZ90YCqF6AeXteWjJjgfQdvsp8H1u0HvMGHB8PYqAkdQWYCZPplSTySrTeM_SAp649NB90ZMwo2B6TG-tqZqJXQlaRZQ5NiRXkkBgSLY5UhPPHrIPwg9lgBRrp7wmTx4ADaE8ObCN7Hbqk52pu6rEuh2KADDFmFL4U0kEDjYq4c9z-VZxrosSAdxYME7RYajyZeoIDHotMGmVJK4HxDmIKvyAWFj-TUBbwNFnes9LcqPIUpsl8JAEwHGlqwT_fGvgPGJ3Pv5jUGyakIIFYqXVYbPowef53Hy2Sv0javDC7GiTNQQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1509124958,\"updated\":1509124958,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "dd018afa-a53b-4c05-9232-98f6d0afcbb0", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/29587f1903e14fdbb0fb421cfd25980c\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tILrzug757_es-kZHwD9eNRs-1nzKLY-iNrYWndXuq3bVxGSOXRy14zxfTMWEtYSMkgOxRXvstpMUZMJ4g2hAdPh_BsxWcBMIJ8f7iTkat26yHGJ9IgphrhwVQH9RmCKeyTd7POY7xMCc5VpGzaezRR3lk4RMe8FK1dzO9mSOsWCBUoxpDnPOGoz2QP_0jPmyQJtI40z3tq1MGkPqRnhVtuT_GK7DCvB1sSzqv1RV24zDAXeD6cDAsikjsxUKVZKAbBWoOKhPAxFJ1h1oeUAM223mRcrIbPNpQI4sg6ECghCGpeyEZ461gpZIrxyuxCYdHoKay02VoA06C1poFtrJQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520610837,\"updated\":1520610837,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:53:58 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -73,21 +73,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "a498a634-71a7-4c68-9a2b-0adae5a03a90", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "c92cc65f-c724-4ae3-a11b-36c64801d5fc", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:53:58 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "661", + "content-length" : "674", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "4f050389-ab11-4f08-bad9-ea603679ae71", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/48b62b3ede7744569920e4a35acf6601\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"njZZak4ugkmCJXgbyfAAEXFa50d3SVOnfxUR2tJZ90YCqF6AeXteWjJjgfQdvsp8H1u0HvMGHB8PYqAkdQWYCZPplSTySrTeM_SAp649NB90ZMwo2B6TG-tqZqJXQlaRZQ5NiRXkkBgSLY5UhPPHrIPwg9lgBRrp7wmTx4ADaE8ObCN7Hbqk52pu6rEuh2KADDFmFL4U0kEDjYq4c9z-VZxrosSAdxYME7RYajyZeoIDHotMGmVJK4HxDmIKvyAWFj-TUBbwNFnes9LcqPIUpsl8JAEwHGlqwT_fGvgPGJ3Pv5jUGyakIIFYqXVYbPowef53Hy2Sv0javDC7GiTNQQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1509124958,\"updated\":1509124958,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "adc6a92b-cb0c-4492-adb0-2d4d9a3fda95", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/29587f1903e14fdbb0fb421cfd25980c\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tILrzug757_es-kZHwD9eNRs-1nzKLY-iNrYWndXuq3bVxGSOXRy14zxfTMWEtYSMkgOxRXvstpMUZMJ4g2hAdPh_BsxWcBMIJ8f7iTkat26yHGJ9IgphrhwVQH9RmCKeyTd7POY7xMCc5VpGzaezRR3lk4RMe8FK1dzO9mSOsWCBUoxpDnPOGoz2QP_0jPmyQJtI40z3tq1MGkPqRnhVtuT_GK7DCvB1sSzqv1RV24zDAXeD6cDAsikjsxUKVZKAbBWoOKhPAxFJ1h1oeUAM223mRcrIbPNpQI4sg6ECghCGpeyEZ461gpZIrxyuxCYdHoKay02VoA06C1poFtrJQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520610837,\"updated\":1520610837,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/48b62b3ede7744569920e4a35acf6601?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/29587f1903e14fdbb0fb421cfd25980c?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:53:58 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -125,21 +125,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "ea21b41f-46ab-46ac-91e3-eed4882fe11a", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "dcac0144-2f4a-49d8-8a62-dd103b4c13bd", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/48b62b3ede7744569920e4a35acf6601?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/29587f1903e14fdbb0fb421cfd25980c?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:53:58 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "661", + "content-length" : "674", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "080010c1-62b3-4f52-9079-79c47b540726", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/48b62b3ede7744569920e4a35acf6601\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"njZZak4ugkmCJXgbyfAAEXFa50d3SVOnfxUR2tJZ90YCqF6AeXteWjJjgfQdvsp8H1u0HvMGHB8PYqAkdQWYCZPplSTySrTeM_SAp649NB90ZMwo2B6TG-tqZqJXQlaRZQ5NiRXkkBgSLY5UhPPHrIPwg9lgBRrp7wmTx4ADaE8ObCN7Hbqk52pu6rEuh2KADDFmFL4U0kEDjYq4c9z-VZxrosSAdxYME7RYajyZeoIDHotMGmVJK4HxDmIKvyAWFj-TUBbwNFnes9LcqPIUpsl8JAEwHGlqwT_fGvgPGJ3Pv5jUGyakIIFYqXVYbPowef53Hy2Sv0javDC7GiTNQQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1509124958,\"updated\":1509124958,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "2f88f621-ffe5-47da-b603-3ed72e036e53", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/29587f1903e14fdbb0fb421cfd25980c\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tILrzug757_es-kZHwD9eNRs-1nzKLY-iNrYWndXuq3bVxGSOXRy14zxfTMWEtYSMkgOxRXvstpMUZMJ4g2hAdPh_BsxWcBMIJ8f7iTkat26yHGJ9IgphrhwVQH9RmCKeyTd7POY7xMCc5VpGzaezRR3lk4RMe8FK1dzO9mSOsWCBUoxpDnPOGoz2QP_0jPmyQJtI40z3tq1MGkPqRnhVtuT_GK7DCvB1sSzqv1RV24zDAXeD6cDAsikjsxUKVZKAbBWoOKhPAxFJ1h1oeUAM223mRcrIbPNpQI4sg6ECghCGpeyEZ461gpZIrxyuxCYdHoKay02VoA06C1poFtrJQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520610837,\"updated\":1520610837,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:38 GMT", + "date" : "Fri, 09 Mar 2018 15:53:58 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -177,21 +177,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "65e6f0ea-150a-461e-8d59-15879d44c3a8", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "b2f53636-9b9d-4ebe-9e0e-780d40188a59", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:38 GMT", + "date" : "Fri, 09 Mar 2018 15:53:58 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "661", + "content-length" : "823", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -203,9 +203,163 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "517739c3-dcbd-4e07-b55b-f4e9a93b49a8", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/48b62b3ede7744569920e4a35acf6601\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"njZZak4ugkmCJXgbyfAAEXFa50d3SVOnfxUR2tJZ90YCqF6AeXteWjJjgfQdvsp8H1u0HvMGHB8PYqAkdQWYCZPplSTySrTeM_SAp649NB90ZMwo2B6TG-tqZqJXQlaRZQ5NiRXkkBgSLY5UhPPHrIPwg9lgBRrp7wmTx4ADaE8ObCN7Hbqk52pu6rEuh2KADDFmFL4U0kEDjYq4c9z-VZxrosSAdxYME7RYajyZeoIDHotMGmVJK4HxDmIKvyAWFj-TUBbwNFnes9LcqPIUpsl8JAEwHGlqwT_fGvgPGJ3Pv5jUGyakIIFYqXVYbPowef53Hy2Sv0javDC7GiTNQQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1509124958,\"updated\":1509124958,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "00280cfc-e83a-4fe9-913a-db36b2670d91", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1\",\"deletedDate\":1520610838,\"scheduledPurgeDate\":1528386838,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/29587f1903e14fdbb0fb421cfd25980c\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tILrzug757_es-kZHwD9eNRs-1nzKLY-iNrYWndXuq3bVxGSOXRy14zxfTMWEtYSMkgOxRXvstpMUZMJ4g2hAdPh_BsxWcBMIJ8f7iTkat26yHGJ9IgphrhwVQH9RmCKeyTd7POY7xMCc5VpGzaezRR3lk4RMe8FK1dzO9mSOsWCBUoxpDnPOGoz2QP_0jPmyQJtI40z3tq1MGkPqRnhVtuT_GK7DCvB1sSzqv1RV24zDAXeD6cDAsikjsxUKVZKAbBWoOKhPAxFJ1h1oeUAM223mRcrIbPNpQI4sg6ECghCGpeyEZ461gpZIrxyuxCYdHoKay02VoA06C1poFtrJQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520610837,\"updated\":1520610837,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:58 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "881c71e5-353d-4fd4-8891-8a4f9bcd0b5c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:59 GMT", + "content-length" : "85", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "c439b82c-9fd8-4e6f-99d8-f655ea78c7f7", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: JavaExtensionKey1\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:09 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "176e4b9d-44ff-4e28-b8ad-a175238357dc", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:09 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "823", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "200", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "f54ba99f-711c-4343-8c09-f10258012079", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1\",\"deletedDate\":1520610838,\"scheduledPurgeDate\":1528386838,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/29587f1903e14fdbb0fb421cfd25980c\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tILrzug757_es-kZHwD9eNRs-1nzKLY-iNrYWndXuq3bVxGSOXRy14zxfTMWEtYSMkgOxRXvstpMUZMJ4g2hAdPh_BsxWcBMIJ8f7iTkat26yHGJ9IgphrhwVQH9RmCKeyTd7POY7xMCc5VpGzaezRR3lk4RMe8FK1dzO9mSOsWCBUoxpDnPOGoz2QP_0jPmyQJtI40z3tq1MGkPqRnhVtuT_GK7DCvB1sSzqv1RV24zDAXeD6cDAsikjsxUKVZKAbBWoOKhPAxFJ1h1oeUAM223mRcrIbPNpQI4sg6ECghCGpeyEZ461gpZIrxyuxCYdHoKay02VoA06C1poFtrJQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520610837,\"updated\":1520610837,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:09 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "b598cfca-e1bb-4f78-9a49-002b266c7128", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:09 GMT", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "204", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "7c935c30-5787-4d86-8831-2cb9c301482d", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" } } ], "variables" : [ ] diff --git a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverDefaultProviderTest.json b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverDefaultProviderTest.json index 4e293c6..95823c3 100644 --- a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverDefaultProviderTest.json +++ b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Key_KeyVaultKeyResolverDefaultProviderTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:48 GMT", + "date" : "Fri, 09 Mar 2018 16:10:39 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -21,21 +21,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "836fe45b-3337-4084-bd71-f4a01234f275", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "21ea2687-a121-476b-8895-19194ef4429b", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:49 GMT", + "date" : "Fri, 09 Mar 2018 16:10:40 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "661", + "content-length" : "674", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "ead3802d-87fc-4dcd-9a8d-d61cd9a5388b", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/ad8d8e7e860f43f5ac4bf4b900972ec2\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"mHlhF3WRE8XkchnbUG4xYx_7w11w8GXkdWv2yqp5WpRmSS0cSxv4qiZLL3Oznjj8AQs2pjL8uiqsXjJBqcPJvkMhnB9sha6vmUnuoiKpyi1bMV-zNXIBpTabrYjEnhPx9BFqXQWdLzmWQdlWu7JJTtabw9boVMHsJ-5jr5_wmoy8uF0XnNPSpunSKH3dUNrU-NrftMRPEW93ga59IiTmlGNUe_zOQeHBEJ_o4nxE07H7NjX3nBsrar-ycEMWdUV1XaJQrtBR3mgZxztx3OfXugzIn0bsGfYDf5mWjSnKUclhkeMen5ergTd8tN05tT_uOiUKKbj7ls0J53EniuaNmw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1509124909,\"updated\":1509124909,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "f12142ee-f10f-42bb-ba44-e3500957992b", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/5011e6e37ee1443f93e0b075f5188c07\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"n50fmZOO8VR9eirkXiOxrzxFhAmiIl8OP_YIiL2JoLi_a2EcrGgggX8QqkT4qCB9PMLkGdnqdbuDlVZOxHSO4iAse0SyqtHdnk3bX13OHvkD5ScrqNlNyGP9vlIaEp9KF2ph_Iu6dxe_VAssI0cFN0c12Z40bgGntds3Sr3zM0LfyMBS3O09W99F9bXLel8So7aShYdvWk3pVBNo12Ik5pbMsssGQNVx_rE51OzNdalvkd8WziYJcwM4Zc4iwwFjhScmqDyMn3vVRgavC8a-XtY9V8MnIdBsEJyq-3TyiHOHNDWPP-PWgRnhSE-ZQw4ftz11dzwsTQo0KTxLftdMBw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520611840,\"updated\":1520611840,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:49 GMT", + "date" : "Fri, 09 Mar 2018 16:10:40 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -73,21 +73,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "34a13f06-b0d3-4923-ba20-e14ee2e279e1", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "9b0f68cb-725b-4ff1-8a33-f7bdf60d79d8", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:49 GMT", + "date" : "Fri, 09 Mar 2018 16:10:40 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "661", + "content-length" : "674", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "2c686c34-63be-4860-97a4-51b2b55a817e", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/ad8d8e7e860f43f5ac4bf4b900972ec2\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"mHlhF3WRE8XkchnbUG4xYx_7w11w8GXkdWv2yqp5WpRmSS0cSxv4qiZLL3Oznjj8AQs2pjL8uiqsXjJBqcPJvkMhnB9sha6vmUnuoiKpyi1bMV-zNXIBpTabrYjEnhPx9BFqXQWdLzmWQdlWu7JJTtabw9boVMHsJ-5jr5_wmoy8uF0XnNPSpunSKH3dUNrU-NrftMRPEW93ga59IiTmlGNUe_zOQeHBEJ_o4nxE07H7NjX3nBsrar-ycEMWdUV1XaJQrtBR3mgZxztx3OfXugzIn0bsGfYDf5mWjSnKUclhkeMen5ergTd8tN05tT_uOiUKKbj7ls0J53EniuaNmw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1509124909,\"updated\":1509124909,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "3b883d1b-d938-46d2-baba-8885bbf5d10d", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/5011e6e37ee1443f93e0b075f5188c07\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"n50fmZOO8VR9eirkXiOxrzxFhAmiIl8OP_YIiL2JoLi_a2EcrGgggX8QqkT4qCB9PMLkGdnqdbuDlVZOxHSO4iAse0SyqtHdnk3bX13OHvkD5ScrqNlNyGP9vlIaEp9KF2ph_Iu6dxe_VAssI0cFN0c12Z40bgGntds3Sr3zM0LfyMBS3O09W99F9bXLel8So7aShYdvWk3pVBNo12Ik5pbMsssGQNVx_rE51OzNdalvkd8WziYJcwM4Zc4iwwFjhScmqDyMn3vVRgavC8a-XtY9V8MnIdBsEJyq-3TyiHOHNDWPP-PWgRnhSE-ZQw4ftz11dzwsTQo0KTxLftdMBw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520611840,\"updated\":1520611840,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/ad8d8e7e860f43f5ac4bf4b900972ec2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/5011e6e37ee1443f93e0b075f5188c07?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:49 GMT", + "date" : "Fri, 09 Mar 2018 16:10:40 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -125,21 +125,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "422e602c-4357-4c09-b73c-3ebae57455fb", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "bb28fc65-6761-4500-902c-8fce442af4cd", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/ad8d8e7e860f43f5ac4bf4b900972ec2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/5011e6e37ee1443f93e0b075f5188c07?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:49 GMT", + "date" : "Fri, 09 Mar 2018 16:10:40 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "661", + "content-length" : "674", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "36df9e87-7f06-4a36-8fc5-692be8a31eea", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/ad8d8e7e860f43f5ac4bf4b900972ec2\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"mHlhF3WRE8XkchnbUG4xYx_7w11w8GXkdWv2yqp5WpRmSS0cSxv4qiZLL3Oznjj8AQs2pjL8uiqsXjJBqcPJvkMhnB9sha6vmUnuoiKpyi1bMV-zNXIBpTabrYjEnhPx9BFqXQWdLzmWQdlWu7JJTtabw9boVMHsJ-5jr5_wmoy8uF0XnNPSpunSKH3dUNrU-NrftMRPEW93ga59IiTmlGNUe_zOQeHBEJ_o4nxE07H7NjX3nBsrar-ycEMWdUV1XaJQrtBR3mgZxztx3OfXugzIn0bsGfYDf5mWjSnKUclhkeMen5ergTd8tN05tT_uOiUKKbj7ls0J53EniuaNmw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1509124909,\"updated\":1509124909,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "cf861606-7f4e-4fa6-80a2-066d90d406f5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/5011e6e37ee1443f93e0b075f5188c07\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"n50fmZOO8VR9eirkXiOxrzxFhAmiIl8OP_YIiL2JoLi_a2EcrGgggX8QqkT4qCB9PMLkGdnqdbuDlVZOxHSO4iAse0SyqtHdnk3bX13OHvkD5ScrqNlNyGP9vlIaEp9KF2ph_Iu6dxe_VAssI0cFN0c12Z40bgGntds3Sr3zM0LfyMBS3O09W99F9bXLel8So7aShYdvWk3pVBNo12Ik5pbMsssGQNVx_rE51OzNdalvkd8WziYJcwM4Zc4iwwFjhScmqDyMn3vVRgavC8a-XtY9V8MnIdBsEJyq-3TyiHOHNDWPP-PWgRnhSE-ZQw4ftz11dzwsTQo0KTxLftdMBw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520611840,\"updated\":1520611840,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:49 GMT", + "date" : "Fri, 09 Mar 2018 16:10:40 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -177,21 +177,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "8bb56581-7736-4d46-93b3-9accf548418b", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "5f7a29a5-c6bf-4a15-9900-74caab1c18bb", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:49 GMT", + "date" : "Fri, 09 Mar 2018 16:10:40 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "661", + "content-length" : "823", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -203,9 +203,215 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "6c6ff180-702c-44ae-9e42-ea9821519bb7", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey/ad8d8e7e860f43f5ac4bf4b900972ec2\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"mHlhF3WRE8XkchnbUG4xYx_7w11w8GXkdWv2yqp5WpRmSS0cSxv4qiZLL3Oznjj8AQs2pjL8uiqsXjJBqcPJvkMhnB9sha6vmUnuoiKpyi1bMV-zNXIBpTabrYjEnhPx9BFqXQWdLzmWQdlWu7JJTtabw9boVMHsJ-5jr5_wmoy8uF0XnNPSpunSKH3dUNrU-NrftMRPEW93ga59IiTmlGNUe_zOQeHBEJ_o4nxE07H7NjX3nBsrar-ycEMWdUV1XaJQrtBR3mgZxztx3OfXugzIn0bsGfYDf5mWjSnKUclhkeMen5ergTd8tN05tT_uOiUKKbj7ls0J53EniuaNmw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1509124909,\"updated\":1509124909,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "35996477-8ca5-4681-93fb-f9788fdbb9d8", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1\",\"deletedDate\":1520611841,\"scheduledPurgeDate\":1528387841,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/5011e6e37ee1443f93e0b075f5188c07\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"n50fmZOO8VR9eirkXiOxrzxFhAmiIl8OP_YIiL2JoLi_a2EcrGgggX8QqkT4qCB9PMLkGdnqdbuDlVZOxHSO4iAse0SyqtHdnk3bX13OHvkD5ScrqNlNyGP9vlIaEp9KF2ph_Iu6dxe_VAssI0cFN0c12Z40bgGntds3Sr3zM0LfyMBS3O09W99F9bXLel8So7aShYdvWk3pVBNo12Ik5pbMsssGQNVx_rE51OzNdalvkd8WziYJcwM4Zc4iwwFjhScmqDyMn3vVRgavC8a-XtY9V8MnIdBsEJyq-3TyiHOHNDWPP-PWgRnhSE-ZQw4ftz11dzwsTQo0KTxLftdMBw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520611840,\"updated\":1520611840,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:40 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "72ae2c7a-a7c7-455a-8a8d-995b034c9cc7", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:41 GMT", + "content-length" : "85", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "c78a09bb-56d9-4d29-909a-45466bc244ad", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: JavaExtensionKey1\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:51 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "60491328-5dd8-4c2f-b0e6-54eda1e8e86c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:51 GMT", + "content-length" : "85", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "ceb17c90-6d20-4656-b4bc-7da2a58ac27b", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: JavaExtensionKey1\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:11:01 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "4d3478b1-36bf-4dc5-9156-dcb1dfeba8a1", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:11:01 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "823", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "200", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "22dc2dd0-aaa6-4c8c-a0a8-da773263a9a7", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1\",\"deletedDate\":1520611841,\"scheduledPurgeDate\":1528387841,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/JavaExtensionKey1/5011e6e37ee1443f93e0b075f5188c07\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"n50fmZOO8VR9eirkXiOxrzxFhAmiIl8OP_YIiL2JoLi_a2EcrGgggX8QqkT4qCB9PMLkGdnqdbuDlVZOxHSO4iAse0SyqtHdnk3bX13OHvkD5ScrqNlNyGP9vlIaEp9KF2ph_Iu6dxe_VAssI0cFN0c12Z40bgGntds3Sr3zM0LfyMBS3O09W99F9bXLel8So7aShYdvWk3pVBNo12Ik5pbMsssGQNVx_rE51OzNdalvkd8WziYJcwM4Zc4iwwFjhScmqDyMn3vVRgavC8a-XtY9V8MnIdBsEJyq-3TyiHOHNDWPP-PWgRnhSE-ZQw4ftz11dzwsTQo0KTxLftdMBw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520611840,\"updated\":1520611840,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:11:01 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "0ec8f35e-67ca-4469-9ad9-944ce8aa2726", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/JavaExtensionKey1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:11:01 GMT", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "204", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "aabfe5fe-dfdb-4c08-953a-643db34fcd19", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" } } ], "variables" : [ ] diff --git a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverBCProviderTest.json b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverBCProviderTest.json index 8b528b6..648eecd 100644 --- a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverBCProviderTest.json +++ b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverBCProviderTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:33 GMT", + "date" : "Fri, 09 Mar 2018 15:53:31 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -21,21 +21,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "cf8fdd63-340a-42d4-827e-65732acf3adb", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "89faf1a6-beeb-44af-9836-16dd36742416", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:34 GMT", + "date" : "Fri, 09 Mar 2018 15:53:31 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "290", + "content-length" : "303", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "fbcbc52d-c3f8-4e0e-9b11-65da75b5585e", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/97dd67e8a33e49a5b289e529d31aa361\",\"attributes\":{\"enabled\":true,\"created\":1509124954,\"updated\":1509124954,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "fa0a41f0-15a4-4356-bee2-2342b6b2ce28", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/f05be6e1f6f04244860e1b5cf7f71c16\",\"attributes\":{\"enabled\":true,\"created\":1520610811,\"updated\":1520610811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:34 GMT", + "date" : "Fri, 09 Mar 2018 15:53:31 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -73,21 +73,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "72468fbd-6fef-4b47-8dad-b8ab604604d9", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "3202fae9-9e8b-439d-bbb8-3e1293c778f6", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:34 GMT", + "date" : "Fri, 09 Mar 2018 15:53:32 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "290", + "content-length" : "303", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "9287c437-b510-4b59-9ddb-f4d61dc0365c", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/97dd67e8a33e49a5b289e529d31aa361\",\"attributes\":{\"enabled\":true,\"created\":1509124954,\"updated\":1509124954,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "de5c4b03-143b-43be-a4a2-c97d946e9f33", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/f05be6e1f6f04244860e1b5cf7f71c16\",\"attributes\":{\"enabled\":true,\"created\":1520610811,\"updated\":1520610811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/97dd67e8a33e49a5b289e529d31aa361?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/f05be6e1f6f04244860e1b5cf7f71c16?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:34 GMT", + "date" : "Fri, 09 Mar 2018 15:53:32 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -125,21 +125,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "710c9354-5c70-448f-bf86-706fd8307b76", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "16609f92-6419-4d19-be46-b408f16891e9", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/97dd67e8a33e49a5b289e529d31aa361?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/f05be6e1f6f04244860e1b5cf7f71c16?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:34 GMT", + "date" : "Fri, 09 Mar 2018 15:53:32 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "290", + "content-length" : "303", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "c25e6d0a-a416-4789-be99-d7aa6362300f", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/97dd67e8a33e49a5b289e529d31aa361\",\"attributes\":{\"enabled\":true,\"created\":1509124954,\"updated\":1509124954,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "410e2877-1941-4589-a730-b18bef520584", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/f05be6e1f6f04244860e1b5cf7f71c16\",\"attributes\":{\"enabled\":true,\"created\":1520610811,\"updated\":1520610811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:34 GMT", + "date" : "Fri, 09 Mar 2018 15:53:32 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -177,21 +177,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "093b60e4-f440-4030-abc6-6be35c8c207a", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "b73d5dff-848f-415d-8ec7-ff0a99812efa", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:34 GMT", + "date" : "Fri, 09 Mar 2018 15:53:32 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "257", + "content-length" : "425", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -203,9 +203,163 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "027d43f0-3f23-45f4-b27b-ab2205dc4ac2", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/97dd67e8a33e49a5b289e529d31aa361\",\"attributes\":{\"enabled\":true,\"created\":1509124954,\"updated\":1509124954,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "13e81037-f703-49e0-9975-20538bc1098f", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1\",\"deletedDate\":1520610812,\"scheduledPurgeDate\":1528386812,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/f05be6e1f6f04244860e1b5cf7f71c16\",\"attributes\":{\"enabled\":true,\"created\":1520610811,\"updated\":1520610811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:32 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "0b03303f-d993-4db6-9f8e-9f417291056b", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:32 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "aeb31863-9945-40b5-a9e8-29fde82c5854", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret1\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:42 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "6088bf73-c126-40b4-bb77-ba3ab3faf5ca", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:43 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "425", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "200", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "d3f2f2e0-9631-44b2-b46f-df62c19e9b53", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1\",\"deletedDate\":1520610812,\"scheduledPurgeDate\":1528386812,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/f05be6e1f6f04244860e1b5cf7f71c16\",\"attributes\":{\"enabled\":true,\"created\":1520610811,\"updated\":1520610811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:43 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "23b0f78c-c723-4f78-9065-f4aafba6dbfb", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:43 GMT", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "204", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "7e0215db-540e-4286-a0e9-69d933e2292a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" } } ], "variables" : [ ] diff --git a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverDefaultProviderTest.json b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverDefaultProviderTest.json index c64c066..8780659 100644 --- a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverDefaultProviderTest.json +++ b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret128Base64_KeyVaultKeyResolverDefaultProviderTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:46 GMT", + "date" : "Fri, 09 Mar 2018 16:09:54 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -21,21 +21,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "49d577f9-a58d-4027-bcb3-8aaba751ab1f", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "548b0a69-2aef-40c8-94a7-7b7807a26c7b", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:46 GMT", + "date" : "Fri, 09 Mar 2018 16:09:55 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "290", + "content-length" : "303", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "59bc1f86-9162-4eec-bcb4-9b0b82ef1a06", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/052b93a607c249cebd8ce0fae91ba347\",\"attributes\":{\"enabled\":true,\"created\":1509124907,\"updated\":1509124907,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "351c4f09-8b0b-4488-81a8-9708e31bbb4a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/2e82f0b463444befb7640c521eee9783\",\"attributes\":{\"enabled\":true,\"created\":1520611795,\"updated\":1520611795,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:46 GMT", + "date" : "Fri, 09 Mar 2018 16:09:55 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -73,21 +73,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "87f49054-9261-4d73-b8bc-49185702daa4", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "2728a967-2721-4c23-a94e-d6a16990e33a", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:47 GMT", + "date" : "Fri, 09 Mar 2018 16:09:55 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "290", + "content-length" : "303", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "7cf90a9f-41b1-4c02-8a73-96a440ef86b3", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/052b93a607c249cebd8ce0fae91ba347\",\"attributes\":{\"enabled\":true,\"created\":1509124907,\"updated\":1509124907,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "b9262320-7e8d-435e-9b3c-a4b27c565d36", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/2e82f0b463444befb7640c521eee9783\",\"attributes\":{\"enabled\":true,\"created\":1520611795,\"updated\":1520611795,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/052b93a607c249cebd8ce0fae91ba347?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/2e82f0b463444befb7640c521eee9783?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:47 GMT", + "date" : "Fri, 09 Mar 2018 16:09:55 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -125,21 +125,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "22fa3017-a166-4e98-8a60-844d7ba78105", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "1fd67ebd-4504-4529-becb-36bd1d9b5270", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/052b93a607c249cebd8ce0fae91ba347?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/2e82f0b463444befb7640c521eee9783?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:47 GMT", + "date" : "Fri, 09 Mar 2018 16:09:55 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "290", + "content-length" : "303", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "fe02fdd5-d52b-47e2-bc69-93d899ecb496", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/052b93a607c249cebd8ce0fae91ba347\",\"attributes\":{\"enabled\":true,\"created\":1509124907,\"updated\":1509124907,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "eae8cdff-4dda-4f75-a678-14a82136e478", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODw\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/2e82f0b463444befb7640c521eee9783\",\"attributes\":{\"enabled\":true,\"created\":1520611795,\"updated\":1520611795,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:47 GMT", + "date" : "Fri, 09 Mar 2018 16:09:55 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -177,21 +177,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "d1dba06c-4be0-42de-b0b3-313557f8744f", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "912b9cab-8bf9-4e13-83e9-d067460f6909", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:47 GMT", + "date" : "Fri, 09 Mar 2018 16:09:55 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "257", + "content-length" : "425", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -203,9 +203,215 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "c41590c6-cfea-42e8-b53e-c311b845a1d8", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/052b93a607c249cebd8ce0fae91ba347\",\"attributes\":{\"enabled\":true,\"created\":1509124907,\"updated\":1509124907,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "6d4e5aa5-cefd-4557-bce0-363e7b2c47bc", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1\",\"deletedDate\":1520611796,\"scheduledPurgeDate\":1528387796,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/2e82f0b463444befb7640c521eee9783\",\"attributes\":{\"enabled\":true,\"created\":1520611795,\"updated\":1520611795,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:55 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "3568d141-325a-430c-88d0-29f7908623d9", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:55 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "367ebdfa-57f9-47f5-8576-e07b473e5493", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret1\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:05 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "aae461f7-a8c3-499f-b9ce-8cf479368344", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:06 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "4046f461-623f-4b69-8fa9-b9dd3891496a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret1\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:16 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "2fb605aa-7d16-4813-94b5-c4a50170cb38", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:16 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "425", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "200", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "8dd62321-ebf6-43ce-8b3e-2d8715643181", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1\",\"deletedDate\":1520611796,\"scheduledPurgeDate\":1528387796,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret1/2e82f0b463444befb7640c521eee9783\",\"attributes\":{\"enabled\":true,\"created\":1520611795,\"updated\":1520611795,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:16 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "d4c8a519-e398-4287-9cf2-f96031b95619", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret1?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:17 GMT", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "204", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "d0b64c22-2d02-452c-829e-5fffb4aff6c3", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" } } ], "variables" : [ ] diff --git a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverBCProviderTest.json b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverBCProviderTest.json index b411b9d..ccaf63f 100644 --- a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverBCProviderTest.json +++ b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverBCProviderTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:54:09 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -21,21 +21,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "e8981109-9337-46d3-b704-3c2ef83f3037", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "5260e931-7db2-4d1e-bb13-89d6906cc120", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:54:10 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "300", + "content-length" : "313", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "fac3ba6a-9444-4497-a676-716f8666775c", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/40e7914b8c464c77bc65cee1552405f0\",\"attributes\":{\"enabled\":true,\"created\":1509124958,\"updated\":1509124958,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "4a66a450-2c65-4f50-9d84-1ce873ed7b9a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/5c3e090e5bb448cfb18a0744e9adbce7\",\"attributes\":{\"enabled\":true,\"created\":1520610850,\"updated\":1520610850,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:54:10 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -73,21 +73,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "91bdde45-9737-4202-a7dd-c895f8beca25", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "891059b0-3c6f-481a-a191-ab8a3ec0282a", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:38 GMT", + "date" : "Fri, 09 Mar 2018 15:54:10 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "300", + "content-length" : "313", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "41fe493c-4910-4626-ab3d-fcc4d1f5b24d", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/40e7914b8c464c77bc65cee1552405f0\",\"attributes\":{\"enabled\":true,\"created\":1509124958,\"updated\":1509124958,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "bd509b79-aa9d-4684-b372-a70bbd65fee3", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/5c3e090e5bb448cfb18a0744e9adbce7\",\"attributes\":{\"enabled\":true,\"created\":1520610850,\"updated\":1520610850,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/40e7914b8c464c77bc65cee1552405f0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/5c3e090e5bb448cfb18a0744e9adbce7?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:38 GMT", + "date" : "Fri, 09 Mar 2018 15:54:10 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -125,21 +125,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "e285db27-d957-4a26-86bc-7dc46a6805b6", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "2c38d089-800a-45fe-a23e-b45594969870", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/40e7914b8c464c77bc65cee1552405f0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/5c3e090e5bb448cfb18a0744e9adbce7?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:38 GMT", + "date" : "Fri, 09 Mar 2018 15:54:10 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "300", + "content-length" : "313", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "3a5f6ae8-0b6c-4177-bbf0-3c0458c518ba", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/40e7914b8c464c77bc65cee1552405f0\",\"attributes\":{\"enabled\":true,\"created\":1509124958,\"updated\":1509124958,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "311f9640-bcb2-45ba-a88b-578fd6294ba6", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/5c3e090e5bb448cfb18a0744e9adbce7\",\"attributes\":{\"enabled\":true,\"created\":1520610850,\"updated\":1520610850,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:38 GMT", + "date" : "Fri, 09 Mar 2018 15:54:10 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -177,21 +177,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "fc72f01a-bf36-4a43-a3cc-dc0bfea8ebbf", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "1fe8902e-4c82-494d-918a-2ede3e2747fd", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:38 GMT", + "date" : "Fri, 09 Mar 2018 15:54:10 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "257", + "content-length" : "425", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -203,9 +203,215 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "ec691a7d-f6ca-49ae-8a8c-a44573412319", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/40e7914b8c464c77bc65cee1552405f0\",\"attributes\":{\"enabled\":true,\"created\":1509124958,\"updated\":1509124958,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "b8612317-9f8d-40f9-9572-8411f54386b2", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2\",\"deletedDate\":1520610850,\"scheduledPurgeDate\":1528386850,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/5c3e090e5bb448cfb18a0744e9adbce7\",\"attributes\":{\"enabled\":true,\"created\":1520610850,\"updated\":1520610850,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:10 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "b028440d-1c3f-47a2-b13d-4d589f667a1b", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:10 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "08f1b6eb-f7d9-4109-aca2-04b3e41f7b81", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret2\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:21 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "64d25cd2-9bc1-484c-b7e9-72b1a3892c59", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:21 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "cd8611ce-1749-4f32-8988-7154eaf37c18", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret2\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:31 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "12263c56-064e-425c-9d3b-40dc210dd3f9", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:31 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "425", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "200", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "73a3a0e8-00cf-4513-a720-9aa044488950", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2\",\"deletedDate\":1520610850,\"scheduledPurgeDate\":1528386850,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/5c3e090e5bb448cfb18a0744e9adbce7\",\"attributes\":{\"enabled\":true,\"created\":1520610850,\"updated\":1520610850,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:31 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "c63e2fce-1a97-4940-a7cf-c12528a900e5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:54:31 GMT", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "204", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "5f302584-a895-4ee2-a73b-579ae41c6d56", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" } } ], "variables" : [ ] diff --git a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverDefaultProviderTest.json b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverDefaultProviderTest.json index 2b4b9cf..378591b 100644 --- a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverDefaultProviderTest.json +++ b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret192Base64_KeyVaultKeyResolverDefaultProviderTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:44 GMT", + "date" : "Fri, 09 Mar 2018 16:09:31 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -21,21 +21,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "a506ac1e-e1d6-4200-8eb0-e37bf51a4f1b", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "3c0ba6c8-69b1-4e09-9baf-42dcd7859113", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:44 GMT", + "date" : "Fri, 09 Mar 2018 16:09:32 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "300", + "content-length" : "313", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "e0fdbef4-ff32-46a8-99f9-007b9dd0a57f", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/478f8e1512844a77b961b88cc4529018\",\"attributes\":{\"enabled\":true,\"created\":1509124905,\"updated\":1509124905,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "eabcc81a-4ca3-45a5-b33d-e588bb3cc3a9", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/6853a4175d054a41868e53e4292bcf05\",\"attributes\":{\"enabled\":true,\"created\":1520611772,\"updated\":1520611772,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:44 GMT", + "date" : "Fri, 09 Mar 2018 16:09:32 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -73,21 +73,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "d2f7ec72-7104-428b-922b-ca5713a3165c", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "ed005b6e-f1c0-4433-88a1-cab01f5b1d3f", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:45 GMT", + "date" : "Fri, 09 Mar 2018 16:09:32 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "300", + "content-length" : "313", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "54808fb3-d391-470c-90ed-45ec88789592", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/478f8e1512844a77b961b88cc4529018\",\"attributes\":{\"enabled\":true,\"created\":1509124905,\"updated\":1509124905,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "1011a520-ceb4-4957-9308-39755b4359ca", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/6853a4175d054a41868e53e4292bcf05\",\"attributes\":{\"enabled\":true,\"created\":1520611772,\"updated\":1520611772,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/478f8e1512844a77b961b88cc4529018?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/6853a4175d054a41868e53e4292bcf05?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:45 GMT", + "date" : "Fri, 09 Mar 2018 16:09:32 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -125,21 +125,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "3f9bbdda-b658-4dba-8b03-5940f728cb5f", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "ab38b9cf-159d-4802-958e-f75586327665", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/478f8e1512844a77b961b88cc4529018?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/6853a4175d054a41868e53e4292bcf05?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:45 GMT", + "date" : "Fri, 09 Mar 2018 16:09:32 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "300", + "content-length" : "313", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "0fc71475-07aa-4941-aabf-0791a46aa2b2", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/478f8e1512844a77b961b88cc4529018\",\"attributes\":{\"enabled\":true,\"created\":1509124905,\"updated\":1509124905,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "d64b42e1-08ee-41ca-849e-67b571b3117a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYX\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/6853a4175d054a41868e53e4292bcf05\",\"attributes\":{\"enabled\":true,\"created\":1520611772,\"updated\":1520611772,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:45 GMT", + "date" : "Fri, 09 Mar 2018 16:09:32 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -177,21 +177,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "7cae4c71-6b19-4c28-a8ef-8ac682935a4d", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "3d73ce04-c2ac-4817-9f1d-6fda5299be91", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:45 GMT", + "date" : "Fri, 09 Mar 2018 16:09:32 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "257", + "content-length" : "425", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -203,9 +203,215 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "517240c2-d3b3-4689-a082-33c50e736a5f", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/478f8e1512844a77b961b88cc4529018\",\"attributes\":{\"enabled\":true,\"created\":1509124905,\"updated\":1509124905,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "788d99fe-f583-49d3-8621-0b691f1ce7ef", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2\",\"deletedDate\":1520611773,\"scheduledPurgeDate\":1528387773,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/6853a4175d054a41868e53e4292bcf05\",\"attributes\":{\"enabled\":true,\"created\":1520611772,\"updated\":1520611772,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:33 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "2345477e-aec1-4ef4-9978-630fbcb20abf", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:33 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "e1c72771-b626-43d0-b605-8f7a102e639a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret2\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:43 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "73610fdd-d7b3-478e-89fb-9109199acf47", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:43 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "80f824f3-8c5f-4511-a2c9-79630960ca99", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret2\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:53 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "25d3fc39-47a7-47c8-a754-90a8f0c25eb4", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:53 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "425", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "200", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "5431ca8f-b512-41ab-ba46-4e39ebecc051", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2\",\"deletedDate\":1520611773,\"scheduledPurgeDate\":1528387773,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret2/6853a4175d054a41868e53e4292bcf05\",\"attributes\":{\"enabled\":true,\"created\":1520611772,\"updated\":1520611772,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:53 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "e7f02089-f0fe-4741-b8cf-a5814e003160", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret2?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:09:54 GMT", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "204", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "7ecc724a-32d7-4e72-9136-87b1d2830fd5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" } } ], "variables" : [ ] diff --git a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverBCProviderTest.json b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverBCProviderTest.json index e2ca480..5ce827a 100644 --- a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverBCProviderTest.json +++ b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverBCProviderTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:36 GMT", + "date" : "Fri, 09 Mar 2018 15:53:43 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -21,21 +21,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "30a31aa1-f647-4930-8700-e71d82a77594", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "9af2e824-b7b6-48d7-82d7-803abc7f5763", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:36 GMT", + "date" : "Fri, 09 Mar 2018 15:53:44 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "311", + "content-length" : "324", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "e9efe7ba-d60c-4dd6-8820-653882964356", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/f7a5d02d03c54b27811e2b9ada0bc8f1\",\"attributes\":{\"enabled\":true,\"created\":1509124956,\"updated\":1509124956,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "217a08b5-f0b5-4917-ab8d-12e5991192c5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/d73bd7fbaaeb4e9e9b57fbd920c3dc23\",\"attributes\":{\"enabled\":true,\"created\":1520610824,\"updated\":1520610824,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:36 GMT", + "date" : "Fri, 09 Mar 2018 15:53:44 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -73,21 +73,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "78e2bfbd-11ca-42d8-82e3-51c16410affc", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "77dc4201-c421-4b23-b3e9-9caf720e16e3", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:36 GMT", + "date" : "Fri, 09 Mar 2018 15:53:44 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "311", + "content-length" : "324", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "3686f342-cca2-42af-892d-dd143844495a", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/f7a5d02d03c54b27811e2b9ada0bc8f1\",\"attributes\":{\"enabled\":true,\"created\":1509124956,\"updated\":1509124956,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "f16a5fe9-97e3-468b-a728-8fcbba1fb038", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/d73bd7fbaaeb4e9e9b57fbd920c3dc23\",\"attributes\":{\"enabled\":true,\"created\":1520610824,\"updated\":1520610824,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/f7a5d02d03c54b27811e2b9ada0bc8f1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/d73bd7fbaaeb4e9e9b57fbd920c3dc23?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:36 GMT", + "date" : "Fri, 09 Mar 2018 15:53:44 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -125,21 +125,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "09d9ac0e-2d61-4599-923b-e593a32e62e8", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "d615b881-707b-4f6a-ba81-e093c0819ff7", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/f7a5d02d03c54b27811e2b9ada0bc8f1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/d73bd7fbaaeb4e9e9b57fbd920c3dc23?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:36 GMT", + "date" : "Fri, 09 Mar 2018 15:53:45 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "311", + "content-length" : "324", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "ca7e346c-2cdc-4626-baa9-d667d44da90c", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/f7a5d02d03c54b27811e2b9ada0bc8f1\",\"attributes\":{\"enabled\":true,\"created\":1509124956,\"updated\":1509124956,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "73a6ac38-e44d-4662-bdb7-5c1d59fa0e8c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/d73bd7fbaaeb4e9e9b57fbd920c3dc23\",\"attributes\":{\"enabled\":true,\"created\":1520610824,\"updated\":1520610824,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:36 GMT", + "date" : "Fri, 09 Mar 2018 15:53:45 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -177,21 +177,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "0a98c9c7-a6cf-4724-9f56-8c48f43f3f1d", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "39398865-2514-48b2-9523-8853c39f884e", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:22:37 GMT", + "date" : "Fri, 09 Mar 2018 15:53:45 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "257", + "content-length" : "425", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -203,9 +203,163 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "35a3391c-382b-49f8-8c44-3dc6f697b470", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/f7a5d02d03c54b27811e2b9ada0bc8f1\",\"attributes\":{\"enabled\":true,\"created\":1509124956,\"updated\":1509124956,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "48ed1254-afa1-42d8-9112-cbca0769da53", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3\",\"deletedDate\":1520610825,\"scheduledPurgeDate\":1528386825,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/d73bd7fbaaeb4e9e9b57fbd920c3dc23\",\"attributes\":{\"enabled\":true,\"created\":1520610824,\"updated\":1520610824,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:45 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "265f08d3-8fe7-4da4-a560-45d98589687c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:46 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "2dada77f-533a-45e5-bce8-3133a26e2b49", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret3\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:55 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "4c70811c-3ffa-421c-b7ad-52a1b7fdcb4d", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:55 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "425", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "200", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "892cd263-ce9e-4805-9057-7c63ec7d5af6", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3\",\"deletedDate\":1520610825,\"scheduledPurgeDate\":1528386825,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/d73bd7fbaaeb4e9e9b57fbd920c3dc23\",\"attributes\":{\"enabled\":true,\"created\":1520610824,\"updated\":1520610824,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:55 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "d4505099-1b91-4a55-aff8-1d87e8130e26", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 15:53:56 GMT", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "204", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "de1bca8c-5df6-46e4-b346-6a20f52f4ca0", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" } } ], "variables" : [ ] diff --git a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverDefaultProviderTest.json b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverDefaultProviderTest.json index c28a2e3..38812a6 100644 --- a/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverDefaultProviderTest.json +++ b/azure-keyvault-extensions/target/test-classes/session-records/KeyVault_KeyVaultKeyResolver_Secret256Base64_KeyVaultKeyResolverDefaultProviderTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:47 GMT", + "date" : "Fri, 09 Mar 2018 16:10:17 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -21,21 +21,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "c70c1c57-ed02-434a-9223-6c08b7152d88", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "28c789e0-8ef0-4648-966f-cbfc775b2e3e", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:47 GMT", + "date" : "Fri, 09 Mar 2018 16:10:17 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "311", + "content-length" : "324", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "04bc5d8b-cdc3-4e26-833a-37d555c6df57", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/a58f82483ca447648d16a2cca913755e\",\"attributes\":{\"enabled\":true,\"created\":1509124908,\"updated\":1509124908,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "6c59444f-1d21-4f10-94ed-2bc698435599", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/81670455d42c460688c9a79cd87e5758\",\"attributes\":{\"enabled\":true,\"created\":1520611818,\"updated\":1520611818,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:48 GMT", + "date" : "Fri, 09 Mar 2018 16:10:17 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -73,21 +73,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "39a988ab-e1b8-4b67-b520-c19401a5fb9d", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "94266c62-8f36-4e74-ac56-c218408d1e38", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:48 GMT", + "date" : "Fri, 09 Mar 2018 16:10:17 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "311", + "content-length" : "324", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "46129c99-ee6c-43fd-91cf-5da430069b80", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/a58f82483ca447648d16a2cca913755e\",\"attributes\":{\"enabled\":true,\"created\":1509124908,\"updated\":1509124908,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "e9d54492-7cf2-46cc-bccf-5610bf620b2c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/81670455d42c460688c9a79cd87e5758\",\"attributes\":{\"enabled\":true,\"created\":1520611818,\"updated\":1520611818,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/a58f82483ca447648d16a2cca913755e?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/81670455d42c460688c9a79cd87e5758?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:48 GMT", + "date" : "Fri, 09 Mar 2018 16:10:17 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -125,21 +125,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "688660fc-7def-4dcd-92c7-8c06d6669b0d", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "a28ad531-496c-4abf-8296-82f66d7550f3", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/a58f82483ca447648d16a2cca913755e?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/81670455d42c460688c9a79cd87e5758?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:48 GMT", + "date" : "Fri, 09 Mar 2018 16:10:17 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "311", + "content-length" : "324", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "316e4b25-e102-4308-bd0a-f90f0b706fb0", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/a58f82483ca447648d16a2cca913755e\",\"attributes\":{\"enabled\":true,\"created\":1509124908,\"updated\":1509124908,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "b07e6e45-eb8d-4ca2-aebc-c612fe0873c2", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"value\":\"AAECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8\",\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/81670455d42c460688c9a79cd87e5758\",\"attributes\":{\"enabled\":true,\"created\":1520611818,\"updated\":1520611818,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:48 GMT", + "date" : "Fri, 09 Mar 2018 16:10:17 GMT", "server" : "Microsoft-IIS/8.5", "content-length" : "0", "expires" : "-1", @@ -177,21 +177,21 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "d614f78e-92e1-4ef2-b1d0-b5bee6ffaf52", - "x-ms-keyvault-service-version" : "1.0.0.826", + "x-ms-request-id" : "9e2b9bba-466c-489b-9b0b-6b9f292dbb67", + "x-ms-keyvault-service-version" : "1.0.0.841", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Fri, 27 Oct 2017 17:21:48 GMT", + "date" : "Fri, 09 Mar 2018 16:10:18 GMT", "server" : "Microsoft-IIS/8.5", - "content-length" : "257", + "content-length" : "425", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", @@ -203,9 +203,215 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-request-id" : "59aa6f4e-1d46-47a0-baef-357966f19876", - "x-ms-keyvault-service-version" : "1.0.0.826", - "Body" : "{\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret/a58f82483ca447648d16a2cca913755e\",\"attributes\":{\"enabled\":true,\"created\":1509124908,\"updated\":1509124908,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-request-id" : "8ea2d273-417a-4759-88b2-6b5c0e066a90", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3\",\"deletedDate\":1520611818,\"scheduledPurgeDate\":1528387818,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/81670455d42c460688c9a79cd87e5758\",\"attributes\":{\"enabled\":true,\"created\":1520611818,\"updated\":1520611818,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:18 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "669fc213-861f-42b7-a58c-ea39f29cc700", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:18 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "ff5a2bdb-4211-4135-8260-8cc02c9a4e9b", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret3\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:28 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "d7314ecc-f612-444a-b8cb-66f1610cd5d8", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:28 GMT", + "content-length" : "94", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "404", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "67a90723-b3d1-40a4-b730-75c53913a659", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: JavaExtensionSecret3\"}}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:39 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "bc5047d0-a0f5-4de5-8160-89e0bd413dbe", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:39 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "425", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "200", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "3e110a36-a80f-4149-8ce3-d0a059991057", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3\",\"deletedDate\":1520611818,\"scheduledPurgeDate\":1528387818,\"contentType\":\"application/octet-stream\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/JavaExtensionSecret3/81670455d42c460688c9a79cd87e5758\",\"attributes\":{\"enabled\":true,\"created\":1520611818,\"updated\":1520611818,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:39 GMT", + "server" : "Microsoft-IIS/8.5", + "content-length" : "0", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "www-authenticate" : "Bearer authorization=\"https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47\", resource=\"https://vault.azure.net\"", + "retry-after" : "0", + "StatusCode" : "401", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "700f777e-1300-4811-a13a-ac522095e6e2", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" + } + }, { + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/JavaExtensionSecret3?api-version=7.0-preview", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Fri, 09 Mar 2018 16:10:40 GMT", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "204", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-request-id" : "e30bcca9-3229-45b8-b223-b445a5cd06ce", + "x-ms-keyvault-service-version" : "1.0.0.841", + "Body" : "" } } ], "variables" : [ ] diff --git a/azure-keyvault-webkey/pom.xml b/azure-keyvault-webkey/pom.xml index e7de2ba..b430666 100644 --- a/azure-keyvault-webkey/pom.xml +++ b/azure-keyvault-webkey/pom.xml @@ -8,7 +8,7 @@ com.microsoft.azure azure-keyvault-parent - 1.1-alpha-1 + 1.1-alpha-2 ../pom.xml diff --git a/azure-keyvault/pom.xml b/azure-keyvault/pom.xml index 58634b6..992ea62 100644 --- a/azure-keyvault/pom.xml +++ b/azure-keyvault/pom.xml @@ -6,7 +6,7 @@ com.microsoft.azure azure-keyvault-parent - 1.1-alpha-1 + 1.1-alpha-2 ../pom.xml diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/KeyVaultClientBase.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/KeyVaultClientBase.java index 6b9ab69..44f8bce 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/KeyVaultClientBase.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/KeyVaultClientBase.java @@ -1,13 +1,17 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault; +import com.microsoft.azure.AzureClient; import com.microsoft.azure.keyvault.models.BackupKeyResult; import com.microsoft.azure.keyvault.models.BackupSecretResult; +import com.microsoft.azure.keyvault.models.BackupStorageResult; import com.microsoft.azure.keyvault.models.CertificateAttributes; import com.microsoft.azure.keyvault.models.CertificateBundle; import com.microsoft.azure.keyvault.models.CertificateIssuerItem; @@ -19,8 +23,12 @@ import com.microsoft.azure.keyvault.models.DeletedCertificateItem; import com.microsoft.azure.keyvault.models.DeletedKeyBundle; import com.microsoft.azure.keyvault.models.DeletedKeyItem; +import com.microsoft.azure.keyvault.models.DeletedSasDefinitionBundle; +import com.microsoft.azure.keyvault.models.DeletedSasDefinitionItem; import com.microsoft.azure.keyvault.models.DeletedSecretBundle; import com.microsoft.azure.keyvault.models.DeletedSecretItem; +import com.microsoft.azure.keyvault.models.DeletedStorageAccountItem; +import com.microsoft.azure.keyvault.models.DeletedStorageBundle; import com.microsoft.azure.keyvault.models.IssuerAttributes; import com.microsoft.azure.keyvault.models.IssuerBundle; import com.microsoft.azure.keyvault.models.IssuerCredentials; @@ -32,23 +40,32 @@ import com.microsoft.azure.keyvault.models.KeyVaultErrorException; import com.microsoft.azure.keyvault.models.KeyVerifyResult; import com.microsoft.azure.keyvault.models.OrganizationDetails; - +import com.microsoft.azure.keyvault.models.SasDefinitionAttributes; +import com.microsoft.azure.keyvault.models.SasDefinitionBundle; +import com.microsoft.azure.keyvault.models.SasDefinitionItem; +import com.microsoft.azure.keyvault.models.SasTokenType; import com.microsoft.azure.keyvault.models.SecretAttributes; import com.microsoft.azure.keyvault.models.SecretBundle; import com.microsoft.azure.keyvault.models.SecretItem; -import com.microsoft.azure.AzureClient; +import com.microsoft.azure.keyvault.models.StorageAccountAttributes; +import com.microsoft.azure.keyvault.models.StorageAccountItem; +import com.microsoft.azure.keyvault.models.StorageBundle; import com.microsoft.azure.ListOperationCallback; import com.microsoft.azure.Page; import com.microsoft.azure.PagedList; -import com.microsoft.azure.keyvault.webkey.*; import com.microsoft.rest.RestClient; import com.microsoft.rest.ServiceCallback; import com.microsoft.rest.ServiceFuture; import com.microsoft.rest.ServiceResponse; - +import java.io.IOException; import java.util.List; import java.util.Map; import rx.Observable; +import com.microsoft.azure.keyvault.webkey.JsonWebKey; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyEncryptionAlgorithm; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyOperation; +import com.microsoft.azure.keyvault.webkey.JsonWebKeySignatureAlgorithm; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyType; /** * The interface for KeyVaultClientBase class. @@ -128,7 +145,7 @@ public interface KeyVaultClientBase { /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -142,7 +159,7 @@ public interface KeyVaultClientBase { /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -155,7 +172,7 @@ public interface KeyVaultClientBase { /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -167,7 +184,7 @@ public interface KeyVaultClientBase { /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -178,7 +195,7 @@ public interface KeyVaultClientBase { Observable> createKeyWithServiceResponseAsync(String vaultBaseUrl, String keyName, JsonWebKeyType kty); /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -197,7 +214,7 @@ public interface KeyVaultClientBase { /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -215,7 +232,7 @@ public interface KeyVaultClientBase { /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -232,7 +249,7 @@ public interface KeyVaultClientBase { /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -249,7 +266,7 @@ public interface KeyVaultClientBase { /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -263,7 +280,7 @@ public interface KeyVaultClientBase { /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -276,7 +293,7 @@ public interface KeyVaultClientBase { /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -288,7 +305,7 @@ public interface KeyVaultClientBase { /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -299,7 +316,7 @@ public interface KeyVaultClientBase { Observable> importKeyWithServiceResponseAsync(String vaultBaseUrl, String keyName, JsonWebKey key); /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -316,7 +333,7 @@ public interface KeyVaultClientBase { /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -332,7 +349,7 @@ public interface KeyVaultClientBase { /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -347,7 +364,7 @@ public interface KeyVaultClientBase { /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -362,7 +379,7 @@ public interface KeyVaultClientBase { /** * Deletes a key of any type from storage in Azure Key Vault. - * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. + * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the keys/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to delete. @@ -375,7 +392,7 @@ public interface KeyVaultClientBase { /** * Deletes a key of any type from storage in Azure Key Vault. - * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. + * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the keys/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to delete. @@ -387,7 +404,7 @@ public interface KeyVaultClientBase { /** * Deletes a key of any type from storage in Azure Key Vault. - * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. + * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the keys/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to delete. @@ -398,7 +415,7 @@ public interface KeyVaultClientBase { /** * Deletes a key of any type from storage in Azure Key Vault. - * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. + * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the keys/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to delete. @@ -409,7 +426,7 @@ public interface KeyVaultClientBase { /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -423,7 +440,7 @@ public interface KeyVaultClientBase { /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -436,7 +453,7 @@ public interface KeyVaultClientBase { /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -448,7 +465,7 @@ public interface KeyVaultClientBase { /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -459,7 +476,7 @@ public interface KeyVaultClientBase { Observable> updateKeyWithServiceResponseAsync(String vaultBaseUrl, String keyName, String keyVersion); /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -476,7 +493,7 @@ public interface KeyVaultClientBase { /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -492,7 +509,7 @@ public interface KeyVaultClientBase { /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -507,7 +524,7 @@ public interface KeyVaultClientBase { /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -522,7 +539,7 @@ public interface KeyVaultClientBase { /** * Gets the public part of a stored key. - * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. + * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to get. @@ -536,7 +553,7 @@ public interface KeyVaultClientBase { /** * Gets the public part of a stored key. - * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. + * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to get. @@ -549,7 +566,7 @@ public interface KeyVaultClientBase { /** * Gets the public part of a stored key. - * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. + * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to get. @@ -561,7 +578,7 @@ public interface KeyVaultClientBase { /** * Gets the public part of a stored key. - * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. + * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to get. @@ -573,7 +590,7 @@ public interface KeyVaultClientBase { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -586,7 +603,7 @@ public interface KeyVaultClientBase { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -598,7 +615,7 @@ public interface KeyVaultClientBase { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -609,7 +626,7 @@ public interface KeyVaultClientBase { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -619,7 +636,7 @@ public interface KeyVaultClientBase { Observable>> getKeyVersionsWithServiceResponseAsync(final String vaultBaseUrl, final String keyName); /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -633,7 +650,7 @@ public interface KeyVaultClientBase { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -646,7 +663,7 @@ public interface KeyVaultClientBase { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -658,7 +675,7 @@ public interface KeyVaultClientBase { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -670,7 +687,7 @@ public interface KeyVaultClientBase { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -682,7 +699,7 @@ public interface KeyVaultClientBase { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -693,7 +710,7 @@ public interface KeyVaultClientBase { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -703,7 +720,7 @@ public interface KeyVaultClientBase { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -712,7 +729,7 @@ public interface KeyVaultClientBase { Observable>> getKeysWithServiceResponseAsync(final String vaultBaseUrl); /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -725,7 +742,7 @@ public interface KeyVaultClientBase { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -737,7 +754,7 @@ public interface KeyVaultClientBase { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -748,7 +765,7 @@ public interface KeyVaultClientBase { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -759,7 +776,7 @@ public interface KeyVaultClientBase { /** * Requests that a backup of the specified key be downloaded to the client. - * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. + * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. This operation requires the key/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -772,7 +789,7 @@ public interface KeyVaultClientBase { /** * Requests that a backup of the specified key be downloaded to the client. - * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. + * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. This operation requires the key/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -784,7 +801,7 @@ public interface KeyVaultClientBase { /** * Requests that a backup of the specified key be downloaded to the client. - * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. + * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. This operation requires the key/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -795,7 +812,7 @@ public interface KeyVaultClientBase { /** * Requests that a backup of the specified key be downloaded to the client. - * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. + * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. This operation requires the key/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -806,7 +823,7 @@ public interface KeyVaultClientBase { /** * Restores a backed up key to a vault. - * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. + * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. This operation requires the keys/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyBundleBackup The backup blob associated with a key bundle. @@ -819,7 +836,7 @@ public interface KeyVaultClientBase { /** * Restores a backed up key to a vault. - * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. + * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. This operation requires the keys/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyBundleBackup The backup blob associated with a key bundle. @@ -831,7 +848,7 @@ public interface KeyVaultClientBase { /** * Restores a backed up key to a vault. - * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. + * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. This operation requires the keys/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyBundleBackup The backup blob associated with a key bundle. @@ -842,7 +859,7 @@ public interface KeyVaultClientBase { /** * Restores a backed up key to a vault. - * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. + * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. This operation requires the keys/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyBundleBackup The backup blob associated with a key bundle. @@ -853,7 +870,7 @@ public interface KeyVaultClientBase { /** * Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault. - * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -869,7 +886,7 @@ public interface KeyVaultClientBase { /** * Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault. - * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -884,7 +901,7 @@ public interface KeyVaultClientBase { /** * Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault. - * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -898,7 +915,7 @@ public interface KeyVaultClientBase { /** * Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault. - * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -912,7 +929,7 @@ public interface KeyVaultClientBase { /** * Decrypts a single block of encrypted data. - * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/decrypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -928,7 +945,7 @@ public interface KeyVaultClientBase { /** * Decrypts a single block of encrypted data. - * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/decrypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -943,7 +960,7 @@ public interface KeyVaultClientBase { /** * Decrypts a single block of encrypted data. - * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/decrypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -957,7 +974,7 @@ public interface KeyVaultClientBase { /** * Decrypts a single block of encrypted data. - * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/decrypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -971,7 +988,7 @@ public interface KeyVaultClientBase { /** * Creates a signature from a digest using the specified key. - * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. + * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. This operation requires the keys/sign permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -987,7 +1004,7 @@ public interface KeyVaultClientBase { /** * Creates a signature from a digest using the specified key. - * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. + * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. This operation requires the keys/sign permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1002,7 +1019,7 @@ public interface KeyVaultClientBase { /** * Creates a signature from a digest using the specified key. - * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. + * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. This operation requires the keys/sign permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1016,7 +1033,7 @@ public interface KeyVaultClientBase { /** * Creates a signature from a digest using the specified key. - * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. + * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. This operation requires the keys/sign permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1030,7 +1047,7 @@ public interface KeyVaultClientBase { /** * Verifies a signature using a specified key. - * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. + * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. This operation requires the keys/verify permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1047,7 +1064,7 @@ public interface KeyVaultClientBase { /** * Verifies a signature using a specified key. - * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. + * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. This operation requires the keys/verify permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1063,7 +1080,7 @@ public interface KeyVaultClientBase { /** * Verifies a signature using a specified key. - * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. + * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. This operation requires the keys/verify permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1078,7 +1095,7 @@ public interface KeyVaultClientBase { /** * Verifies a signature using a specified key. - * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. + * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. This operation requires the keys/verify permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1093,7 +1110,7 @@ public interface KeyVaultClientBase { /** * Wraps a symmetric key using a specified key. - * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/wrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1109,7 +1126,7 @@ public interface KeyVaultClientBase { /** * Wraps a symmetric key using a specified key. - * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/wrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1124,7 +1141,7 @@ public interface KeyVaultClientBase { /** * Wraps a symmetric key using a specified key. - * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/wrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1138,7 +1155,7 @@ public interface KeyVaultClientBase { /** * Wraps a symmetric key using a specified key. - * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/wrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1152,7 +1169,7 @@ public interface KeyVaultClientBase { /** * Unwraps a symmetric key using the specified key that was initially used for wrapping that key. - * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/unwrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1168,7 +1185,7 @@ public interface KeyVaultClientBase { /** * Unwraps a symmetric key using the specified key that was initially used for wrapping that key. - * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/unwrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1183,7 +1200,7 @@ public interface KeyVaultClientBase { /** * Unwraps a symmetric key using the specified key that was initially used for wrapping that key. - * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/unwrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1197,7 +1214,7 @@ public interface KeyVaultClientBase { /** * Unwraps a symmetric key using the specified key that was initially used for wrapping that key. - * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/unwrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1210,7 +1227,8 @@ public interface KeyVaultClientBase { Observable> unwrapKeyWithServiceResponseAsync(String vaultBaseUrl, String keyName, String keyVersion, JsonWebKeyEncryptionAlgorithm algorithm, byte[] value); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1221,7 +1239,8 @@ public interface KeyVaultClientBase { PagedList getDeletedKeys(final String vaultBaseUrl); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -1231,7 +1250,8 @@ public interface KeyVaultClientBase { ServiceFuture> getDeletedKeysAsync(final String vaultBaseUrl, final ListOperationCallback serviceCallback); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1240,7 +1260,8 @@ public interface KeyVaultClientBase { Observable> getDeletedKeysAsync(final String vaultBaseUrl); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1248,7 +1269,8 @@ public interface KeyVaultClientBase { */ Observable>> getDeletedKeysWithServiceResponseAsync(final String vaultBaseUrl); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1260,7 +1282,8 @@ public interface KeyVaultClientBase { PagedList getDeletedKeys(final String vaultBaseUrl, final Integer maxresults); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1271,7 +1294,8 @@ public interface KeyVaultClientBase { ServiceFuture> getDeletedKeysAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1281,7 +1305,8 @@ public interface KeyVaultClientBase { Observable> getDeletedKeysAsync(final String vaultBaseUrl, final Integer maxresults); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1291,10 +1316,11 @@ public interface KeyVaultClientBase { Observable>> getDeletedKeysWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults); /** - * Retrieves the deleted key information plus its attributes. Authorization: Requires the keys/get permission. + * Gets the public part of a deleted key. + * The Get Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the key + * @param keyName The name of the key. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -1303,10 +1329,11 @@ public interface KeyVaultClientBase { DeletedKeyBundle getDeletedKey(String vaultBaseUrl, String keyName); /** - * Retrieves the deleted key information plus its attributes. Authorization: Requires the keys/get permission. + * Gets the public part of a deleted key. + * The Get Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the key + * @param keyName The name of the key. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -1314,27 +1341,30 @@ public interface KeyVaultClientBase { ServiceFuture getDeletedKeyAsync(String vaultBaseUrl, String keyName, final ServiceCallback serviceCallback); /** - * Retrieves the deleted key information plus its attributes. Authorization: Requires the keys/get permission. + * Gets the public part of a deleted key. + * The Get Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the key + * @param keyName The name of the key. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the DeletedKeyBundle object */ Observable getDeletedKeyAsync(String vaultBaseUrl, String keyName); /** - * Retrieves the deleted key information plus its attributes. Authorization: Requires the keys/get permission. + * Gets the public part of a deleted key. + * The Get Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the key + * @param keyName The name of the key. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the DeletedKeyBundle object */ Observable> getDeletedKeyWithServiceResponseAsync(String vaultBaseUrl, String keyName); /** - * Permanently deletes the specified key. aka purges the key. Authorization: Requires the keys/purge permission. + * Permanently deletes the specified key. + * The Purge Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key @@ -1345,7 +1375,8 @@ public interface KeyVaultClientBase { void purgeDeletedKey(String vaultBaseUrl, String keyName); /** - * Permanently deletes the specified key. aka purges the key. Authorization: Requires the keys/purge permission. + * Permanently deletes the specified key. + * The Purge Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key @@ -1356,7 +1387,8 @@ public interface KeyVaultClientBase { ServiceFuture purgeDeletedKeyAsync(String vaultBaseUrl, String keyName, final ServiceCallback serviceCallback); /** - * Permanently deletes the specified key. aka purges the key. Authorization: Requires the keys/purge permission. + * Permanently deletes the specified key. + * The Purge Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key @@ -1366,7 +1398,8 @@ public interface KeyVaultClientBase { Observable purgeDeletedKeyAsync(String vaultBaseUrl, String keyName); /** - * Permanently deletes the specified key. aka purges the key. Authorization: Requires the keys/purge permission. + * Permanently deletes the specified key. + * The Purge Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key @@ -1376,10 +1409,11 @@ public interface KeyVaultClientBase { Observable> purgeDeletedKeyWithServiceResponseAsync(String vaultBaseUrl, String keyName); /** - * Recovers the deleted key back to its current version under /keys. Authorization: Requires the keys/recover permission. + * Recovers the deleted key to its latest version. + * The Recover Deleted Key operation is applicable for deleted keys in soft-delete enabled vaults. It recovers the deleted key back to its latest version under /keys. An attempt to recover an non-deleted key will return an error. Consider this the inverse of the delete operation on soft-delete enabled vaults. This operation requires the keys/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the deleted key + * @param keyName The name of the deleted key. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -1388,10 +1422,11 @@ public interface KeyVaultClientBase { KeyBundle recoverDeletedKey(String vaultBaseUrl, String keyName); /** - * Recovers the deleted key back to its current version under /keys. Authorization: Requires the keys/recover permission. + * Recovers the deleted key to its latest version. + * The Recover Deleted Key operation is applicable for deleted keys in soft-delete enabled vaults. It recovers the deleted key back to its latest version under /keys. An attempt to recover an non-deleted key will return an error. Consider this the inverse of the delete operation on soft-delete enabled vaults. This operation requires the keys/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the deleted key + * @param keyName The name of the deleted key. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -1399,20 +1434,22 @@ public interface KeyVaultClientBase { ServiceFuture recoverDeletedKeyAsync(String vaultBaseUrl, String keyName, final ServiceCallback serviceCallback); /** - * Recovers the deleted key back to its current version under /keys. Authorization: Requires the keys/recover permission. + * Recovers the deleted key to its latest version. + * The Recover Deleted Key operation is applicable for deleted keys in soft-delete enabled vaults. It recovers the deleted key back to its latest version under /keys. An attempt to recover an non-deleted key will return an error. Consider this the inverse of the delete operation on soft-delete enabled vaults. This operation requires the keys/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the deleted key + * @param keyName The name of the deleted key. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the KeyBundle object */ Observable recoverDeletedKeyAsync(String vaultBaseUrl, String keyName); /** - * Recovers the deleted key back to its current version under /keys. Authorization: Requires the keys/recover permission. + * Recovers the deleted key to its latest version. + * The Recover Deleted Key operation is applicable for deleted keys in soft-delete enabled vaults. It recovers the deleted key back to its latest version under /keys. An attempt to recover an non-deleted key will return an error. Consider this the inverse of the delete operation on soft-delete enabled vaults. This operation requires the keys/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the deleted key + * @param keyName The name of the deleted key. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the KeyBundle object */ @@ -1420,7 +1457,7 @@ public interface KeyVaultClientBase { /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1434,7 +1471,7 @@ public interface KeyVaultClientBase { /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1447,7 +1484,7 @@ public interface KeyVaultClientBase { /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1459,7 +1496,7 @@ public interface KeyVaultClientBase { /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1470,7 +1507,7 @@ public interface KeyVaultClientBase { Observable> setSecretWithServiceResponseAsync(String vaultBaseUrl, String secretName, String value); /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1487,7 +1524,7 @@ public interface KeyVaultClientBase { /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1503,7 +1540,7 @@ public interface KeyVaultClientBase { /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1518,7 +1555,7 @@ public interface KeyVaultClientBase { /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1533,7 +1570,7 @@ public interface KeyVaultClientBase { /** * Deletes a secret from a specified key vault. - * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. + * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. This operation requires the secrets/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1546,7 +1583,7 @@ public interface KeyVaultClientBase { /** * Deletes a secret from a specified key vault. - * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. + * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. This operation requires the secrets/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1558,7 +1595,7 @@ public interface KeyVaultClientBase { /** * Deletes a secret from a specified key vault. - * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. + * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. This operation requires the secrets/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1569,7 +1606,7 @@ public interface KeyVaultClientBase { /** * Deletes a secret from a specified key vault. - * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. + * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. This operation requires the secrets/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1580,7 +1617,7 @@ public interface KeyVaultClientBase { /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1594,7 +1631,7 @@ public interface KeyVaultClientBase { /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1607,7 +1644,7 @@ public interface KeyVaultClientBase { /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1619,7 +1656,7 @@ public interface KeyVaultClientBase { /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1630,7 +1667,7 @@ public interface KeyVaultClientBase { Observable> updateSecretWithServiceResponseAsync(String vaultBaseUrl, String secretName, String secretVersion); /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1647,7 +1684,7 @@ public interface KeyVaultClientBase { /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1663,7 +1700,7 @@ public interface KeyVaultClientBase { /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1678,7 +1715,7 @@ public interface KeyVaultClientBase { /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1693,7 +1730,7 @@ public interface KeyVaultClientBase { /** * Get a specified secret from a given key vault. - * The GET operation is applicable to any secret stored in Azure Key Vault. + * The GET operation is applicable to any secret stored in Azure Key Vault. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1707,7 +1744,7 @@ public interface KeyVaultClientBase { /** * Get a specified secret from a given key vault. - * The GET operation is applicable to any secret stored in Azure Key Vault. + * The GET operation is applicable to any secret stored in Azure Key Vault. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1720,7 +1757,7 @@ public interface KeyVaultClientBase { /** * Get a specified secret from a given key vault. - * The GET operation is applicable to any secret stored in Azure Key Vault. + * The GET operation is applicable to any secret stored in Azure Key Vault. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1732,7 +1769,7 @@ public interface KeyVaultClientBase { /** * Get a specified secret from a given key vault. - * The GET operation is applicable to any secret stored in Azure Key Vault. + * The GET operation is applicable to any secret stored in Azure Key Vault. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1744,7 +1781,7 @@ public interface KeyVaultClientBase { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1756,7 +1793,7 @@ public interface KeyVaultClientBase { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -1767,7 +1804,7 @@ public interface KeyVaultClientBase { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1777,7 +1814,7 @@ public interface KeyVaultClientBase { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1786,10 +1823,10 @@ public interface KeyVaultClientBase { Observable>> getSecretsWithServiceResponseAsync(final String vaultBaseUrl); /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -1799,10 +1836,10 @@ public interface KeyVaultClientBase { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -1811,10 +1848,10 @@ public interface KeyVaultClientBase { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<SecretItem> object */ @@ -1822,18 +1859,18 @@ public interface KeyVaultClientBase { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<SecretItem> object */ Observable>> getSecretsWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1845,8 +1882,8 @@ public interface KeyVaultClientBase { PagedList getSecretVersions(final String vaultBaseUrl, final String secretName); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1857,8 +1894,8 @@ public interface KeyVaultClientBase { ServiceFuture> getSecretVersionsAsync(final String vaultBaseUrl, final String secretName, final ListOperationCallback serviceCallback); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1868,8 +1905,8 @@ public interface KeyVaultClientBase { Observable> getSecretVersionsAsync(final String vaultBaseUrl, final String secretName); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -1878,12 +1915,12 @@ public interface KeyVaultClientBase { */ Observable>> getSecretVersionsWithServiceResponseAsync(final String vaultBaseUrl, final String secretName); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -1892,12 +1929,12 @@ public interface KeyVaultClientBase { PagedList getSecretVersions(final String vaultBaseUrl, final String secretName, final Integer maxresults); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -1905,31 +1942,32 @@ public interface KeyVaultClientBase { ServiceFuture> getSecretVersionsAsync(final String vaultBaseUrl, final String secretName, final Integer maxresults, final ListOperationCallback serviceCallback); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<SecretItem> object */ Observable> getSecretVersionsAsync(final String vaultBaseUrl, final String secretName, final Integer maxresults); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<SecretItem> object */ Observable>> getSecretVersionsWithServiceResponseAsync(final String vaultBaseUrl, final String secretName, final Integer maxresults); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1940,7 +1978,8 @@ public interface KeyVaultClientBase { PagedList getDeletedSecrets(final String vaultBaseUrl); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -1950,7 +1989,8 @@ public interface KeyVaultClientBase { ServiceFuture> getDeletedSecretsAsync(final String vaultBaseUrl, final ListOperationCallback serviceCallback); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1959,7 +1999,8 @@ public interface KeyVaultClientBase { Observable> getDeletedSecretsAsync(final String vaultBaseUrl); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1967,7 +2008,8 @@ public interface KeyVaultClientBase { */ Observable>> getDeletedSecretsWithServiceResponseAsync(final String vaultBaseUrl); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1979,7 +2021,8 @@ public interface KeyVaultClientBase { PagedList getDeletedSecrets(final String vaultBaseUrl, final Integer maxresults); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1990,7 +2033,8 @@ public interface KeyVaultClientBase { ServiceFuture> getDeletedSecretsAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -2000,7 +2044,8 @@ public interface KeyVaultClientBase { Observable> getDeletedSecretsAsync(final String vaultBaseUrl, final Integer maxresults); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -2010,10 +2055,11 @@ public interface KeyVaultClientBase { Observable>> getDeletedSecretsWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults); /** - * Retrieves the deleted secret information plus its attributes. Authorization: requires the secrets/get permission. + * Gets the specified deleted secret. + * The Get Deleted Secret operation returns the specified deleted secret along with its attributes. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -2022,10 +2068,11 @@ public interface KeyVaultClientBase { DeletedSecretBundle getDeletedSecret(String vaultBaseUrl, String secretName); /** - * Retrieves the deleted secret information plus its attributes. Authorization: requires the secrets/get permission. + * Gets the specified deleted secret. + * The Get Deleted Secret operation returns the specified deleted secret along with its attributes. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -2033,30 +2080,33 @@ public interface KeyVaultClientBase { ServiceFuture getDeletedSecretAsync(String vaultBaseUrl, String secretName, final ServiceCallback serviceCallback); /** - * Retrieves the deleted secret information plus its attributes. Authorization: requires the secrets/get permission. + * Gets the specified deleted secret. + * The Get Deleted Secret operation returns the specified deleted secret along with its attributes. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the DeletedSecretBundle object */ Observable getDeletedSecretAsync(String vaultBaseUrl, String secretName); /** - * Retrieves the deleted secret information plus its attributes. Authorization: requires the secrets/get permission. + * Gets the specified deleted secret. + * The Get Deleted Secret operation returns the specified deleted secret along with its attributes. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the DeletedSecretBundle object */ Observable> getDeletedSecretWithServiceResponseAsync(String vaultBaseUrl, String secretName); /** - * Permanently deletes the specified secret. aka purges the secret. Authorization: requires the secrets/purge permission. + * Permanently deletes the specified secret. + * The purge deleted secret operation removes the secret permanently, without the possibility of recovery. This operation can only be enabled on a soft-delete enabled vault. This operation requires the secrets/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -2064,10 +2114,11 @@ public interface KeyVaultClientBase { void purgeDeletedSecret(String vaultBaseUrl, String secretName); /** - * Permanently deletes the specified secret. aka purges the secret. Authorization: requires the secrets/purge permission. + * Permanently deletes the specified secret. + * The purge deleted secret operation removes the secret permanently, without the possibility of recovery. This operation can only be enabled on a soft-delete enabled vault. This operation requires the secrets/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -2075,30 +2126,33 @@ public interface KeyVaultClientBase { ServiceFuture purgeDeletedSecretAsync(String vaultBaseUrl, String secretName, final ServiceCallback serviceCallback); /** - * Permanently deletes the specified secret. aka purges the secret. Authorization: requires the secrets/purge permission. + * Permanently deletes the specified secret. + * The purge deleted secret operation removes the secret permanently, without the possibility of recovery. This operation can only be enabled on a soft-delete enabled vault. This operation requires the secrets/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceResponse} object if successful. */ Observable purgeDeletedSecretAsync(String vaultBaseUrl, String secretName); /** - * Permanently deletes the specified secret. aka purges the secret. Authorization: requires the secrets/purge permission. + * Permanently deletes the specified secret. + * The purge deleted secret operation removes the secret permanently, without the possibility of recovery. This operation can only be enabled on a soft-delete enabled vault. This operation requires the secrets/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceResponse} object if successful. */ Observable> purgeDeletedSecretWithServiceResponseAsync(String vaultBaseUrl, String secretName); /** - * Recovers the deleted secret back to its current version under /secrets. Authorization: requires the secrets/recover permission. + * Recovers the deleted secret to the latest version. + * Recovers the deleted secret in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the secrets/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret + * @param secretName The name of the deleted secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -2107,10 +2161,11 @@ public interface KeyVaultClientBase { SecretBundle recoverDeletedSecret(String vaultBaseUrl, String secretName); /** - * Recovers the deleted secret back to its current version under /secrets. Authorization: requires the secrets/recover permission. + * Recovers the deleted secret to the latest version. + * Recovers the deleted secret in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the secrets/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret + * @param secretName The name of the deleted secret. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -2118,27 +2173,30 @@ public interface KeyVaultClientBase { ServiceFuture recoverDeletedSecretAsync(String vaultBaseUrl, String secretName, final ServiceCallback serviceCallback); /** - * Recovers the deleted secret back to its current version under /secrets. Authorization: requires the secrets/recover permission. + * Recovers the deleted secret to the latest version. + * Recovers the deleted secret in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the secrets/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret + * @param secretName The name of the deleted secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the SecretBundle object */ Observable recoverDeletedSecretAsync(String vaultBaseUrl, String secretName); /** - * Recovers the deleted secret back to its current version under /secrets. Authorization: requires the secrets/recover permission. + * Recovers the deleted secret to the latest version. + * Recovers the deleted secret in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the secrets/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret + * @param secretName The name of the deleted secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the SecretBundle object */ Observable> recoverDeletedSecretWithServiceResponseAsync(String vaultBaseUrl, String secretName); /** - * Requests that a backup of the specified secret be downloaded to the client. Authorization: requires the secrets/backup permission. + * Backs up the specified secret. + * Requests that a backup of the specified secret be downloaded to the client. All versions of the secret will be downloaded. This operation requires the secrets/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -2150,7 +2208,8 @@ public interface KeyVaultClientBase { BackupSecretResult backupSecret(String vaultBaseUrl, String secretName); /** - * Requests that a backup of the specified secret be downloaded to the client. Authorization: requires the secrets/backup permission. + * Backs up the specified secret. + * Requests that a backup of the specified secret be downloaded to the client. All versions of the secret will be downloaded. This operation requires the secrets/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -2161,7 +2220,8 @@ public interface KeyVaultClientBase { ServiceFuture backupSecretAsync(String vaultBaseUrl, String secretName, final ServiceCallback serviceCallback); /** - * Requests that a backup of the specified secret be downloaded to the client. Authorization: requires the secrets/backup permission. + * Backs up the specified secret. + * Requests that a backup of the specified secret be downloaded to the client. All versions of the secret will be downloaded. This operation requires the secrets/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -2171,7 +2231,8 @@ public interface KeyVaultClientBase { Observable backupSecretAsync(String vaultBaseUrl, String secretName); /** - * Requests that a backup of the specified secret be downloaded to the client. Authorization: requires the secrets/backup permission. + * Backs up the specified secret. + * Requests that a backup of the specified secret be downloaded to the client. All versions of the secret will be downloaded. This operation requires the secrets/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -2181,7 +2242,8 @@ public interface KeyVaultClientBase { Observable> backupSecretWithServiceResponseAsync(String vaultBaseUrl, String secretName); /** - * Restores a backed up secret to a vault. Authorization: requires the secrets/restore permission. + * Restores a backed up secret to a vault. + * Restores a backed up secret, and all its versions, to a vault. This operation requires the secrets/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretBundleBackup The backup blob associated with a secret bundle. @@ -2193,7 +2255,8 @@ public interface KeyVaultClientBase { SecretBundle restoreSecret(String vaultBaseUrl, byte[] secretBundleBackup); /** - * Restores a backed up secret to a vault. Authorization: requires the secrets/restore permission. + * Restores a backed up secret to a vault. + * Restores a backed up secret, and all its versions, to a vault. This operation requires the secrets/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretBundleBackup The backup blob associated with a secret bundle. @@ -2204,7 +2267,8 @@ public interface KeyVaultClientBase { ServiceFuture restoreSecretAsync(String vaultBaseUrl, byte[] secretBundleBackup, final ServiceCallback serviceCallback); /** - * Restores a backed up secret to a vault. Authorization: requires the secrets/restore permission. + * Restores a backed up secret to a vault. + * Restores a backed up secret, and all its versions, to a vault. This operation requires the secrets/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretBundleBackup The backup blob associated with a secret bundle. @@ -2214,7 +2278,8 @@ public interface KeyVaultClientBase { Observable restoreSecretAsync(String vaultBaseUrl, byte[] secretBundleBackup); /** - * Restores a backed up secret to a vault. Authorization: requires the secrets/restore permission. + * Restores a backed up secret to a vault. + * Restores a backed up secret, and all its versions, to a vault. This operation requires the secrets/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretBundleBackup The backup blob associated with a secret bundle. @@ -2225,7 +2290,7 @@ public interface KeyVaultClientBase { /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2237,7 +2302,7 @@ public interface KeyVaultClientBase { /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -2248,7 +2313,7 @@ public interface KeyVaultClientBase { /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2258,7 +2323,7 @@ public interface KeyVaultClientBase { /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2267,54 +2332,58 @@ public interface KeyVaultClientBase { Observable>> getCertificatesWithServiceResponseAsync(final String vaultBaseUrl); /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent * @return the PagedList<CertificateItem> object if successful. */ - PagedList getCertificates(final String vaultBaseUrl, final Integer maxresults); + PagedList getCertificates(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending); /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback); + ServiceFuture> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending, final ListOperationCallback serviceCallback); /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<CertificateItem> object */ - Observable> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults); + Observable> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending); /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<CertificateItem> object */ - Observable>> getCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults); + Observable>> getCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending); /** * Deletes a certificate from a specified key vault. - * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. + * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. This operation requires the certificates/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2327,7 +2396,7 @@ public interface KeyVaultClientBase { /** * Deletes a certificate from a specified key vault. - * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. + * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. This operation requires the certificates/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2339,7 +2408,7 @@ public interface KeyVaultClientBase { /** * Deletes a certificate from a specified key vault. - * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. + * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. This operation requires the certificates/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2350,7 +2419,7 @@ public interface KeyVaultClientBase { /** * Deletes a certificate from a specified key vault. - * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. + * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. This operation requires the certificates/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2361,7 +2430,7 @@ public interface KeyVaultClientBase { /** * Sets the certificate contacts for the specified key vault. - * Sets the certificate contacts for the specified key vault. Authorization: requires the certificates/managecontacts permission. + * Sets the certificate contacts for the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param contacts The contacts for the key vault certificate. @@ -2374,7 +2443,7 @@ public interface KeyVaultClientBase { /** * Sets the certificate contacts for the specified key vault. - * Sets the certificate contacts for the specified key vault. Authorization: requires the certificates/managecontacts permission. + * Sets the certificate contacts for the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param contacts The contacts for the key vault certificate. @@ -2386,7 +2455,7 @@ public interface KeyVaultClientBase { /** * Sets the certificate contacts for the specified key vault. - * Sets the certificate contacts for the specified key vault. Authorization: requires the certificates/managecontacts permission. + * Sets the certificate contacts for the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param contacts The contacts for the key vault certificate. @@ -2397,7 +2466,7 @@ public interface KeyVaultClientBase { /** * Sets the certificate contacts for the specified key vault. - * Sets the certificate contacts for the specified key vault. Authorization: requires the certificates/managecontacts permission. + * Sets the certificate contacts for the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param contacts The contacts for the key vault certificate. @@ -2408,7 +2477,7 @@ public interface KeyVaultClientBase { /** * Lists the certificate contacts for a specified key vault. - * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. + * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2420,7 +2489,7 @@ public interface KeyVaultClientBase { /** * Lists the certificate contacts for a specified key vault. - * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. + * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -2431,7 +2500,7 @@ public interface KeyVaultClientBase { /** * Lists the certificate contacts for a specified key vault. - * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. + * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2441,7 +2510,7 @@ public interface KeyVaultClientBase { /** * Lists the certificate contacts for a specified key vault. - * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. + * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2451,7 +2520,7 @@ public interface KeyVaultClientBase { /** * Deletes the certificate contacts for a specified key vault. - * Deletes the certificate contacts for a specified key vault certificate. Authorization: requires the certificates/managecontacts permission. + * Deletes the certificate contacts for a specified key vault certificate. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2463,7 +2532,7 @@ public interface KeyVaultClientBase { /** * Deletes the certificate contacts for a specified key vault. - * Deletes the certificate contacts for a specified key vault certificate. Authorization: requires the certificates/managecontacts permission. + * Deletes the certificate contacts for a specified key vault certificate. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -2474,7 +2543,7 @@ public interface KeyVaultClientBase { /** * Deletes the certificate contacts for a specified key vault. - * Deletes the certificate contacts for a specified key vault certificate. Authorization: requires the certificates/managecontacts permission. + * Deletes the certificate contacts for a specified key vault certificate. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2484,7 +2553,7 @@ public interface KeyVaultClientBase { /** * Deletes the certificate contacts for a specified key vault. - * Deletes the certificate contacts for a specified key vault certificate. Authorization: requires the certificates/managecontacts permission. + * Deletes the certificate contacts for a specified key vault certificate. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2494,7 +2563,7 @@ public interface KeyVaultClientBase { /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2506,7 +2575,7 @@ public interface KeyVaultClientBase { /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -2517,7 +2586,7 @@ public interface KeyVaultClientBase { /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2527,7 +2596,7 @@ public interface KeyVaultClientBase { /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2536,7 +2605,7 @@ public interface KeyVaultClientBase { Observable>> getCertificateIssuersWithServiceResponseAsync(final String vaultBaseUrl); /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -2549,7 +2618,7 @@ public interface KeyVaultClientBase { /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -2561,7 +2630,7 @@ public interface KeyVaultClientBase { /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -2572,7 +2641,7 @@ public interface KeyVaultClientBase { /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -2583,7 +2652,7 @@ public interface KeyVaultClientBase { /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2597,7 +2666,7 @@ public interface KeyVaultClientBase { /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2610,7 +2679,7 @@ public interface KeyVaultClientBase { /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2622,7 +2691,7 @@ public interface KeyVaultClientBase { /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2633,7 +2702,7 @@ public interface KeyVaultClientBase { Observable> setCertificateIssuerWithServiceResponseAsync(String vaultBaseUrl, String issuerName, String provider); /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2650,7 +2719,7 @@ public interface KeyVaultClientBase { /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2666,7 +2735,7 @@ public interface KeyVaultClientBase { /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2681,7 +2750,7 @@ public interface KeyVaultClientBase { /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2696,7 +2765,7 @@ public interface KeyVaultClientBase { /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2709,7 +2778,7 @@ public interface KeyVaultClientBase { /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2721,7 +2790,7 @@ public interface KeyVaultClientBase { /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2732,7 +2801,7 @@ public interface KeyVaultClientBase { /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2742,7 +2811,7 @@ public interface KeyVaultClientBase { Observable> updateCertificateIssuerWithServiceResponseAsync(String vaultBaseUrl, String issuerName); /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2759,7 +2828,7 @@ public interface KeyVaultClientBase { /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2775,7 +2844,7 @@ public interface KeyVaultClientBase { /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2790,7 +2859,7 @@ public interface KeyVaultClientBase { /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2805,7 +2874,7 @@ public interface KeyVaultClientBase { /** * Lists the specified certificate issuer. - * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. + * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2818,7 +2887,7 @@ public interface KeyVaultClientBase { /** * Lists the specified certificate issuer. - * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. + * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2830,7 +2899,7 @@ public interface KeyVaultClientBase { /** * Lists the specified certificate issuer. - * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. + * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2841,7 +2910,7 @@ public interface KeyVaultClientBase { /** * Lists the specified certificate issuer. - * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. + * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2852,7 +2921,7 @@ public interface KeyVaultClientBase { /** * Deletes the specified certificate issuer. - * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. + * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. This operation requires the certificates/manageissuers/deleteissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2865,7 +2934,7 @@ public interface KeyVaultClientBase { /** * Deletes the specified certificate issuer. - * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. + * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. This operation requires the certificates/manageissuers/deleteissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2877,7 +2946,7 @@ public interface KeyVaultClientBase { /** * Deletes the specified certificate issuer. - * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. + * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. This operation requires the certificates/manageissuers/deleteissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2888,7 +2957,7 @@ public interface KeyVaultClientBase { /** * Deletes the specified certificate issuer. - * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. + * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. This operation requires the certificates/manageissuers/deleteissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -2899,7 +2968,7 @@ public interface KeyVaultClientBase { /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2912,7 +2981,7 @@ public interface KeyVaultClientBase { /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2924,7 +2993,7 @@ public interface KeyVaultClientBase { /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2935,7 +3004,7 @@ public interface KeyVaultClientBase { /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2945,7 +3014,7 @@ public interface KeyVaultClientBase { Observable> createCertificateWithServiceResponseAsync(String vaultBaseUrl, String certificateName); /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2961,7 +3030,7 @@ public interface KeyVaultClientBase { /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2976,7 +3045,7 @@ public interface KeyVaultClientBase { /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -2990,7 +3059,7 @@ public interface KeyVaultClientBase { /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3004,7 +3073,7 @@ public interface KeyVaultClientBase { /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3018,7 +3087,7 @@ public interface KeyVaultClientBase { /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3031,7 +3100,7 @@ public interface KeyVaultClientBase { /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3043,7 +3112,7 @@ public interface KeyVaultClientBase { /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3054,7 +3123,7 @@ public interface KeyVaultClientBase { Observable> importCertificateWithServiceResponseAsync(String vaultBaseUrl, String certificateName, String base64EncodedCertificate); /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3072,7 +3141,7 @@ public interface KeyVaultClientBase { /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3089,7 +3158,7 @@ public interface KeyVaultClientBase { /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3105,7 +3174,7 @@ public interface KeyVaultClientBase { /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3121,7 +3190,7 @@ public interface KeyVaultClientBase { /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3134,7 +3203,7 @@ public interface KeyVaultClientBase { /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3146,7 +3215,7 @@ public interface KeyVaultClientBase { /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3157,7 +3226,7 @@ public interface KeyVaultClientBase { /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3167,7 +3236,7 @@ public interface KeyVaultClientBase { Observable>> getCertificateVersionsWithServiceResponseAsync(final String vaultBaseUrl, final String certificateName); /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3181,7 +3250,7 @@ public interface KeyVaultClientBase { /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3194,7 +3263,7 @@ public interface KeyVaultClientBase { /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3206,7 +3275,7 @@ public interface KeyVaultClientBase { /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3218,7 +3287,7 @@ public interface KeyVaultClientBase { /** * Lists the policy for a certificate. - * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. + * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in a given key vault. @@ -3231,7 +3300,7 @@ public interface KeyVaultClientBase { /** * Lists the policy for a certificate. - * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. + * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in a given key vault. @@ -3243,7 +3312,7 @@ public interface KeyVaultClientBase { /** * Lists the policy for a certificate. - * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. + * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in a given key vault. @@ -3254,7 +3323,7 @@ public interface KeyVaultClientBase { /** * Lists the policy for a certificate. - * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. + * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in a given key vault. @@ -3265,7 +3334,7 @@ public interface KeyVaultClientBase { /** * Updates the policy for a certificate. - * Set specified members in the certificate policy. Leave others as null. + * Set specified members in the certificate policy. Leave others as null. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -3279,7 +3348,7 @@ public interface KeyVaultClientBase { /** * Updates the policy for a certificate. - * Set specified members in the certificate policy. Leave others as null. + * Set specified members in the certificate policy. Leave others as null. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -3292,7 +3361,7 @@ public interface KeyVaultClientBase { /** * Updates the policy for a certificate. - * Set specified members in the certificate policy. Leave others as null. + * Set specified members in the certificate policy. Leave others as null. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -3304,7 +3373,7 @@ public interface KeyVaultClientBase { /** * Updates the policy for a certificate. - * Set specified members in the certificate policy. Leave others as null. + * Set specified members in the certificate policy. Leave others as null. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -3316,7 +3385,7 @@ public interface KeyVaultClientBase { /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -3330,7 +3399,7 @@ public interface KeyVaultClientBase { /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -3343,7 +3412,7 @@ public interface KeyVaultClientBase { /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -3355,7 +3424,7 @@ public interface KeyVaultClientBase { /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -3366,7 +3435,7 @@ public interface KeyVaultClientBase { Observable> updateCertificateWithServiceResponseAsync(String vaultBaseUrl, String certificateName, String certificateVersion); /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -3383,7 +3452,7 @@ public interface KeyVaultClientBase { /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -3399,7 +3468,7 @@ public interface KeyVaultClientBase { /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -3414,7 +3483,7 @@ public interface KeyVaultClientBase { /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -3428,7 +3497,8 @@ public interface KeyVaultClientBase { Observable> updateCertificateWithServiceResponseAsync(String vaultBaseUrl, String certificateName, String certificateVersion, CertificatePolicy certificatePolicy, CertificateAttributes certificateAttributes, Map tags); /** - * Gets information about a specified certificate. Authorization: requires the certificates/get permission. + * Gets information about a certificate. + * Gets information about a specific certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -3441,7 +3511,8 @@ public interface KeyVaultClientBase { CertificateBundle getCertificate(String vaultBaseUrl, String certificateName, String certificateVersion); /** - * Gets information about a specified certificate. Authorization: requires the certificates/get permission. + * Gets information about a certificate. + * Gets information about a specific certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -3453,7 +3524,8 @@ public interface KeyVaultClientBase { ServiceFuture getCertificateAsync(String vaultBaseUrl, String certificateName, String certificateVersion, final ServiceCallback serviceCallback); /** - * Gets information about a specified certificate. Authorization: requires the certificates/get permission. + * Gets information about a certificate. + * Gets information about a specific certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -3464,7 +3536,8 @@ public interface KeyVaultClientBase { Observable getCertificateAsync(String vaultBaseUrl, String certificateName, String certificateVersion); /** - * Gets information about a specified certificate. Authorization: requires the certificates/get permission. + * Gets information about a certificate. + * Gets information about a specific certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -3475,7 +3548,8 @@ public interface KeyVaultClientBase { Observable> getCertificateWithServiceResponseAsync(String vaultBaseUrl, String certificateName, String certificateVersion); /** - * Updates a certificate operation. Authorization: requires the certificates/update permission. + * Updates a certificate operation. + * Updates a certificate creation operation that is already in progress. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3488,7 +3562,8 @@ public interface KeyVaultClientBase { CertificateOperation updateCertificateOperation(String vaultBaseUrl, String certificateName, boolean cancellationRequested); /** - * Updates a certificate operation. Authorization: requires the certificates/update permission. + * Updates a certificate operation. + * Updates a certificate creation operation that is already in progress. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3500,7 +3575,8 @@ public interface KeyVaultClientBase { ServiceFuture updateCertificateOperationAsync(String vaultBaseUrl, String certificateName, boolean cancellationRequested, final ServiceCallback serviceCallback); /** - * Updates a certificate operation. Authorization: requires the certificates/update permission. + * Updates a certificate operation. + * Updates a certificate creation operation that is already in progress. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3511,7 +3587,8 @@ public interface KeyVaultClientBase { Observable updateCertificateOperationAsync(String vaultBaseUrl, String certificateName, boolean cancellationRequested); /** - * Updates a certificate operation. Authorization: requires the certificates/update permission. + * Updates a certificate operation. + * Updates a certificate creation operation that is already in progress. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3522,7 +3599,8 @@ public interface KeyVaultClientBase { Observable> updateCertificateOperationWithServiceResponseAsync(String vaultBaseUrl, String certificateName, boolean cancellationRequested); /** - * Gets the operation associated with a specified certificate. Authorization: requires the certificates/get permission. + * Gets the creation operation of a certificate. + * Gets the creation operation associated with a specified certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3534,7 +3612,8 @@ public interface KeyVaultClientBase { CertificateOperation getCertificateOperation(String vaultBaseUrl, String certificateName); /** - * Gets the operation associated with a specified certificate. Authorization: requires the certificates/get permission. + * Gets the creation operation of a certificate. + * Gets the creation operation associated with a specified certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3545,7 +3624,8 @@ public interface KeyVaultClientBase { ServiceFuture getCertificateOperationAsync(String vaultBaseUrl, String certificateName, final ServiceCallback serviceCallback); /** - * Gets the operation associated with a specified certificate. Authorization: requires the certificates/get permission. + * Gets the creation operation of a certificate. + * Gets the creation operation associated with a specified certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3555,7 +3635,8 @@ public interface KeyVaultClientBase { Observable getCertificateOperationAsync(String vaultBaseUrl, String certificateName); /** - * Gets the operation associated with a specified certificate. Authorization: requires the certificates/get permission. + * Gets the creation operation of a certificate. + * Gets the creation operation associated with a specified certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3565,7 +3646,8 @@ public interface KeyVaultClientBase { Observable> getCertificateOperationWithServiceResponseAsync(String vaultBaseUrl, String certificateName); /** - * Deletes the operation for a specified certificate. Authorization: requires the certificates/update permission. + * Deletes the creation operation for a specific certificate. + * Deletes the creation operation for a specified certificate that is in the process of being created. The certificate is no longer created. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3577,7 +3659,8 @@ public interface KeyVaultClientBase { CertificateOperation deleteCertificateOperation(String vaultBaseUrl, String certificateName); /** - * Deletes the operation for a specified certificate. Authorization: requires the certificates/update permission. + * Deletes the creation operation for a specific certificate. + * Deletes the creation operation for a specified certificate that is in the process of being created. The certificate is no longer created. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3588,7 +3671,8 @@ public interface KeyVaultClientBase { ServiceFuture deleteCertificateOperationAsync(String vaultBaseUrl, String certificateName, final ServiceCallback serviceCallback); /** - * Deletes the operation for a specified certificate. Authorization: requires the certificates/update permission. + * Deletes the creation operation for a specific certificate. + * Deletes the creation operation for a specified certificate that is in the process of being created. The certificate is no longer created. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3598,7 +3682,8 @@ public interface KeyVaultClientBase { Observable deleteCertificateOperationAsync(String vaultBaseUrl, String certificateName); /** - * Deletes the operation for a specified certificate. Authorization: requires the certificates/update permission. + * Deletes the creation operation for a specific certificate. + * Deletes the creation operation for a specified certificate that is in the process of being created. The certificate is no longer created. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3609,7 +3694,7 @@ public interface KeyVaultClientBase { /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3623,7 +3708,7 @@ public interface KeyVaultClientBase { /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3636,7 +3721,7 @@ public interface KeyVaultClientBase { /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3648,7 +3733,7 @@ public interface KeyVaultClientBase { /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3659,7 +3744,7 @@ public interface KeyVaultClientBase { Observable> mergeCertificateWithServiceResponseAsync(String vaultBaseUrl, String certificateName, List x509Certificates); /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3675,7 +3760,7 @@ public interface KeyVaultClientBase { /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3690,7 +3775,7 @@ public interface KeyVaultClientBase { /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3704,7 +3789,7 @@ public interface KeyVaultClientBase { /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -3717,8 +3802,8 @@ public interface KeyVaultClientBase { Observable> mergeCertificateWithServiceResponseAsync(String vaultBaseUrl, String certificateName, List x509Certificates, CertificateAttributes certificateAttributes, Map tags); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -3729,8 +3814,8 @@ public interface KeyVaultClientBase { PagedList getDeletedCertificates(final String vaultBaseUrl); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -3740,8 +3825,8 @@ public interface KeyVaultClientBase { ServiceFuture> getDeletedCertificatesAsync(final String vaultBaseUrl, final ListOperationCallback serviceCallback); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -3750,8 +3835,8 @@ public interface KeyVaultClientBase { Observable> getDeletedCertificatesAsync(final String vaultBaseUrl); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -3759,55 +3844,59 @@ public interface KeyVaultClientBase { */ Observable>> getDeletedCertificatesWithServiceResponseAsync(final String vaultBaseUrl); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent * @return the PagedList<DeletedCertificateItem> object if successful. */ - PagedList getDeletedCertificates(final String vaultBaseUrl, final Integer maxresults); + PagedList getDeletedCertificates(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback); + ServiceFuture> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending, final ListOperationCallback serviceCallback); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<DeletedCertificateItem> object */ - Observable> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults); + Observable> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<DeletedCertificateItem> object */ - Observable>> getDeletedCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults); + Observable>> getDeletedCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending); /** * Retrieves information about the specified deleted certificate. - * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. + * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -3820,7 +3909,7 @@ public interface KeyVaultClientBase { /** * Retrieves information about the specified deleted certificate. - * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. + * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -3832,7 +3921,7 @@ public interface KeyVaultClientBase { /** * Retrieves information about the specified deleted certificate. - * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. + * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -3843,7 +3932,7 @@ public interface KeyVaultClientBase { /** * Retrieves information about the specified deleted certificate. - * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. + * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -3854,7 +3943,7 @@ public interface KeyVaultClientBase { /** * Permanently deletes the specified deleted certificate. - * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. Requires the explicit granting of the 'purge' permission. + * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. This operation requires the certificate/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -3866,7 +3955,7 @@ public interface KeyVaultClientBase { /** * Permanently deletes the specified deleted certificate. - * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. Requires the explicit granting of the 'purge' permission. + * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. This operation requires the certificate/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -3878,7 +3967,7 @@ public interface KeyVaultClientBase { /** * Permanently deletes the specified deleted certificate. - * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. Requires the explicit granting of the 'purge' permission. + * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. This operation requires the certificate/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -3889,7 +3978,7 @@ public interface KeyVaultClientBase { /** * Permanently deletes the specified deleted certificate. - * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. Requires the explicit granting of the 'purge' permission. + * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. This operation requires the certificate/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -3900,7 +3989,7 @@ public interface KeyVaultClientBase { /** * Recovers the deleted certificate back to its current version under /certificates. - * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). + * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). This operation requires the certificates/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the deleted certificate @@ -3913,7 +4002,7 @@ public interface KeyVaultClientBase { /** * Recovers the deleted certificate back to its current version under /certificates. - * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). + * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). This operation requires the certificates/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the deleted certificate @@ -3925,7 +4014,7 @@ public interface KeyVaultClientBase { /** * Recovers the deleted certificate back to its current version under /certificates. - * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). + * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). This operation requires the certificates/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the deleted certificate @@ -3936,7 +4025,7 @@ public interface KeyVaultClientBase { /** * Recovers the deleted certificate back to its current version under /certificates. - * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). + * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). This operation requires the certificates/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the deleted certificate @@ -3946,435 +4035,1994 @@ public interface KeyVaultClientBase { Observable> recoverDeletedCertificateWithServiceResponseAsync(String vaultBaseUrl, String certificateName); /** - * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<KeyItem> object if successful. + * @return the PagedList<StorageAccountItem> object if successful. */ - PagedList getKeyVersionsNext(final String nextPageLink); + PagedList getStorageAccounts(final String vaultBaseUrl); /** - * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getKeyVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture> getStorageAccountsAsync(final String vaultBaseUrl, final ListOperationCallback serviceCallback); /** - * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<KeyItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - Observable> getKeyVersionsNextAsync(final String nextPageLink); + Observable> getStorageAccountsAsync(final String vaultBaseUrl); /** - * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<KeyItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - Observable>> getKeyVersionsNextWithServiceResponseAsync(final String nextPageLink); - + Observable>> getStorageAccountsWithServiceResponseAsync(final String vaultBaseUrl); /** - * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<KeyItem> object if successful. + * @return the PagedList<StorageAccountItem> object if successful. */ - PagedList getKeysNext(final String nextPageLink); + PagedList getStorageAccounts(final String vaultBaseUrl, final Integer maxresults); /** - * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getKeysNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture> getStorageAccountsAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback); /** - * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<KeyItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - Observable> getKeysNextAsync(final String nextPageLink); + Observable> getStorageAccountsAsync(final String vaultBaseUrl, final Integer maxresults); /** - * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<KeyItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - Observable>> getKeysNextWithServiceResponseAsync(final String nextPageLink); + Observable>> getStorageAccountsWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<DeletedKeyItem> object if successful. + * @return the PagedList<DeletedStorageAccountItem> object if successful. */ - PagedList getDeletedKeysNext(final String nextPageLink); + PagedList getDeletedStorageAccounts(final String vaultBaseUrl); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getDeletedKeysNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture> getDeletedStorageAccountsAsync(final String vaultBaseUrl, final ListOperationCallback serviceCallback); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedKeyItem> object + * @return the observable to the PagedList<DeletedStorageAccountItem> object */ - Observable> getDeletedKeysNextAsync(final String nextPageLink); + Observable> getDeletedStorageAccountsAsync(final String vaultBaseUrl); /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedKeyItem> object + * @return the observable to the PagedList<DeletedStorageAccountItem> object */ - Observable>> getDeletedKeysNextWithServiceResponseAsync(final String nextPageLink); + Observable>> getDeletedStorageAccountsWithServiceResponseAsync(final String vaultBaseUrl); + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedStorageAccountItem> object if successful. + */ + PagedList getDeletedStorageAccounts(final String vaultBaseUrl, final Integer maxresults); /** - * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getDeletedStorageAccountsAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback); + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedStorageAccountItem> object + */ + Observable> getDeletedStorageAccountsAsync(final String vaultBaseUrl, final Integer maxresults); + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedStorageAccountItem> object + */ + Observable>> getDeletedStorageAccountsWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults); + + /** + * Gets the specified deleted storage account. + * The Get Deleted Storage Account operation returns the specified deleted storage account along with its attributes. This operation requires the storage/get permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<SecretItem> object if successful. + * @return the DeletedStorageBundle object if successful. */ - PagedList getSecretsNext(final String nextPageLink); + DeletedStorageBundle getDeletedStorageAccount(String vaultBaseUrl, String storageAccountName); /** - * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * Gets the specified deleted storage account. + * The Get Deleted Storage Account operation returns the specified deleted storage account along with its attributes. This operation requires the storage/get permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getSecretsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture getDeletedStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback); /** - * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * Gets the specified deleted storage account. + * The Get Deleted Storage Account operation returns the specified deleted storage account along with its attributes. This operation requires the storage/get permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<SecretItem> object + * @return the observable to the DeletedStorageBundle object */ - Observable> getSecretsNextAsync(final String nextPageLink); + Observable getDeletedStorageAccountAsync(String vaultBaseUrl, String storageAccountName); /** - * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * Gets the specified deleted storage account. + * The Get Deleted Storage Account operation returns the specified deleted storage account along with its attributes. This operation requires the storage/get permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<SecretItem> object + * @return the observable to the DeletedStorageBundle object */ - Observable>> getSecretsNextWithServiceResponseAsync(final String nextPageLink); + Observable> getDeletedStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * Permanently deletes the specified storage account. + * The purge deleted storage account operation removes the secret permanently, without the possibility of recovery. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/purge permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<SecretItem> object if successful. */ - PagedList getSecretVersionsNext(final String nextPageLink); + void purgeDeletedStorgeAccount(String vaultBaseUrl, String storageAccountName); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * Permanently deletes the specified storage account. + * The purge deleted storage account operation removes the secret permanently, without the possibility of recovery. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/purge permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getSecretVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture purgeDeletedStorgeAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * Permanently deletes the specified storage account. + * The purge deleted storage account operation removes the secret permanently, without the possibility of recovery. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/purge permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<SecretItem> object + * @return the {@link ServiceResponse} object if successful. */ - Observable> getSecretVersionsNextAsync(final String nextPageLink); + Observable purgeDeletedStorgeAccountAsync(String vaultBaseUrl, String storageAccountName); /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * Permanently deletes the specified storage account. + * The purge deleted storage account operation removes the secret permanently, without the possibility of recovery. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/purge permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<SecretItem> object + * @return the {@link ServiceResponse} object if successful. */ - Observable>> getSecretVersionsNextWithServiceResponseAsync(final String nextPageLink); + Observable> purgeDeletedStorgeAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Recovers the deleted storage account. + * Recovers the deleted storage account in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<DeletedSecretItem> object if successful. + * @return the StorageBundle object if successful. */ - PagedList getDeletedSecretsNext(final String nextPageLink); + StorageBundle recoverDeletedStorageAccount(String vaultBaseUrl, String storageAccountName); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Recovers the deleted storage account. + * Recovers the deleted storage account in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getDeletedSecretsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture recoverDeletedStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Recovers the deleted storage account. + * Recovers the deleted storage account in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedSecretItem> object + * @return the observable to the StorageBundle object */ - Observable> getDeletedSecretsNextAsync(final String nextPageLink); + Observable recoverDeletedStorageAccountAsync(String vaultBaseUrl, String storageAccountName); /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Recovers the deleted storage account. + * Recovers the deleted storage account in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedSecretItem> object + * @return the observable to the StorageBundle object */ - Observable>> getDeletedSecretsNextWithServiceResponseAsync(final String nextPageLink); + Observable> recoverDeletedStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName); /** - * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * Backs up the specified storage account. + * Requests that a backup of the specified storage account be downloaded to the client. This operation requires the storage/backup permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<CertificateItem> object if successful. + * @return the BackupStorageResult object if successful. */ - PagedList getCertificatesNext(final String nextPageLink); + BackupStorageResult backupStorageAccount(String vaultBaseUrl, String storageAccountName); /** - * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * Backs up the specified storage account. + * Requests that a backup of the specified storage account be downloaded to the client. This operation requires the storage/backup permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getCertificatesNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture backupStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback); /** - * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * Backs up the specified storage account. + * Requests that a backup of the specified storage account be downloaded to the client. This operation requires the storage/backup permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateItem> object + * @return the observable to the BackupStorageResult object */ - Observable> getCertificatesNextAsync(final String nextPageLink); + Observable backupStorageAccountAsync(String vaultBaseUrl, String storageAccountName); /** - * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * Backs up the specified storage account. + * Requests that a backup of the specified storage account be downloaded to the client. This operation requires the storage/backup permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateItem> object + * @return the observable to the BackupStorageResult object */ - Observable>> getCertificatesNextWithServiceResponseAsync(final String nextPageLink); + Observable> backupStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName); /** - * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * Restores a backed up storage account to a vault. + * Restores a backed up storage account to a vault. This operation requires the storage/restore permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageBundleBackup The backup blob associated with a storage account. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<CertificateIssuerItem> object if successful. + * @return the StorageBundle object if successful. */ - PagedList getCertificateIssuersNext(final String nextPageLink); + StorageBundle restoreStorageAccount(String vaultBaseUrl, byte[] storageBundleBackup); /** - * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * Restores a backed up storage account to a vault. + * Restores a backed up storage account to a vault. This operation requires the storage/restore permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageBundleBackup The backup blob associated with a storage account. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getCertificateIssuersNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture restoreStorageAccountAsync(String vaultBaseUrl, byte[] storageBundleBackup, final ServiceCallback serviceCallback); /** - * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * Restores a backed up storage account to a vault. + * Restores a backed up storage account to a vault. This operation requires the storage/restore permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageBundleBackup The backup blob associated with a storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateIssuerItem> object + * @return the observable to the StorageBundle object */ - Observable> getCertificateIssuersNextAsync(final String nextPageLink); + Observable restoreStorageAccountAsync(String vaultBaseUrl, byte[] storageBundleBackup); /** - * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * Restores a backed up storage account to a vault. + * Restores a backed up storage account to a vault. This operation requires the storage/restore permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageBundleBackup The backup blob associated with a storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateIssuerItem> object + * @return the observable to the StorageBundle object */ - Observable>> getCertificateIssuersNextWithServiceResponseAsync(final String nextPageLink); + Observable> restoreStorageAccountWithServiceResponseAsync(String vaultBaseUrl, byte[] storageBundleBackup); /** - * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * Deletes a storage account. This operation requires the storage/delete permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<CertificateItem> object if successful. + * @return the DeletedStorageBundle object if successful. */ - PagedList getCertificateVersionsNext(final String nextPageLink); + DeletedStorageBundle deleteStorageAccount(String vaultBaseUrl, String storageAccountName); /** - * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * Deletes a storage account. This operation requires the storage/delete permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getCertificateVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture deleteStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback); /** - * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * Deletes a storage account. This operation requires the storage/delete permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateItem> object + * @return the observable to the DeletedStorageBundle object */ - Observable> getCertificateVersionsNextAsync(final String nextPageLink); + Observable deleteStorageAccountAsync(String vaultBaseUrl, String storageAccountName); /** - * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * Deletes a storage account. This operation requires the storage/delete permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateItem> object + * @return the observable to the DeletedStorageBundle object */ - Observable>> getCertificateVersionsNextWithServiceResponseAsync(final String nextPageLink); + Observable> deleteStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Gets information about a specified storage account. This operation requires the storage/get permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<DeletedCertificateItem> object if successful. + * @return the StorageBundle object if successful. */ - PagedList getDeletedCertificatesNext(final String nextPageLink); + StorageBundle getStorageAccount(String vaultBaseUrl, String storageAccountName); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Gets information about a specified storage account. This operation requires the storage/get permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - ServiceFuture> getDeletedCertificatesNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + ServiceFuture getStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Gets information about a specified storage account. This operation requires the storage/get permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedCertificateItem> object + * @return the observable to the StorageBundle object */ - Observable> getDeletedCertificatesNextAsync(final String nextPageLink); + Observable getStorageAccountAsync(String vaultBaseUrl, String storageAccountName); /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Gets information about a specified storage account. This operation requires the storage/get permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedCertificateItem> object + * @return the observable to the StorageBundle object */ - Observable>> getDeletedCertificatesNextWithServiceResponseAsync(final String nextPageLink); + Observable> getStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName); + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + StorageBundle setStorageAccount(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey); + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture setStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, final ServiceCallback serviceCallback); + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable setStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey); + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable> setStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey); + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + StorageBundle setStorageAccount(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags); + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture setStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags, final ServiceCallback serviceCallback); + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable setStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags); + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable> setStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags); + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + StorageBundle updateStorageAccount(String vaultBaseUrl, String storageAccountName); + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture updateStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback); + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable updateStorageAccountAsync(String vaultBaseUrl, String storageAccountName); + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable> updateStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName); + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param activeKeyName The current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + StorageBundle updateStorageAccount(String vaultBaseUrl, String storageAccountName, String activeKeyName, Boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags); + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param activeKeyName The current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture updateStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String activeKeyName, Boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags, final ServiceCallback serviceCallback); + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param activeKeyName The current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable updateStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String activeKeyName, Boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags); + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param activeKeyName The current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable> updateStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String activeKeyName, Boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags); + + /** + * Regenerates the specified key value for the given storage account. This operation requires the storage/regeneratekey permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param keyName The storage account key name. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + StorageBundle regenerateStorageAccountKey(String vaultBaseUrl, String storageAccountName, String keyName); + + /** + * Regenerates the specified key value for the given storage account. This operation requires the storage/regeneratekey permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param keyName The storage account key name. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture regenerateStorageAccountKeyAsync(String vaultBaseUrl, String storageAccountName, String keyName, final ServiceCallback serviceCallback); + + /** + * Regenerates the specified key value for the given storage account. This operation requires the storage/regeneratekey permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param keyName The storage account key name. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable regenerateStorageAccountKeyAsync(String vaultBaseUrl, String storageAccountName, String keyName); + + /** + * Regenerates the specified key value for the given storage account. This operation requires the storage/regeneratekey permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param keyName The storage account key name. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + Observable> regenerateStorageAccountKeyWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String keyName); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<SasDefinitionItem> object if successful. + */ + PagedList getSasDefinitions(final String vaultBaseUrl, final String storageAccountName); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final ListOperationCallback serviceCallback); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + Observable> getSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + Observable>> getSasDefinitionsWithServiceResponseAsync(final String vaultBaseUrl, final String storageAccountName); + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<SasDefinitionItem> object if successful. + */ + PagedList getSasDefinitions(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults, final ListOperationCallback serviceCallback); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + Observable> getSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + Observable>> getSasDefinitionsWithServiceResponseAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedSasDefinitionItem> object if successful. + */ + PagedList getDeletedSasDefinitions(final String vaultBaseUrl, final String storageAccountName); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getDeletedSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final ListOperationCallback serviceCallback); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + Observable> getDeletedSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + Observable>> getDeletedSasDefinitionsWithServiceResponseAsync(final String vaultBaseUrl, final String storageAccountName); + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedSasDefinitionItem> object if successful. + */ + PagedList getDeletedSasDefinitions(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getDeletedSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults, final ListOperationCallback serviceCallback); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + Observable> getDeletedSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + Observable>> getDeletedSasDefinitionsWithServiceResponseAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults); + + /** + * Gets the specified deleted sas definition. + * The Get Deleted SAS Definition operation returns the specified deleted SAS definition along with its attributes. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the DeletedSasDefinitionBundle object if successful. + */ + DeletedSasDefinitionBundle getDeletedSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Gets the specified deleted sas definition. + * The Get Deleted SAS Definition operation returns the specified deleted SAS definition along with its attributes. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture getDeletedSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback); + + /** + * Gets the specified deleted sas definition. + * The Get Deleted SAS Definition operation returns the specified deleted SAS definition along with its attributes. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedSasDefinitionBundle object + */ + Observable getDeletedSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Gets the specified deleted sas definition. + * The Get Deleted SAS Definition operation returns the specified deleted SAS definition along with its attributes. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedSasDefinitionBundle object + */ + Observable> getDeletedSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Recovers the deleted SAS definition. + * Recovers the deleted SAS definition for the specified storage account. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + SasDefinitionBundle recoverDeletedSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Recovers the deleted SAS definition. + * Recovers the deleted SAS definition for the specified storage account. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture recoverDeletedSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback); + + /** + * Recovers the deleted SAS definition. + * Recovers the deleted SAS definition for the specified storage account. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable recoverDeletedSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Recovers the deleted SAS definition. + * Recovers the deleted SAS definition for the specified storage account. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable> recoverDeletedSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Deletes a SAS definition from a specified storage account. This operation requires the storage/deletesas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the DeletedSasDefinitionBundle object if successful. + */ + DeletedSasDefinitionBundle deleteSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Deletes a SAS definition from a specified storage account. This operation requires the storage/deletesas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture deleteSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback); + + /** + * Deletes a SAS definition from a specified storage account. This operation requires the storage/deletesas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedSasDefinitionBundle object + */ + Observable deleteSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Deletes a SAS definition from a specified storage account. This operation requires the storage/deletesas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedSasDefinitionBundle object + */ + Observable> deleteSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Gets information about a SAS definition for the specified storage account. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + SasDefinitionBundle getSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Gets information about a SAS definition for the specified storage account. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture getSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback); + + /** + * Gets information about a SAS definition for the specified storage account. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable getSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Gets information about a SAS definition for the specified storage account. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable> getSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + SasDefinitionBundle setSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod); + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture setSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, final ServiceCallback serviceCallback); + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable setSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod); + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable> setSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod); + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + SasDefinitionBundle setSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags); + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture setSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags, final ServiceCallback serviceCallback); + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable setSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags); + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable> setSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags); + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + SasDefinitionBundle updateSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture updateSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback); + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable updateSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable> updateSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName); + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + SasDefinitionBundle updateSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags); + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture updateSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags, final ServiceCallback serviceCallback); + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable updateSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags); + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + Observable> updateSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags); + + /** + * Retrieves a list of individual key versions with the same key name. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<KeyItem> object if successful. + */ + PagedList getKeyVersionsNext(final String nextPageLink); + + /** + * Retrieves a list of individual key versions with the same key name. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getKeyVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * Retrieves a list of individual key versions with the same key name. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<KeyItem> object + */ + Observable> getKeyVersionsNextAsync(final String nextPageLink); + + /** + * Retrieves a list of individual key versions with the same key name. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<KeyItem> object + */ + Observable>> getKeyVersionsNextWithServiceResponseAsync(final String nextPageLink); + + /** + * List keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<KeyItem> object if successful. + */ + PagedList getKeysNext(final String nextPageLink); + + /** + * List keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getKeysNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * List keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<KeyItem> object + */ + Observable> getKeysNextAsync(final String nextPageLink); + + /** + * List keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<KeyItem> object + */ + Observable>> getKeysNextWithServiceResponseAsync(final String nextPageLink); + + /** + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedKeyItem> object if successful. + */ + PagedList getDeletedKeysNext(final String nextPageLink); + + /** + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getDeletedKeysNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedKeyItem> object + */ + Observable> getDeletedKeysNextAsync(final String nextPageLink); + + /** + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedKeyItem> object + */ + Observable>> getDeletedKeysNextWithServiceResponseAsync(final String nextPageLink); + + /** + * List secrets in a specified key vault. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<SecretItem> object if successful. + */ + PagedList getSecretsNext(final String nextPageLink); + + /** + * List secrets in a specified key vault. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getSecretsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * List secrets in a specified key vault. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SecretItem> object + */ + Observable> getSecretsNextAsync(final String nextPageLink); + + /** + * List secrets in a specified key vault. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SecretItem> object + */ + Observable>> getSecretsNextWithServiceResponseAsync(final String nextPageLink); + + /** + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<SecretItem> object if successful. + */ + PagedList getSecretVersionsNext(final String nextPageLink); + + /** + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getSecretVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SecretItem> object + */ + Observable> getSecretVersionsNextAsync(final String nextPageLink); + + /** + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SecretItem> object + */ + Observable>> getSecretVersionsNextWithServiceResponseAsync(final String nextPageLink); + + /** + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedSecretItem> object if successful. + */ + PagedList getDeletedSecretsNext(final String nextPageLink); + + /** + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getDeletedSecretsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSecretItem> object + */ + Observable> getDeletedSecretsNextAsync(final String nextPageLink); + + /** + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSecretItem> object + */ + Observable>> getDeletedSecretsNextWithServiceResponseAsync(final String nextPageLink); + + /** + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<CertificateItem> object if successful. + */ + PagedList getCertificatesNext(final String nextPageLink); + + /** + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getCertificatesNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateItem> object + */ + Observable> getCertificatesNextAsync(final String nextPageLink); + + /** + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateItem> object + */ + Observable>> getCertificatesNextWithServiceResponseAsync(final String nextPageLink); + + /** + * List certificate issuers for a specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<CertificateIssuerItem> object if successful. + */ + PagedList getCertificateIssuersNext(final String nextPageLink); + + /** + * List certificate issuers for a specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getCertificateIssuersNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * List certificate issuers for a specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateIssuerItem> object + */ + Observable> getCertificateIssuersNextAsync(final String nextPageLink); + + /** + * List certificate issuers for a specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateIssuerItem> object + */ + Observable>> getCertificateIssuersNextWithServiceResponseAsync(final String nextPageLink); + + /** + * List the versions of a certificate. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<CertificateItem> object if successful. + */ + PagedList getCertificateVersionsNext(final String nextPageLink); + + /** + * List the versions of a certificate. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getCertificateVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * List the versions of a certificate. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateItem> object + */ + Observable> getCertificateVersionsNextAsync(final String nextPageLink); + + /** + * List the versions of a certificate. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateItem> object + */ + Observable>> getCertificateVersionsNextWithServiceResponseAsync(final String nextPageLink); + + /** + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedCertificateItem> object if successful. + */ + PagedList getDeletedCertificatesNext(final String nextPageLink); + + /** + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getDeletedCertificatesNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedCertificateItem> object + */ + Observable> getDeletedCertificatesNextAsync(final String nextPageLink); + + /** + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedCertificateItem> object + */ + Observable>> getDeletedCertificatesNextWithServiceResponseAsync(final String nextPageLink); + + /** + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<StorageAccountItem> object if successful. + */ + PagedList getStorageAccountsNext(final String nextPageLink); + + /** + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getStorageAccountsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<StorageAccountItem> object + */ + Observable> getStorageAccountsNextAsync(final String nextPageLink); + + /** + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<StorageAccountItem> object + */ + Observable>> getStorageAccountsNextWithServiceResponseAsync(final String nextPageLink); + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedStorageAccountItem> object if successful. + */ + PagedList getDeletedStorageAccountsNext(final String nextPageLink); + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getDeletedStorageAccountsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedStorageAccountItem> object + */ + Observable> getDeletedStorageAccountsNextAsync(final String nextPageLink); + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedStorageAccountItem> object + */ + Observable>> getDeletedStorageAccountsNextWithServiceResponseAsync(final String nextPageLink); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<SasDefinitionItem> object if successful. + */ + PagedList getSasDefinitionsNext(final String nextPageLink); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getSasDefinitionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + Observable> getSasDefinitionsNextAsync(final String nextPageLink); + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + Observable>> getSasDefinitionsNextWithServiceResponseAsync(final String nextPageLink); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedSasDefinitionItem> object if successful. + */ + PagedList getDeletedSasDefinitionsNext(final String nextPageLink); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getDeletedSasDefinitionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + Observable> getDeletedSasDefinitionsNextAsync(final String nextPageLink); + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + Observable>> getDeletedSasDefinitionsNextWithServiceResponseAsync(final String nextPageLink); } diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/KeyVaultClientCustom.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/KeyVaultClientCustom.java index ddf9de9..c037e56 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/KeyVaultClientCustom.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/KeyVaultClientCustom.java @@ -1,19 +1,25 @@ package com.microsoft.azure.keyvault; import com.microsoft.azure.ListOperationCallback; +import com.microsoft.azure.Page; import com.microsoft.azure.PagedList; import com.microsoft.azure.keyvault.models.*; import com.microsoft.azure.keyvault.requests.*; import com.microsoft.azure.keyvault.webkey.JsonWebKeyEncryptionAlgorithm; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyOperation; import com.microsoft.azure.keyvault.webkey.JsonWebKeySignatureAlgorithm; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyType; import com.microsoft.rest.RestClient; import com.microsoft.rest.ServiceCallback; import com.microsoft.rest.ServiceFuture; +import com.microsoft.rest.ServiceResponse; import com.microsoft.rest.protocol.SerializerAdapter; import okhttp3.OkHttpClient; import retrofit2.Retrofit; +import rx.Observable; import java.util.List; +import java.util.Map; public interface KeyVaultClientCustom extends KeyVaultClientBase { @@ -46,6 +52,24 @@ public interface KeyVaultClientCustom extends KeyVaultClientBase { * @return the KeyBundle if successful. */ KeyBundle createKey(CreateKeyRequest createKeyRequest); + + /** + * Creates a new key, stores it, then returns key parameters and attributes to the client. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param keyName The name for the new key. The system will generate the version name for the new key. + * @param kty The type of key to create. For valid key types, see JsonWebKeyType. Supported JsonWebKey key types (kty) for Elliptic Curve, RSA, HSM, Octet. Possible values include: 'EC', 'RSA', 'RSA-HSM', 'oct' + * @param keySize The key size in bytes. For example, 1024 or 2048. + * @param keyOps the List<JsonWebKeyOperation> value + * @param keyAttributes the KeyAttributes value + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the KeyBundle object if successful. + */ + KeyBundle createKey(String vaultBaseUrl, String keyName, JsonWebKeyType kty, Integer keySize, List keyOps, KeyAttributes keyAttributes, Map tags); /** * Creates a new key, stores it, then returns key parameters and attributes to the client. The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. Authorization: Requires the keys/create permission. @@ -57,6 +81,55 @@ public interface KeyVaultClientCustom extends KeyVaultClientBase { */ ServiceFuture createKeyAsync(CreateKeyRequest createKeyRequest, ServiceCallback serviceCallback); + /** + * Creates a new key, stores it, then returns key parameters and attributes to the client. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param keyName The name for the new key. The system will generate the version name for the new key. + * @param kty The type of key to create. For valid key types, see JsonWebKeyType. Supported JsonWebKey key types (kty) for Elliptic Curve, RSA, HSM, Octet. Possible values include: 'EC', 'RSA', 'RSA-HSM', 'oct' + * @param keySize The key size in bytes. For example, 1024 or 2048. + * @param keyOps the List<JsonWebKeyOperation> value + * @param keyAttributes the KeyAttributes value + * @param tags Application specific metadata in the form of key-value pairs. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture createKeyAsync(String vaultBaseUrl, String keyName, JsonWebKeyType kty, Integer keySize, List keyOps, KeyAttributes keyAttributes, Map tags, final ServiceCallback serviceCallback); + + /** + * Creates a new key, stores it, then returns key parameters and attributes to the client. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param keyName The name for the new key. The system will generate the version name for the new key. + * @param kty The type of key to create. For valid key types, see JsonWebKeyType. Supported JsonWebKey key types (kty) for Elliptic Curve, RSA, HSM, Octet. Possible values include: 'EC', 'RSA', 'RSA-HSM', 'oct' + * @param keySize The key size in bytes. For example, 1024 or 2048. + * @param keyOps the List<JsonWebKeyOperation> value + * @param keyAttributes the KeyAttributes value + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the KeyBundle object + */ + Observable createKeyAsync(String vaultBaseUrl, String keyName, JsonWebKeyType kty, Integer keySize, List keyOps, KeyAttributes keyAttributes, Map tags); + + /** + * Creates a new key, stores it, then returns key parameters and attributes to the client. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param keyName The name for the new key. The system will generate the version name for the new key. + * @param kty The type of key to create. For valid key types, see JsonWebKeyType. Supported JsonWebKey key types (kty) for Elliptic Curve, RSA, HSM, Octet. Possible values include: 'EC', 'RSA', 'RSA-HSM', 'oct' + * @param keySize The key size in bytes. For example, 1024 or 2048. + * @param keyOps the List<JsonWebKeyOperation> value + * @param keyAttributes the KeyAttributes value + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the KeyBundle object + */ + Observable> createKeyWithServiceResponseAsync(String vaultBaseUrl, String keyName, JsonWebKeyType kty, Integer keySize, List keyOps, KeyAttributes keyAttributes, Map tags); + /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. Authorization: requires the keys/import permission. * @@ -498,6 +571,54 @@ public interface KeyVaultClientCustom extends KeyVaultClientBase { */ ServiceFuture> listSecretVersionsAsync(final String vaultBaseUrl, final String secretName, final Integer maxresults, final ListOperationCallback serviceCallback); + /** + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<CertificateItem> object if successful. + */ + PagedList getCertificates(final String vaultBaseUrl, final Integer maxresults); + + /** + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback); + + /** + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateItem> object + */ + Observable> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults); + + /** + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateItem> object + */ + Observable>> getCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults); + + /** * List certificates in the specified vault. * @@ -612,8 +733,6 @@ public interface KeyVaultClientCustom extends KeyVaultClientBase { */ ServiceFuture updateCertificateIssuerAsync(UpdateCertificateIssuerRequest updateCertificateIssuerRequest, final ServiceCallback serviceCallback); - - /** * Creates a new certificate version. If this is the first version, the certificate resource is created. * @@ -693,8 +812,6 @@ public interface KeyVaultClientCustom extends KeyVaultClientBase { */ ServiceFuture> listCertificateVersionsAsync(final String vaultBaseUrl, final String certificateName, final Integer maxresults, final ListOperationCallback serviceCallback); - - /** * Updates the policy for a certificate. Set appropriate members in the certificatePolicy that must be updated. Leave others as null. * @@ -722,6 +839,7 @@ public interface KeyVaultClientCustom extends KeyVaultClientBase { * @return the CertificateBundle if successful. */ CertificateBundle updateCertificate(UpdateCertificateRequest updateCertificateRequest); + /** * Updates the attributes associated with the specified certificate. * @@ -820,5 +938,51 @@ public interface KeyVaultClientCustom extends KeyVaultClientBase { */ ServiceFuture getPendingCertificateSigningRequestAsync(String vaultBaseUrl, String certificateName, final ServiceCallback serviceCallback); + /** + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedCertificateItem> object if successful. + */ + PagedList getDeletedCertificates(final String vaultBaseUrl, final Integer maxresults); + + /** + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + ServiceFuture> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback); + + /** + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedCertificateItem> object + */ + Observable> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults); + + /** + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedCertificateItem> object + */ + Observable>> getDeletedCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults); } \ No newline at end of file diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/implementation/KeyVaultClientBaseImpl.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/implementation/KeyVaultClientBaseImpl.java index f44c567..c66e9d4 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/implementation/KeyVaultClientBaseImpl.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/implementation/KeyVaultClientBaseImpl.java @@ -1,14 +1,22 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.implementation; +import com.google.common.base.Joiner; +import com.google.common.reflect.TypeToken; +import com.microsoft.azure.AzureClient; +import com.microsoft.azure.AzureServiceClient; +import com.microsoft.azure.AzureServiceFuture; import com.microsoft.azure.keyvault.KeyVaultClientBase; import com.microsoft.azure.keyvault.models.BackupKeyResult; import com.microsoft.azure.keyvault.models.BackupSecretResult; +import com.microsoft.azure.keyvault.models.BackupStorageResult; import com.microsoft.azure.keyvault.models.CertificateAttributes; import com.microsoft.azure.keyvault.models.CertificateBundle; import com.microsoft.azure.keyvault.models.CertificateCreateParameters; @@ -27,8 +35,12 @@ import com.microsoft.azure.keyvault.models.DeletedCertificateItem; import com.microsoft.azure.keyvault.models.DeletedKeyBundle; import com.microsoft.azure.keyvault.models.DeletedKeyItem; +import com.microsoft.azure.keyvault.models.DeletedSasDefinitionBundle; +import com.microsoft.azure.keyvault.models.DeletedSasDefinitionItem; import com.microsoft.azure.keyvault.models.DeletedSecretBundle; import com.microsoft.azure.keyvault.models.DeletedSecretItem; +import com.microsoft.azure.keyvault.models.DeletedStorageAccountItem; +import com.microsoft.azure.keyvault.models.DeletedStorageBundle; import com.microsoft.azure.keyvault.models.IssuerAttributes; import com.microsoft.azure.keyvault.models.IssuerBundle; import com.microsoft.azure.keyvault.models.IssuerCredentials; @@ -48,21 +60,28 @@ import com.microsoft.azure.keyvault.models.KeyVerifyResult; import com.microsoft.azure.keyvault.models.OrganizationDetails; import com.microsoft.azure.keyvault.models.PageImpl; +import com.microsoft.azure.keyvault.models.SasDefinitionAttributes; +import com.microsoft.azure.keyvault.models.SasDefinitionBundle; +import com.microsoft.azure.keyvault.models.SasDefinitionCreateParameters; +import com.microsoft.azure.keyvault.models.SasDefinitionItem; +import com.microsoft.azure.keyvault.models.SasDefinitionUpdateParameters; +import com.microsoft.azure.keyvault.models.SasTokenType; import com.microsoft.azure.keyvault.models.SecretAttributes; import com.microsoft.azure.keyvault.models.SecretBundle; import com.microsoft.azure.keyvault.models.SecretItem; import com.microsoft.azure.keyvault.models.SecretRestoreParameters; import com.microsoft.azure.keyvault.models.SecretSetParameters; import com.microsoft.azure.keyvault.models.SecretUpdateParameters; -import com.google.common.base.Joiner; -import com.google.common.reflect.TypeToken; -import com.microsoft.azure.AzureClient; -import com.microsoft.azure.AzureServiceClient; -import com.microsoft.azure.AzureServiceFuture; +import com.microsoft.azure.keyvault.models.StorageAccountAttributes; +import com.microsoft.azure.keyvault.models.StorageAccountCreateParameters; +import com.microsoft.azure.keyvault.models.StorageAccountItem; +import com.microsoft.azure.keyvault.models.StorageAccountRegenerteKeyParameters; +import com.microsoft.azure.keyvault.models.StorageAccountUpdateParameters; +import com.microsoft.azure.keyvault.models.StorageBundle; +import com.microsoft.azure.keyvault.models.StorageRestoreParameters; import com.microsoft.azure.ListOperationCallback; import com.microsoft.azure.Page; import com.microsoft.azure.PagedList; -import com.microsoft.azure.keyvault.webkey.*; import com.microsoft.rest.credentials.ServiceClientCredentials; import com.microsoft.rest.RestClient; import com.microsoft.rest.ServiceCallback; @@ -87,6 +106,11 @@ import retrofit2.Response; import rx.functions.Func1; import rx.Observable; +import com.microsoft.azure.keyvault.webkey.JsonWebKey; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyEncryptionAlgorithm; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyOperation; +import com.microsoft.azure.keyvault.webkey.JsonWebKeySignatureAlgorithm; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyType; /** * Initializes a new instance of the KeyVaultClientBaseImpl class. @@ -217,7 +241,7 @@ public KeyVaultClientBaseImpl(RestClient restClient) { } protected void initialize() { - this.apiVersion = "2016-10-01"; + this.apiVersion = "7.0-preview"; this.acceptLanguage = "en-US"; this.longRunningOperationRetryTimeout = 30; this.generateClientRequestId = true; @@ -232,7 +256,7 @@ protected void initialize() { */ @Override public String userAgent() { - return String.format("%s (%s, %s)", super.userAgent(), "KeyVaultClientBase", "2016-10-01"); + return String.format("%s (%s, %s)", super.userAgent(), "KeyVaultClientBase", "7.0-preview"); } private void initializeService() { @@ -244,275 +268,371 @@ private void initializeService() { * used by Retrofit to perform actually REST calls. */ interface KeyVaultClientBaseService { - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase createKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase createKey" }) @POST("keys/{key-name}/create") Observable> createKey(@Path("key-name") String keyName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeyCreateParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase importKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase importKey" }) @PUT("keys/{key-name}") Observable> importKey(@Path("key-name") String keyName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeyImportParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase deleteKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase deleteKey" }) @HTTP(path = "keys/{key-name}", method = "DELETE", hasBody = true) Observable> deleteKey(@Path("key-name") String keyName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase updateKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase updateKey" }) @PATCH("keys/{key-name}/{key-version}") Observable> updateKey(@Path("key-name") String keyName, @Path("key-version") String keyVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeyUpdateParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getKey" }) @GET("keys/{key-name}/{key-version}") Observable> getKey(@Path("key-name") String keyName, @Path("key-version") String keyVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getKeyVersions" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getKeyVersions" }) @GET("keys/{key-name}/versions") Observable> getKeyVersions(@Path("key-name") String keyName, @Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getKeys" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getKeys" }) @GET("keys") Observable> getKeys(@Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase backupKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase backupKey" }) @POST("keys/{key-name}/backup") Observable> backupKey(@Path("key-name") String keyName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase restoreKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase restoreKey" }) @POST("keys/restore") Observable> restoreKey(@Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeyRestoreParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase encrypt" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase encrypt" }) @POST("keys/{key-name}/{key-version}/encrypt") Observable> encrypt(@Path("key-name") String keyName, @Path("key-version") String keyVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeyOperationsParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase decrypt" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase decrypt" }) @POST("keys/{key-name}/{key-version}/decrypt") Observable> decrypt(@Path("key-name") String keyName, @Path("key-version") String keyVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeyOperationsParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase sign" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase sign" }) @POST("keys/{key-name}/{key-version}/sign") Observable> sign(@Path("key-name") String keyName, @Path("key-version") String keyVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeySignParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase verify" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase verify" }) @POST("keys/{key-name}/{key-version}/verify") Observable> verify(@Path("key-name") String keyName, @Path("key-version") String keyVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeyVerifyParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase wrapKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase wrapKey" }) @POST("keys/{key-name}/{key-version}/wrapkey") Observable> wrapKey(@Path("key-name") String keyName, @Path("key-version") String keyVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeyOperationsParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase unwrapKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase unwrapKey" }) @POST("keys/{key-name}/{key-version}/unwrapkey") Observable> unwrapKey(@Path("key-name") String keyName, @Path("key-version") String keyVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body KeyOperationsParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getDeletedKeys" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedKeys" }) @GET("deletedkeys") Observable> getDeletedKeys(@Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getDeletedKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedKey" }) @GET("deletedkeys/{key-name}") Observable> getDeletedKey(@Path("key-name") String keyName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase purgeDeletedKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase purgeDeletedKey" }) @HTTP(path = "deletedkeys/{key-name}", method = "DELETE", hasBody = true) Observable> purgeDeletedKey(@Path("key-name") String keyName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase recoverDeletedKey" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase recoverDeletedKey" }) @POST("deletedkeys/{key-name}/recover") Observable> recoverDeletedKey(@Path("key-name") String keyName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase setSecret" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase setSecret" }) @PUT("secrets/{secret-name}") Observable> setSecret(@Path("secret-name") String secretName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body SecretSetParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase deleteSecret" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase deleteSecret" }) @HTTP(path = "secrets/{secret-name}", method = "DELETE", hasBody = true) Observable> deleteSecret(@Path("secret-name") String secretName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase updateSecret" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase updateSecret" }) @PATCH("secrets/{secret-name}/{secret-version}") Observable> updateSecret(@Path("secret-name") String secretName, @Path("secret-version") String secretVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body SecretUpdateParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getSecret" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getSecret" }) @GET("secrets/{secret-name}/{secret-version}") Observable> getSecret(@Path("secret-name") String secretName, @Path("secret-version") String secretVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getSecrets" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getSecrets" }) @GET("secrets") Observable> getSecrets(@Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getSecretVersions" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getSecretVersions" }) @GET("secrets/{secret-name}/versions") Observable> getSecretVersions(@Path("secret-name") String secretName, @Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getDeletedSecrets" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedSecrets" }) @GET("deletedsecrets") Observable> getDeletedSecrets(@Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getDeletedSecret" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedSecret" }) @GET("deletedsecrets/{secret-name}") Observable> getDeletedSecret(@Path("secret-name") String secretName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase purgeDeletedSecret" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase purgeDeletedSecret" }) @HTTP(path = "deletedsecrets/{secret-name}", method = "DELETE", hasBody = true) Observable> purgeDeletedSecret(@Path("secret-name") String secretName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase recoverDeletedSecret" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase recoverDeletedSecret" }) @POST("deletedsecrets/{secret-name}/recover") Observable> recoverDeletedSecret(@Path("secret-name") String secretName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase backupSecret" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase backupSecret" }) @POST("secrets/{secret-name}/backup") Observable> backupSecret(@Path("secret-name") String secretName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase restoreSecret" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase restoreSecret" }) @POST("secrets/restore") Observable> restoreSecret(@Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body SecretRestoreParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificates" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificates" }) @GET("certificates") - Observable> getCertificates(@Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + Observable> getCertificates(@Query("maxresults") Integer maxresults, @Query("includePending") Boolean includePending, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase deleteCertificate" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase deleteCertificate" }) @HTTP(path = "certificates/{certificate-name}", method = "DELETE", hasBody = true) Observable> deleteCertificate(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase setCertificateContacts" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase setCertificateContacts" }) @PUT("certificates/contacts") Observable> setCertificateContacts(@Body Contacts contacts, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificateContacts" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificateContacts" }) @GET("certificates/contacts") Observable> getCertificateContacts(@Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase deleteCertificateContacts" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase deleteCertificateContacts" }) @HTTP(path = "certificates/contacts", method = "DELETE", hasBody = true) Observable> deleteCertificateContacts(@Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificateIssuers" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificateIssuers" }) @GET("certificates/issuers") Observable> getCertificateIssuers(@Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase setCertificateIssuer" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase setCertificateIssuer" }) @PUT("certificates/issuers/{issuer-name}") Observable> setCertificateIssuer(@Path("issuer-name") String issuerName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body CertificateIssuerSetParameters parameter, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase updateCertificateIssuer" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase updateCertificateIssuer" }) @PATCH("certificates/issuers/{issuer-name}") Observable> updateCertificateIssuer(@Path("issuer-name") String issuerName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body CertificateIssuerUpdateParameters parameter, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificateIssuer" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificateIssuer" }) @GET("certificates/issuers/{issuer-name}") Observable> getCertificateIssuer(@Path("issuer-name") String issuerName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase deleteCertificateIssuer" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase deleteCertificateIssuer" }) @HTTP(path = "certificates/issuers/{issuer-name}", method = "DELETE", hasBody = true) Observable> deleteCertificateIssuer(@Path("issuer-name") String issuerName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase createCertificate" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase createCertificate" }) @POST("certificates/{certificate-name}/create") Observable> createCertificate(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body CertificateCreateParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase importCertificate" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase importCertificate" }) @POST("certificates/{certificate-name}/import") Observable> importCertificate(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body CertificateImportParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificateVersions" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificateVersions" }) @GET("certificates/{certificate-name}/versions") Observable> getCertificateVersions(@Path("certificate-name") String certificateName, @Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificatePolicy" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificatePolicy" }) @GET("certificates/{certificate-name}/policy") Observable> getCertificatePolicy(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase updateCertificatePolicy" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase updateCertificatePolicy" }) @PATCH("certificates/{certificate-name}/policy") Observable> updateCertificatePolicy(@Path("certificate-name") String certificateName, @Body CertificatePolicy certificatePolicy, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase updateCertificate" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase updateCertificate" }) @PATCH("certificates/{certificate-name}/{certificate-version}") Observable> updateCertificate(@Path("certificate-name") String certificateName, @Path("certificate-version") String certificateVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body CertificateUpdateParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificate" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificate" }) @GET("certificates/{certificate-name}/{certificate-version}") Observable> getCertificate(@Path("certificate-name") String certificateName, @Path("certificate-version") String certificateVersion, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase updateCertificateOperation" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase updateCertificateOperation" }) @PATCH("certificates/{certificate-name}/pending") Observable> updateCertificateOperation(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body CertificateOperationUpdateParameter certificateOperation, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificateOperation" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificateOperation" }) @GET("certificates/{certificate-name}/pending") Observable> getCertificateOperation(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase deleteCertificateOperation" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase deleteCertificateOperation" }) @HTTP(path = "certificates/{certificate-name}/pending", method = "DELETE", hasBody = true) Observable> deleteCertificateOperation(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase mergeCertificate" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase mergeCertificate" }) @POST("certificates/{certificate-name}/pending/merge") Observable> mergeCertificate(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body CertificateMergeParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getDeletedCertificates" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedCertificates" }) @GET("deletedcertificates") - Observable> getDeletedCertificates(@Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + Observable> getDeletedCertificates(@Query("maxresults") Integer maxresults, @Query("includePending") Boolean includePending, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getDeletedCertificate" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedCertificate" }) @GET("deletedcertificates/{certificate-name}") Observable> getDeletedCertificate(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase purgeDeletedCertificate" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase purgeDeletedCertificate" }) @HTTP(path = "deletedcertificates/{certificate-name}", method = "DELETE", hasBody = true) Observable> purgeDeletedCertificate(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase recoverDeletedCertificate" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase recoverDeletedCertificate" }) @POST("deletedcertificates/{certificate-name}/recover") Observable> recoverDeletedCertificate(@Path("certificate-name") String certificateName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getKeyVersionsNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getStorageAccounts" }) + @GET("storage") + Observable> getStorageAccounts(@Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedStorageAccounts" }) + @GET("deletedstorage") + Observable> getDeletedStorageAccounts(@Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedStorageAccount" }) + @GET("deletedstorage/{storage-account-name}") + Observable> getDeletedStorageAccount(@Path("storage-account-name") String storageAccountName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase purgeDeletedStorgeAccount" }) + @HTTP(path = "deletedstorage/{storage-account-name}", method = "DELETE", hasBody = true) + Observable> purgeDeletedStorgeAccount(@Path("storage-account-name") String storageAccountName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase recoverDeletedStorageAccount" }) + @POST("deletedstorage/{storage-account-name}/recover") + Observable> recoverDeletedStorageAccount(@Path("storage-account-name") String storageAccountName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase backupStorageAccount" }) + @POST("storage/{storage-account-name}/backup") + Observable> backupStorageAccount(@Path("storage-account-name") String storageAccountName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase restoreStorageAccount" }) + @POST("storage/restore") + Observable> restoreStorageAccount(@Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body StorageRestoreParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase deleteStorageAccount" }) + @HTTP(path = "storage/{storage-account-name}", method = "DELETE", hasBody = true) + Observable> deleteStorageAccount(@Path("storage-account-name") String storageAccountName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getStorageAccount" }) + @GET("storage/{storage-account-name}") + Observable> getStorageAccount(@Path("storage-account-name") String storageAccountName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase setStorageAccount" }) + @PUT("storage/{storage-account-name}") + Observable> setStorageAccount(@Path("storage-account-name") String storageAccountName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body StorageAccountCreateParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase updateStorageAccount" }) + @PATCH("storage/{storage-account-name}") + Observable> updateStorageAccount(@Path("storage-account-name") String storageAccountName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body StorageAccountUpdateParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase regenerateStorageAccountKey" }) + @POST("storage/{storage-account-name}/regeneratekey") + Observable> regenerateStorageAccountKey(@Path("storage-account-name") String storageAccountName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body StorageAccountRegenerteKeyParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getSasDefinitions" }) + @GET("storage/{storage-account-name}/sas") + Observable> getSasDefinitions(@Path("storage-account-name") String storageAccountName, @Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedSasDefinitions" }) + @GET("deletedstorage/{storage-account-name}/sas") + Observable> getDeletedSasDefinitions(@Path("storage-account-name") String storageAccountName, @Query("maxresults") Integer maxresults, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedSasDefinition" }) + @GET("deletedstorage/{storage-account-name}/sas/{sas-definition-name}") + Observable> getDeletedSasDefinition(@Path("storage-account-name") String storageAccountName, @Path("sas-definition-name") String sasDefinitionName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase recoverDeletedSasDefinition" }) + @POST("deletedstorage/{storage-account-name}/sas/{sas-definition-name}/recover") + Observable> recoverDeletedSasDefinition(@Path("storage-account-name") String storageAccountName, @Path("sas-definition-name") String sasDefinitionName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase deleteSasDefinition" }) + @HTTP(path = "storage/{storage-account-name}/sas/{sas-definition-name}", method = "DELETE", hasBody = true) + Observable> deleteSasDefinition(@Path("storage-account-name") String storageAccountName, @Path("sas-definition-name") String sasDefinitionName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getSasDefinition" }) + @GET("storage/{storage-account-name}/sas/{sas-definition-name}") + Observable> getSasDefinition(@Path("storage-account-name") String storageAccountName, @Path("sas-definition-name") String sasDefinitionName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase setSasDefinition" }) + @PUT("storage/{storage-account-name}/sas/{sas-definition-name}") + Observable> setSasDefinition(@Path("storage-account-name") String storageAccountName, @Path("sas-definition-name") String sasDefinitionName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body SasDefinitionCreateParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase updateSasDefinition" }) + @PATCH("storage/{storage-account-name}/sas/{sas-definition-name}") + Observable> updateSasDefinition(@Path("storage-account-name") String storageAccountName, @Path("sas-definition-name") String sasDefinitionName, @Query("api-version") String apiVersion, @Header("accept-language") String acceptLanguage, @Body SasDefinitionUpdateParameters parameters, @Header("x-ms-parameterized-host") String parameterizedHost, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getKeyVersionsNext" }) @GET Observable> getKeyVersionsNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getKeysNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getKeysNext" }) @GET Observable> getKeysNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getDeletedKeysNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedKeysNext" }) @GET Observable> getDeletedKeysNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getSecretsNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getSecretsNext" }) @GET Observable> getSecretsNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getSecretVersionsNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getSecretVersionsNext" }) @GET Observable> getSecretVersionsNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getDeletedSecretsNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedSecretsNext" }) @GET Observable> getDeletedSecretsNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificatesNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificatesNext" }) @GET Observable> getCertificatesNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificateIssuersNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificateIssuersNext" }) @GET Observable> getCertificateIssuersNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getCertificateVersionsNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getCertificateVersionsNext" }) @GET Observable> getCertificateVersionsNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); - @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: .KeyVaultClientBase getDeletedCertificatesNext" }) + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedCertificatesNext" }) @GET Observable> getDeletedCertificatesNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getStorageAccountsNext" }) + @GET + Observable> getStorageAccountsNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedStorageAccountsNext" }) + @GET + Observable> getDeletedStorageAccountsNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getSasDefinitionsNext" }) + @GET + Observable> getSasDefinitionsNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); + + @Headers({ "Content-Type: application/json; charset=utf-8", "x-ms-logging-context: com.microsoft.azure.keyvault.KeyVaultClientBase getDeletedSasDefinitionsNext" }) + @GET + Observable> getDeletedSasDefinitionsNext(@Url String nextUrl, @Header("accept-language") String acceptLanguage, @Header("User-Agent") String userAgent); + } /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -528,7 +648,7 @@ public KeyBundle createKey(String vaultBaseUrl, String keyName, JsonWebKeyType k /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -543,7 +663,7 @@ public ServiceFuture createKeyAsync(String vaultBaseUrl, String keyNa /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -562,7 +682,7 @@ public KeyBundle call(ServiceResponse response) { /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -612,7 +732,7 @@ public Observable> call(Response respon /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -633,7 +753,7 @@ public KeyBundle createKey(String vaultBaseUrl, String keyName, JsonWebKeyType k /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -653,7 +773,7 @@ public ServiceFuture createKeyAsync(String vaultBaseUrl, String keyNa /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -677,7 +797,7 @@ public KeyBundle call(ServiceResponse response) { /** * Creates a new key, stores it, then returns key parameters and attributes to the client. - * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The create key operation can be used to create any key type in Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. It requires the keys/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name for the new key. The system will generate the version name for the new key. @@ -737,7 +857,7 @@ private ServiceResponse createKeyDelegate(Response resp /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -753,7 +873,7 @@ public KeyBundle importKey(String vaultBaseUrl, String keyName, JsonWebKey key) /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -768,7 +888,7 @@ public ServiceFuture importKeyAsync(String vaultBaseUrl, String keyNa /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -787,7 +907,7 @@ public KeyBundle call(ServiceResponse response) { /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -834,7 +954,7 @@ public Observable> call(Response respon /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -853,7 +973,7 @@ public KeyBundle importKey(String vaultBaseUrl, String keyName, JsonWebKey key, /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -871,7 +991,7 @@ public ServiceFuture importKeyAsync(String vaultBaseUrl, String keyNa /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -893,7 +1013,7 @@ public KeyBundle call(ServiceResponse response) { /** * Imports an externally created key, stores it, and returns key parameters and attributes to the client. - * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. + * The import key operation may be used to import any key type into an Azure Key Vault. If the named key already exists, Azure Key Vault creates a new version of the key. This operation requires the keys/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName Name for the imported key. @@ -949,7 +1069,7 @@ private ServiceResponse importKeyDelegate(Response resp /** * Deletes a key of any type from storage in Azure Key Vault. - * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. + * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the keys/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to delete. @@ -964,7 +1084,7 @@ public DeletedKeyBundle deleteKey(String vaultBaseUrl, String keyName) { /** * Deletes a key of any type from storage in Azure Key Vault. - * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. + * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the keys/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to delete. @@ -978,7 +1098,7 @@ public ServiceFuture deleteKeyAsync(String vaultBaseUrl, Strin /** * Deletes a key of any type from storage in Azure Key Vault. - * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. + * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the keys/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to delete. @@ -996,7 +1116,7 @@ public DeletedKeyBundle call(ServiceResponse response) { /** * Deletes a key of any type from storage in Azure Key Vault. - * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. + * The delete key operation cannot be used to remove individual versions of a key. This operation removes the cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the keys/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to delete. @@ -1037,7 +1157,7 @@ private ServiceResponse deleteKeyDelegate(Response updateKeyAsync(String vaultBaseUrl, String keyNa /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -1087,7 +1207,7 @@ public KeyBundle call(ServiceResponse response) { /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -1132,7 +1252,7 @@ public Observable> call(Response respon /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -1151,7 +1271,7 @@ public KeyBundle updateKey(String vaultBaseUrl, String keyName, String keyVersio /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -1169,7 +1289,7 @@ public ServiceFuture updateKeyAsync(String vaultBaseUrl, String keyNa /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -1191,7 +1311,7 @@ public KeyBundle call(ServiceResponse response) { /** * The update key operation changes specified attributes of a stored key and can be applied to any key type and key version stored in Azure Key Vault. - * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. + * In order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic material of a key itself cannot be changed. This operation requires the keys/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of key to update. @@ -1246,7 +1366,7 @@ private ServiceResponse updateKeyDelegate(Response resp /** * Gets the public part of a stored key. - * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. + * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to get. @@ -1262,7 +1382,7 @@ public KeyBundle getKey(String vaultBaseUrl, String keyName, String keyVersion) /** * Gets the public part of a stored key. - * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. + * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to get. @@ -1277,7 +1397,7 @@ public ServiceFuture getKeyAsync(String vaultBaseUrl, String keyName, /** * Gets the public part of a stored key. - * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. + * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to get. @@ -1296,7 +1416,7 @@ public KeyBundle call(ServiceResponse response) { /** * Gets the public part of a stored key. - * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. + * The get key operation is applicable to all key types. If the requested key is symmetric, then no key material is released in the response. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key to get. @@ -1341,7 +1461,7 @@ private ServiceResponse getKeyDelegate(Response respons /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1362,7 +1482,7 @@ public Page nextPage(String nextPageLink) { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1384,7 +1504,7 @@ public Observable>> call(String nextPageLink) { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1403,7 +1523,7 @@ public Page call(ServiceResponse> response) { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1426,7 +1546,7 @@ public Observable>> call(ServiceResponse>> call(Response re /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1483,7 +1603,7 @@ public Page nextPage(String nextPageLink) { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1506,7 +1626,7 @@ public Observable>> call(String nextPageLink) { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1526,7 +1646,7 @@ public Page call(ServiceResponse> response) { /** * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1550,11 +1670,11 @@ public Observable>> call(ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param keyName The name of the key. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<KeyItem> object wrapped in {@link ServiceResponse} if successful. */ @@ -1592,7 +1712,7 @@ private ServiceResponse> getKeyVersionsDelegate(Response nextPage(String nextPageLink) { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -1633,7 +1753,7 @@ public Observable>> call(String nextPageLink) { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1651,7 +1771,7 @@ public Page call(ServiceResponse> response) { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -1673,7 +1793,7 @@ public Observable>> call(ServiceResponse>> call(Response re /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1725,7 +1845,7 @@ public Page nextPage(String nextPageLink) { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1747,7 +1867,7 @@ public Observable>> call(String nextPageLink) { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1766,7 +1886,7 @@ public Page call(ServiceResponse> response) { /** * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -1789,10 +1909,10 @@ public Observable>> call(ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<KeyItem> object wrapped in {@link ServiceResponse} if successful. */ @@ -1827,7 +1947,7 @@ private ServiceResponse> getKeysDelegate(Response backupKeyAsync(String vaultBaseUrl, String /** * Requests that a backup of the specified key be downloaded to the client. - * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. + * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. This operation requires the key/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1874,7 +1994,7 @@ public BackupKeyResult call(ServiceResponse response) { /** * Requests that a backup of the specified key be downloaded to the client. - * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. + * The Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical area. This operation requires the key/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -1915,7 +2035,7 @@ private ServiceResponse backupKeyDelegate(Response restoreKeyAsync(String vaultBaseUrl, byte[] keyB /** * Restores a backed up key to a vault. - * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. + * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. This operation requires the keys/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyBundleBackup The backup blob associated with a key bundle. @@ -1962,7 +2082,7 @@ public KeyBundle call(ServiceResponse response) { /** * Restores a backed up key to a vault. - * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. + * Imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier, attributes and access control policies. The RESTORE operation may be used to import a previously backed up key. Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be rejected. While the key name is retained during restore, the final key identifier will change if the key is restored to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the source Key Vault The user must have RESTORE permission in the target Key Vault. This operation requires the keys/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyBundleBackup The backup blob associated with a key bundle. @@ -2005,7 +2125,7 @@ private ServiceResponse restoreKeyDelegate(Response res /** * Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault. - * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2023,7 +2143,7 @@ public KeyOperationResult encrypt(String vaultBaseUrl, String keyName, String ke /** * Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault. - * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2040,7 +2160,7 @@ public ServiceFuture encryptAsync(String vaultBaseUrl, Strin /** * Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault. - * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2061,7 +2181,7 @@ public KeyOperationResult call(ServiceResponse response) { /** * Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault. - * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2117,7 +2237,7 @@ private ServiceResponse encryptDelegate(Response decryptAsync(String vaultBaseUrl, Strin /** * Decrypts a single block of encrypted data. - * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/decrypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2173,7 +2293,7 @@ public KeyOperationResult call(ServiceResponse response) { /** * Decrypts a single block of encrypted data. - * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/decrypt permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2229,7 +2349,7 @@ private ServiceResponse decryptDelegate(Response signAsync(String vaultBaseUrl, String k /** * Creates a signature from a digest using the specified key. - * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. + * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. This operation requires the keys/sign permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2285,7 +2405,7 @@ public KeyOperationResult call(ServiceResponse response) { /** * Creates a signature from a digest using the specified key. - * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. + * The SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this operation uses the private portion of the key. This operation requires the keys/sign permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2341,7 +2461,7 @@ private ServiceResponse signDelegate(Response /** * Verifies a signature using a specified key. - * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. + * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. This operation requires the keys/verify permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2360,7 +2480,7 @@ public KeyVerifyResult verify(String vaultBaseUrl, String keyName, String keyVer /** * Verifies a signature using a specified key. - * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. + * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. This operation requires the keys/verify permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2378,7 +2498,7 @@ public ServiceFuture verifyAsync(String vaultBaseUrl, String ke /** * Verifies a signature using a specified key. - * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. + * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. This operation requires the keys/verify permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2400,7 +2520,7 @@ public KeyVerifyResult call(ServiceResponse response) { /** * Verifies a signature using a specified key. - * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. + * The VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the public portion of the key but this operation is supported as a convenience for callers that only have a key-reference and not the public portion of the key. This operation requires the keys/verify permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2461,7 +2581,7 @@ private ServiceResponse verifyDelegate(Response r /** * Wraps a symmetric key using a specified key. - * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/wrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2479,7 +2599,7 @@ public KeyOperationResult wrapKey(String vaultBaseUrl, String keyName, String ke /** * Wraps a symmetric key using a specified key. - * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/wrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2496,7 +2616,7 @@ public ServiceFuture wrapKeyAsync(String vaultBaseUrl, Strin /** * Wraps a symmetric key using a specified key. - * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/wrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2517,7 +2637,7 @@ public KeyOperationResult call(ServiceResponse response) { /** * Wraps a symmetric key using a specified key. - * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. + * The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/wrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2573,7 +2693,7 @@ private ServiceResponse wrapKeyDelegate(Response unwrapKeyAsync(String vaultBaseUrl, Str /** * Unwraps a symmetric key using the specified key that was initially used for wrapping that key. - * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/unwrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2629,7 +2749,7 @@ public KeyOperationResult call(ServiceResponse response) { /** * Unwraps a symmetric key using the specified key that was initially used for wrapping that key. - * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. + * The UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key. This operation requires the keys/unwrapKey permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key. @@ -2684,7 +2804,8 @@ private ServiceResponse unwrapKeyDelegate(Response nextPage(String nextPageLink) { } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -2723,7 +2845,8 @@ public Observable>> call(String nextPageLin } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2740,7 +2863,8 @@ public Page call(ServiceResponse> response) } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -2761,7 +2885,8 @@ public Observable>> call(ServiceResponse>> call(Response nextPage(String nextPageLink) { } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -2832,7 +2959,8 @@ public Observable>> call(String nextPageLin } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -2850,7 +2978,8 @@ public Page call(ServiceResponse> response) } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -2872,10 +3001,11 @@ public Observable>> call(ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<DeletedKeyItem> object wrapped in {@link ServiceResponse} if successful. */ @@ -2909,10 +3039,11 @@ private ServiceResponse> getDeletedKeysDelegate(Respons } /** - * Retrieves the deleted key information plus its attributes. Authorization: Requires the keys/get permission. + * Gets the public part of a deleted key. + * The Get Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the key + * @param keyName The name of the key. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -2923,10 +3054,11 @@ public DeletedKeyBundle getDeletedKey(String vaultBaseUrl, String keyName) { } /** - * Retrieves the deleted key information plus its attributes. Authorization: Requires the keys/get permission. + * Gets the public part of a deleted key. + * The Get Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the key + * @param keyName The name of the key. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -2936,10 +3068,11 @@ public ServiceFuture getDeletedKeyAsync(String vaultBaseUrl, S } /** - * Retrieves the deleted key information plus its attributes. Authorization: Requires the keys/get permission. + * Gets the public part of a deleted key. + * The Get Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the key + * @param keyName The name of the key. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the DeletedKeyBundle object */ @@ -2953,10 +3086,11 @@ public DeletedKeyBundle call(ServiceResponse response) { } /** - * Retrieves the deleted key information plus its attributes. Authorization: Requires the keys/get permission. + * Gets the public part of a deleted key. + * The Get Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the key + * @param keyName The name of the key. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the DeletedKeyBundle object */ @@ -2993,7 +3127,8 @@ private ServiceResponse getDeletedKeyDelegate(Response purgeDeletedKeyAsync(String vaultBaseUrl, String keyN } /** - * Permanently deletes the specified key. aka purges the key. Authorization: Requires the keys/purge permission. + * Permanently deletes the specified key. + * The Purge Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key @@ -3036,7 +3173,8 @@ public Void call(ServiceResponse response) { } /** - * Permanently deletes the specified key. aka purges the key. Authorization: Requires the keys/purge permission. + * Permanently deletes the specified key. + * The Purge Deleted Key operation is applicable for soft-delete enabled vaults. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param keyName The name of the key @@ -3076,10 +3214,11 @@ private ServiceResponse purgeDeletedKeyDelegate(Response res } /** - * Recovers the deleted key back to its current version under /keys. Authorization: Requires the keys/recover permission. + * Recovers the deleted key to its latest version. + * The Recover Deleted Key operation is applicable for deleted keys in soft-delete enabled vaults. It recovers the deleted key back to its latest version under /keys. An attempt to recover an non-deleted key will return an error. Consider this the inverse of the delete operation on soft-delete enabled vaults. This operation requires the keys/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the deleted key + * @param keyName The name of the deleted key. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -3090,10 +3229,11 @@ public KeyBundle recoverDeletedKey(String vaultBaseUrl, String keyName) { } /** - * Recovers the deleted key back to its current version under /keys. Authorization: Requires the keys/recover permission. + * Recovers the deleted key to its latest version. + * The Recover Deleted Key operation is applicable for deleted keys in soft-delete enabled vaults. It recovers the deleted key back to its latest version under /keys. An attempt to recover an non-deleted key will return an error. Consider this the inverse of the delete operation on soft-delete enabled vaults. This operation requires the keys/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the deleted key + * @param keyName The name of the deleted key. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -3103,10 +3243,11 @@ public ServiceFuture recoverDeletedKeyAsync(String vaultBaseUrl, Stri } /** - * Recovers the deleted key back to its current version under /keys. Authorization: Requires the keys/recover permission. + * Recovers the deleted key to its latest version. + * The Recover Deleted Key operation is applicable for deleted keys in soft-delete enabled vaults. It recovers the deleted key back to its latest version under /keys. An attempt to recover an non-deleted key will return an error. Consider this the inverse of the delete operation on soft-delete enabled vaults. This operation requires the keys/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the deleted key + * @param keyName The name of the deleted key. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the KeyBundle object */ @@ -3120,10 +3261,11 @@ public KeyBundle call(ServiceResponse response) { } /** - * Recovers the deleted key back to its current version under /keys. Authorization: Requires the keys/recover permission. + * Recovers the deleted key to its latest version. + * The Recover Deleted Key operation is applicable for deleted keys in soft-delete enabled vaults. It recovers the deleted key back to its latest version under /keys. An attempt to recover an non-deleted key will return an error. Consider this the inverse of the delete operation on soft-delete enabled vaults. This operation requires the keys/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param keyName The name of the deleted key + * @param keyName The name of the deleted key. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the KeyBundle object */ @@ -3161,7 +3303,7 @@ private ServiceResponse recoverDeletedKeyDelegate(Response setSecretAsync(String vaultBaseUrl, String se /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3211,7 +3353,7 @@ public SecretBundle call(ServiceResponse response) { /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3257,7 +3399,7 @@ public Observable> call(Response res /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3276,7 +3418,7 @@ public SecretBundle setSecret(String vaultBaseUrl, String secretName, String val /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3294,7 +3436,7 @@ public ServiceFuture setSecretAsync(String vaultBaseUrl, String se /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3316,7 +3458,7 @@ public SecretBundle call(ServiceResponse response) { /** * Sets a secret in a specified key vault. - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3371,7 +3513,7 @@ private ServiceResponse setSecretDelegate(Response r /** * Deletes a secret from a specified key vault. - * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. + * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. This operation requires the secrets/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3386,7 +3528,7 @@ public DeletedSecretBundle deleteSecret(String vaultBaseUrl, String secretName) /** * Deletes a secret from a specified key vault. - * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. + * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. This operation requires the secrets/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3400,7 +3542,7 @@ public ServiceFuture deleteSecretAsync(String vaultBaseUrl, /** * Deletes a secret from a specified key vault. - * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. + * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. This operation requires the secrets/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3418,7 +3560,7 @@ public DeletedSecretBundle call(ServiceResponse response) { /** * Deletes a secret from a specified key vault. - * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. + * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an individual version of a secret. This operation requires the secrets/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3459,7 +3601,7 @@ private ServiceResponse deleteSecretDelegate(Response updateSecretAsync(String vaultBaseUrl, String /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3509,7 +3651,7 @@ public SecretBundle call(ServiceResponse response) { /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3554,7 +3696,7 @@ public Observable> call(Response res /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3573,7 +3715,7 @@ public SecretBundle updateSecret(String vaultBaseUrl, String secretName, String /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3591,7 +3733,7 @@ public ServiceFuture updateSecretAsync(String vaultBaseUrl, String /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3613,7 +3755,7 @@ public SecretBundle call(ServiceResponse response) { /** * Updates the attributes associated with a specified secret in a given key vault. - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not specified in the request are left unchanged. The value of a secret itself cannot be changed. This operation requires the secrets/set permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3667,7 +3809,7 @@ private ServiceResponse updateSecretDelegate(Response getSecretAsync(String vaultBaseUrl, String se /** * Get a specified secret from a given key vault. - * The GET operation is applicable to any secret stored in Azure Key Vault. + * The GET operation is applicable to any secret stored in Azure Key Vault. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3717,7 +3859,7 @@ public SecretBundle call(ServiceResponse response) { /** * Get a specified secret from a given key vault. - * The GET operation is applicable to any secret stored in Azure Key Vault. + * The GET operation is applicable to any secret stored in Azure Key Vault. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -3762,7 +3904,7 @@ private ServiceResponse getSecretDelegate(Response r /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -3782,7 +3924,7 @@ public Page nextPage(String nextPageLink) { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -3803,7 +3945,7 @@ public Observable>> call(String nextPageLink) { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -3821,7 +3963,7 @@ public Page call(ServiceResponse> response) { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -3843,7 +3985,7 @@ public Observable>> call(ServiceResponse>> call(Response /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -3895,10 +4037,10 @@ public Page nextPage(String nextPageLink) { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -3917,10 +4059,10 @@ public Observable>> call(String nextPageLink) { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<SecretItem> object */ @@ -3936,10 +4078,10 @@ public Page call(ServiceResponse> response) { /** * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<SecretItem> object */ @@ -3959,10 +4101,10 @@ public Observable>> call(ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<SecretItem> object wrapped in {@link ServiceResponse} if successful. */ @@ -3996,8 +4138,8 @@ private ServiceResponse> getSecretsDelegate(Response nextPage(String nextPageLink) { } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -4039,8 +4181,8 @@ public Observable>> call(String nextPageLink) { } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -4058,8 +4200,8 @@ public Page call(ServiceResponse> response) { } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -4081,8 +4223,8 @@ public Observable>> call(ServiceResponse>> call(Response } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -4138,12 +4280,12 @@ public Page nextPage(String nextPageLink) { } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -4161,12 +4303,12 @@ public Observable>> call(String nextPageLink) { } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<SecretItem> object */ @@ -4181,12 +4323,12 @@ public Page call(ServiceResponse> response) { } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<SecretItem> object */ @@ -4205,12 +4347,12 @@ public Observable>> call(ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param secretName The name of the secret. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified, the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<SecretItem> object wrapped in {@link ServiceResponse} if successful. */ @@ -4247,7 +4389,8 @@ private ServiceResponse> getSecretVersionsDelegate(Response } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -4266,7 +4409,8 @@ public Page nextPage(String nextPageLink) { } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -4286,7 +4430,8 @@ public Observable>> call(String nextPage } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -4303,7 +4448,8 @@ public Page call(ServiceResponse> res } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -4324,7 +4470,8 @@ public Observable>> call(ServiceResponse } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -4354,7 +4501,8 @@ public Observable>> call(Response nextPage(String nextPageLink) { } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -4395,7 +4544,8 @@ public Observable>> call(String nextPage } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -4413,7 +4563,8 @@ public Page call(ServiceResponse> res } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -4435,10 +4586,11 @@ public Observable>> call(ServiceResponse } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. * - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<DeletedSecretItem> object wrapped in {@link ServiceResponse} if successful. */ @@ -4472,10 +4624,11 @@ private ServiceResponse> getDeletedSecretsDelegate(R } /** - * Retrieves the deleted secret information plus its attributes. Authorization: requires the secrets/get permission. + * Gets the specified deleted secret. + * The Get Deleted Secret operation returns the specified deleted secret along with its attributes. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -4486,10 +4639,11 @@ public DeletedSecretBundle getDeletedSecret(String vaultBaseUrl, String secretNa } /** - * Retrieves the deleted secret information plus its attributes. Authorization: requires the secrets/get permission. + * Gets the specified deleted secret. + * The Get Deleted Secret operation returns the specified deleted secret along with its attributes. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -4499,10 +4653,11 @@ public ServiceFuture getDeletedSecretAsync(String vaultBase } /** - * Retrieves the deleted secret information plus its attributes. Authorization: requires the secrets/get permission. + * Gets the specified deleted secret. + * The Get Deleted Secret operation returns the specified deleted secret along with its attributes. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the DeletedSecretBundle object */ @@ -4516,10 +4671,11 @@ public DeletedSecretBundle call(ServiceResponse response) { } /** - * Retrieves the deleted secret information plus its attributes. Authorization: requires the secrets/get permission. + * Gets the specified deleted secret. + * The Get Deleted Secret operation returns the specified deleted secret along with its attributes. This operation requires the secrets/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the DeletedSecretBundle object */ @@ -4556,10 +4712,11 @@ private ServiceResponse getDeletedSecretDelegate(Response purgeDeletedSecretAsync(String vaultBaseUrl, String s } /** - * Permanently deletes the specified secret. aka purges the secret. Authorization: requires the secrets/purge permission. + * Permanently deletes the specified secret. + * The purge deleted secret operation removes the secret permanently, without the possibility of recovery. This operation can only be enabled on a soft-delete enabled vault. This operation requires the secrets/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceResponse} object if successful. */ @@ -4599,10 +4758,11 @@ public Void call(ServiceResponse response) { } /** - * Permanently deletes the specified secret. aka purges the secret. Authorization: requires the secrets/purge permission. + * Permanently deletes the specified secret. + * The purge deleted secret operation removes the secret permanently, without the possibility of recovery. This operation can only be enabled on a soft-delete enabled vault. This operation requires the secrets/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret + * @param secretName The name of the secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceResponse} object if successful. */ @@ -4639,10 +4799,11 @@ private ServiceResponse purgeDeletedSecretDelegate(Response } /** - * Recovers the deleted secret back to its current version under /secrets. Authorization: requires the secrets/recover permission. + * Recovers the deleted secret to the latest version. + * Recovers the deleted secret in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the secrets/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret + * @param secretName The name of the deleted secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent @@ -4653,10 +4814,11 @@ public SecretBundle recoverDeletedSecret(String vaultBaseUrl, String secretName) } /** - * Recovers the deleted secret back to its current version under /secrets. Authorization: requires the secrets/recover permission. + * Recovers the deleted secret to the latest version. + * Recovers the deleted secret in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the secrets/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret + * @param secretName The name of the deleted secret. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object @@ -4666,10 +4828,11 @@ public ServiceFuture recoverDeletedSecretAsync(String vaultBaseUrl } /** - * Recovers the deleted secret back to its current version under /secrets. Authorization: requires the secrets/recover permission. + * Recovers the deleted secret to the latest version. + * Recovers the deleted secret in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the secrets/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret + * @param secretName The name of the deleted secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the SecretBundle object */ @@ -4683,10 +4846,11 @@ public SecretBundle call(ServiceResponse response) { } /** - * Recovers the deleted secret back to its current version under /secrets. Authorization: requires the secrets/recover permission. + * Recovers the deleted secret to the latest version. + * Recovers the deleted secret in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the secrets/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret + * @param secretName The name of the deleted secret. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the SecretBundle object */ @@ -4723,7 +4887,8 @@ private ServiceResponse recoverDeletedSecretDelegate(Response backupSecretAsync(String vaultBaseUrl, } /** - * Requests that a backup of the specified secret be downloaded to the client. Authorization: requires the secrets/backup permission. + * Backs up the specified secret. + * Requests that a backup of the specified secret be downloaded to the client. All versions of the secret will be downloaded. This operation requires the secrets/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -4767,7 +4934,8 @@ public BackupSecretResult call(ServiceResponse response) { } /** - * Requests that a backup of the specified secret be downloaded to the client. Authorization: requires the secrets/backup permission. + * Backs up the specified secret. + * Requests that a backup of the specified secret be downloaded to the client. All versions of the secret will be downloaded. This operation requires the secrets/backup permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. @@ -4807,7 +4975,8 @@ private ServiceResponse backupSecretDelegate(Response restoreSecretAsync(String vaultBaseUrl, byte[ } /** - * Restores a backed up secret to a vault. Authorization: requires the secrets/restore permission. + * Restores a backed up secret to a vault. + * Restores a backed up secret, and all its versions, to a vault. This operation requires the secrets/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretBundleBackup The backup blob associated with a secret bundle. @@ -4851,7 +5022,8 @@ public SecretBundle call(ServiceResponse response) { } /** - * Restores a backed up secret to a vault. Authorization: requires the secrets/restore permission. + * Restores a backed up secret to a vault. + * Restores a backed up secret, and all its versions, to a vault. This operation requires the secrets/restore permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretBundleBackup The backup blob associated with a secret bundle. @@ -4894,7 +5066,7 @@ private ServiceResponse restoreSecretDelegate(Response nextPage(String nextPageLink) { /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -4935,7 +5107,7 @@ public Observable>> call(String nextPageLi /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -4953,7 +5125,7 @@ public Page call(ServiceResponse> respons /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -4975,7 +5147,7 @@ public Observable>> call(ServiceResponse

>> getCertificatesSingleP throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); } final Integer maxresults = null; + final Boolean includePending = null; String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); - return service.getCertificates(maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + return service.getCertificates(maxresults, includePending, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) .flatMap(new Func1, Observable>>>() { @Override public Observable>> call(Response response) { @@ -5006,17 +5179,18 @@ public Observable>> call(Response getCertificates(final String vaultBaseUrl, final Integer maxresults) { - ServiceResponse> response = getCertificatesSinglePageAsync(vaultBaseUrl, maxresults).toBlocking().single(); + public PagedList getCertificates(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending) { + ServiceResponse> response = getCertificatesSinglePageAsync(vaultBaseUrl, maxresults, includePending).toBlocking().single(); return new PagedList(response.body()) { @Override public Page nextPage(String nextPageLink) { @@ -5027,17 +5201,18 @@ public Page nextPage(String nextPageLink) { /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback) { + public ServiceFuture> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getCertificatesSinglePageAsync(vaultBaseUrl, maxresults), + getCertificatesSinglePageAsync(vaultBaseUrl, maxresults, includePending), new Func1>>>() { @Override public Observable>> call(String nextPageLink) { @@ -5049,15 +5224,16 @@ public Observable>> call(String nextPageLi /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<CertificateItem> object */ - public Observable> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults) { - return getCertificatesWithServiceResponseAsync(vaultBaseUrl, maxresults) + public Observable> getCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending) { + return getCertificatesWithServiceResponseAsync(vaultBaseUrl, maxresults, includePending) .map(new Func1>, Page>() { @Override public Page call(ServiceResponse> response) { @@ -5068,15 +5244,16 @@ public Page call(ServiceResponse> respons /** * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<CertificateItem> object */ - public Observable>> getCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults) { - return getCertificatesSinglePageAsync(vaultBaseUrl, maxresults) + public Observable>> getCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending) { + return getCertificatesSinglePageAsync(vaultBaseUrl, maxresults, includePending) .concatMap(new Func1>, Observable>>>() { @Override public Observable>> call(ServiceResponse> page) { @@ -5091,14 +5268,15 @@ public Observable>> call(ServiceResponse

> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + ServiceResponse> * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<CertificateItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getCertificatesSinglePageAsync(final String vaultBaseUrl, final Integer maxresults) { + public Observable>> getCertificatesSinglePageAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending) { if (vaultBaseUrl == null) { throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); } @@ -5106,7 +5284,7 @@ public Observable>> getCertificatesSingleP throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); } String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); - return service.getCertificates(maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + return service.getCertificates(maxresults, includePending, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) .flatMap(new Func1, Observable>>>() { @Override public Observable>> call(Response response) { @@ -5129,7 +5307,7 @@ private ServiceResponse> getCertificatesDelegate(Respo /** * Deletes a certificate from a specified key vault. - * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. + * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. This operation requires the certificates/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -5144,7 +5322,7 @@ public DeletedCertificateBundle deleteCertificate(String vaultBaseUrl, String ce /** * Deletes a certificate from a specified key vault. - * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. + * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. This operation requires the certificates/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -5158,7 +5336,7 @@ public ServiceFuture deleteCertificateAsync(String vau /** * Deletes a certificate from a specified key vault. - * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. + * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. This operation requires the certificates/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -5176,7 +5354,7 @@ public DeletedCertificateBundle call(ServiceResponse r /** * Deletes a certificate from a specified key vault. - * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. + * Deletes all versions of a certificate object along with its associated policy. Delete certificate cannot be used to remove individual versions of a certificate object. This operation requires the certificates/delete permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -5217,7 +5395,7 @@ private ServiceResponse deleteCertificateDelegate(Resp /** * Sets the certificate contacts for the specified key vault. - * Sets the certificate contacts for the specified key vault. Authorization: requires the certificates/managecontacts permission. + * Sets the certificate contacts for the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param contacts The contacts for the key vault certificate. @@ -5232,7 +5410,7 @@ public Contacts setCertificateContacts(String vaultBaseUrl, Contacts contacts) { /** * Sets the certificate contacts for the specified key vault. - * Sets the certificate contacts for the specified key vault. Authorization: requires the certificates/managecontacts permission. + * Sets the certificate contacts for the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param contacts The contacts for the key vault certificate. @@ -5246,7 +5424,7 @@ public ServiceFuture setCertificateContactsAsync(String vaultBaseUrl, /** * Sets the certificate contacts for the specified key vault. - * Sets the certificate contacts for the specified key vault. Authorization: requires the certificates/managecontacts permission. + * Sets the certificate contacts for the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param contacts The contacts for the key vault certificate. @@ -5264,7 +5442,7 @@ public Contacts call(ServiceResponse response) { /** * Sets the certificate contacts for the specified key vault. - * Sets the certificate contacts for the specified key vault. Authorization: requires the certificates/managecontacts permission. + * Sets the certificate contacts for the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param contacts The contacts for the key vault certificate. @@ -5306,7 +5484,7 @@ private ServiceResponse setCertificateContactsDelegate(Response getCertificateContactsAsync(String vaultBaseUrl, /** * Lists the certificate contacts for a specified key vault. - * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. + * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -5350,7 +5528,7 @@ public Contacts call(ServiceResponse response) { /** * Lists the certificate contacts for a specified key vault. - * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. + * The GetCertificateContacts operation returns the set of certificate contact resources in the specified key vault. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -5387,7 +5565,7 @@ private ServiceResponse getCertificateContactsDelegate(Response deleteCertificateContactsAsync(String vaultBaseUr /** * Deletes the certificate contacts for a specified key vault. - * Deletes the certificate contacts for a specified key vault certificate. Authorization: requires the certificates/managecontacts permission. + * Deletes the certificate contacts for a specified key vault certificate. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -5431,7 +5609,7 @@ public Contacts call(ServiceResponse response) { /** * Deletes the certificate contacts for a specified key vault. - * Deletes the certificate contacts for a specified key vault certificate. Authorization: requires the certificates/managecontacts permission. + * Deletes the certificate contacts for a specified key vault certificate. This operation requires the certificates/managecontacts permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -5468,7 +5646,7 @@ private ServiceResponse deleteCertificateContactsDelegate(Response nextPage(String nextPageLink) { /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -5509,7 +5687,7 @@ public Observable>> call(String next /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -5527,7 +5705,7 @@ public Page call(ServiceResponse>> call(ServiceResp /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -5580,7 +5758,7 @@ public Observable>> call(Response nextPage(String nextPageLink) { /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -5623,7 +5801,7 @@ public Observable>> call(String next /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. @@ -5642,7 +5820,7 @@ public Page call(ServiceResponse>> call(ServiceResp /** * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<CertificateIssuerItem> object wrapped in {@link ServiceResponse} if successful. */ @@ -5703,7 +5881,7 @@ private ServiceResponse> getCertificateIssuersDe /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -5719,7 +5897,7 @@ public IssuerBundle setCertificateIssuer(String vaultBaseUrl, String issuerName, /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -5734,7 +5912,7 @@ public ServiceFuture setCertificateIssuerAsync(String vaultBaseUrl /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -5753,7 +5931,7 @@ public IssuerBundle call(ServiceResponse response) { /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -5799,7 +5977,7 @@ public Observable> call(Response res /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -5818,7 +5996,7 @@ public IssuerBundle setCertificateIssuer(String vaultBaseUrl, String issuerName, /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -5836,7 +6014,7 @@ public ServiceFuture setCertificateIssuerAsync(String vaultBaseUrl /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -5858,7 +6036,7 @@ public IssuerBundle call(ServiceResponse response) { /** * Sets the specified certificate issuer. - * The SetCertificateIssuer operation adds or updates the specified certificate issuer. + * The SetCertificateIssuer operation adds or updates the specified certificate issuer. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -5914,7 +6092,7 @@ private ServiceResponse setCertificateIssuerDelegate(Response updateCertificateIssuerAsync(String vaultBase /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -5961,7 +6139,7 @@ public IssuerBundle call(ServiceResponse response) { /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -6004,7 +6182,7 @@ public Observable> call(Response res /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -6023,7 +6201,7 @@ public IssuerBundle updateCertificateIssuer(String vaultBaseUrl, String issuerNa /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -6041,7 +6219,7 @@ public ServiceFuture updateCertificateIssuerAsync(String vaultBase /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -6063,7 +6241,7 @@ public IssuerBundle call(ServiceResponse response) { /** * Updates the specified certificate issuer. - * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. + * The UpdateCertificateIssuer operation performs an update on the specified certificate issuer entity. This operation requires the certificates/setissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -6116,7 +6294,7 @@ private ServiceResponse updateCertificateIssuerDelegate(Response getCertificateIssuerAsync(String vaultBaseUrl /** * Lists the specified certificate issuer. - * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. + * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -6163,7 +6341,7 @@ public IssuerBundle call(ServiceResponse response) { /** * Lists the specified certificate issuer. - * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. + * The GetCertificateIssuer operation returns the specified certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -6204,7 +6382,7 @@ private ServiceResponse getCertificateIssuerDelegate(Response deleteCertificateIssuerAsync(String vaultBase /** * Deletes the specified certificate issuer. - * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. + * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. This operation requires the certificates/manageissuers/deleteissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -6251,7 +6429,7 @@ public IssuerBundle call(ServiceResponse response) { /** * Deletes the specified certificate issuer. - * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. + * The DeleteCertificateIssuer operation permanently removes the specified certificate issuer from the vault. This operation requires the certificates/manageissuers/deleteissuers permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param issuerName The name of the issuer. @@ -6292,7 +6470,7 @@ private ServiceResponse deleteCertificateIssuerDelegate(Response createCertificateAsync(String vaultBa /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6339,7 +6517,7 @@ public CertificateOperation call(ServiceResponse response) /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6380,7 +6558,7 @@ public Observable> call(Response createCertificateAsync(String vaultBa /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6436,7 +6614,7 @@ public CertificateOperation call(ServiceResponse response) /** * Creates a new certificate. - * If this is the first version, the certificate resource is created. + * If this is the first version, the certificate resource is created. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6487,7 +6665,7 @@ private ServiceResponse createCertificateDelegate(Response /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6503,7 +6681,7 @@ public CertificateBundle importCertificate(String vaultBaseUrl, String certifica /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6518,7 +6696,7 @@ public ServiceFuture importCertificateAsync(String vaultBaseU /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6537,7 +6715,7 @@ public CertificateBundle call(ServiceResponse response) { /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6585,7 +6763,7 @@ public Observable> call(Response importCertificateAsync(String vaultBaseU /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6647,7 +6825,7 @@ public CertificateBundle call(ServiceResponse response) { /** * Imports a certificate into a specified key vault. - * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. + * Imports an existing valid certificate, containing a private key, into Azure Key Vault. The certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must contain the key as well as x509 certificates. This operation requires the certificates/import permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6705,7 +6883,7 @@ private ServiceResponse importCertificateDelegate(Response nextPage(String nextPageLink) { /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6748,7 +6926,7 @@ public Observable>> call(String nextPageLi /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6767,7 +6945,7 @@ public Page call(ServiceResponse> respons /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6790,7 +6968,7 @@ public Observable>> call(ServiceResponse

>> call(Response nextPage(String nextPageLink) { /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6870,7 +7048,7 @@ public Observable>> call(String nextPageLi /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6890,7 +7068,7 @@ public Page call(ServiceResponse> respons /** * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -6914,11 +7092,11 @@ public Observable>> call(ServiceResponse

> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param certificateName The name of the certificate. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<CertificateItem> object wrapped in {@link ServiceResponse} if successful. */ @@ -6956,7 +7134,7 @@ private ServiceResponse> getCertificateVersionsDelegat /** * Lists the policy for a certificate. - * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. + * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in a given key vault. @@ -6971,7 +7149,7 @@ public CertificatePolicy getCertificatePolicy(String vaultBaseUrl, String certif /** * Lists the policy for a certificate. - * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. + * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in a given key vault. @@ -6985,7 +7163,7 @@ public ServiceFuture getCertificatePolicyAsync(String vaultBa /** * Lists the policy for a certificate. - * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. + * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in a given key vault. @@ -7003,7 +7181,7 @@ public CertificatePolicy call(ServiceResponse response) { /** * Lists the policy for a certificate. - * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. + * The GetCertificatePolicy operation returns the specified certificate policy resources in the specified key vault. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in a given key vault. @@ -7044,7 +7222,7 @@ private ServiceResponse getCertificatePolicyDelegate(Response /** * Updates the policy for a certificate. - * Set specified members in the certificate policy. Leave others as null. + * Set specified members in the certificate policy. Leave others as null. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -7060,7 +7238,7 @@ public CertificatePolicy updateCertificatePolicy(String vaultBaseUrl, String cer /** * Updates the policy for a certificate. - * Set specified members in the certificate policy. Leave others as null. + * Set specified members in the certificate policy. Leave others as null. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -7075,7 +7253,7 @@ public ServiceFuture updateCertificatePolicyAsync(String vaul /** * Updates the policy for a certificate. - * Set specified members in the certificate policy. Leave others as null. + * Set specified members in the certificate policy. Leave others as null. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -7094,7 +7272,7 @@ public CertificatePolicy call(ServiceResponse response) { /** * Updates the policy for a certificate. - * Set specified members in the certificate policy. Leave others as null. + * Set specified members in the certificate policy. Leave others as null. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -7140,7 +7318,7 @@ private ServiceResponse updateCertificatePolicyDelegate(Respo /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -7156,7 +7334,7 @@ public CertificateBundle updateCertificate(String vaultBaseUrl, String certifica /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -7171,7 +7349,7 @@ public ServiceFuture updateCertificateAsync(String vaultBaseU /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -7190,7 +7368,7 @@ public CertificateBundle call(ServiceResponse response) { /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -7235,7 +7413,7 @@ public Observable> call(Response updateCertificateAsync(String vaultBaseU /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -7294,7 +7472,7 @@ public CertificateBundle call(ServiceResponse response) { /** * Updates the specified attributes associated with the given certificate. - * The UpdateCertificate operation applies the specified update on the given certificate; note the only elements being updated are the certificate's attributes. + * The UpdateCertificate operation applies the specified update on the given certificate; the only elements updated are the certificate's attributes. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given key vault. @@ -7348,7 +7526,8 @@ private ServiceResponse updateCertificateDelegate(Response getCertificateAsync(String vaultBaseUrl, } /** - * Gets information about a specified certificate. Authorization: requires the certificates/get permission. + * Gets information about a certificate. + * Gets information about a specific certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -7395,7 +7576,8 @@ public CertificateBundle call(ServiceResponse response) { } /** - * Gets information about a specified certificate. Authorization: requires the certificates/get permission. + * Gets information about a certificate. + * Gets information about a specific certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate in the given vault. @@ -7439,7 +7621,8 @@ private ServiceResponse getCertificateDelegate(Response updateCertificateOperationAsync(Strin } /** - * Updates a certificate operation. Authorization: requires the certificates/update permission. + * Updates a certificate operation. + * Updates a certificate creation operation that is already in progress. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7486,7 +7671,8 @@ public CertificateOperation call(ServiceResponse response) } /** - * Updates a certificate operation. Authorization: requires the certificates/update permission. + * Updates a certificate operation. + * Updates a certificate creation operation that is already in progress. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7529,7 +7715,8 @@ private ServiceResponse updateCertificateOperationDelegate } /** - * Gets the operation associated with a specified certificate. Authorization: requires the certificates/get permission. + * Gets the creation operation of a certificate. + * Gets the creation operation associated with a specified certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7543,7 +7730,8 @@ public CertificateOperation getCertificateOperation(String vaultBaseUrl, String } /** - * Gets the operation associated with a specified certificate. Authorization: requires the certificates/get permission. + * Gets the creation operation of a certificate. + * Gets the creation operation associated with a specified certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7556,7 +7744,8 @@ public ServiceFuture getCertificateOperationAsync(String v } /** - * Gets the operation associated with a specified certificate. Authorization: requires the certificates/get permission. + * Gets the creation operation of a certificate. + * Gets the creation operation associated with a specified certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7573,7 +7762,8 @@ public CertificateOperation call(ServiceResponse response) } /** - * Gets the operation associated with a specified certificate. Authorization: requires the certificates/get permission. + * Gets the creation operation of a certificate. + * Gets the creation operation associated with a specified certificate. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7613,7 +7803,8 @@ private ServiceResponse getCertificateOperationDelegate(Re } /** - * Deletes the operation for a specified certificate. Authorization: requires the certificates/update permission. + * Deletes the creation operation for a specific certificate. + * Deletes the creation operation for a specified certificate that is in the process of being created. The certificate is no longer created. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7627,7 +7818,8 @@ public CertificateOperation deleteCertificateOperation(String vaultBaseUrl, Stri } /** - * Deletes the operation for a specified certificate. Authorization: requires the certificates/update permission. + * Deletes the creation operation for a specific certificate. + * Deletes the creation operation for a specified certificate that is in the process of being created. The certificate is no longer created. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7640,7 +7832,8 @@ public ServiceFuture deleteCertificateOperationAsync(Strin } /** - * Deletes the operation for a specified certificate. Authorization: requires the certificates/update permission. + * Deletes the creation operation for a specific certificate. + * Deletes the creation operation for a specified certificate that is in the process of being created. The certificate is no longer created. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7657,7 +7850,8 @@ public CertificateOperation call(ServiceResponse response) } /** - * Deletes the operation for a specified certificate. Authorization: requires the certificates/update permission. + * Deletes the creation operation for a specific certificate. + * Deletes the creation operation for a specified certificate that is in the process of being created. The certificate is no longer created. This operation requires the certificates/update permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7698,7 +7892,7 @@ private ServiceResponse deleteCertificateOperationDelegate /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7714,7 +7908,7 @@ public CertificateBundle mergeCertificate(String vaultBaseUrl, String certificat /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7729,7 +7923,7 @@ public ServiceFuture mergeCertificateAsync(String vaultBaseUr /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7748,7 +7942,7 @@ public CertificateBundle call(ServiceResponse response) { /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7793,7 +7987,7 @@ public Observable> call(Response mergeCertificateAsync(String vaultBaseUr /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7849,7 +8043,7 @@ public CertificateBundle call(ServiceResponse response) { /** * Merges a certificate or a certificate chain with a key pair existing on the server. - * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. Authorization: requires the certificates/update permission. + * The MergeCertificate operation performs the merging of a certificate or certificate chain with a key pair currently available in the service. This operation requires the certificates/create permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate. @@ -7902,8 +8096,8 @@ private ServiceResponse mergeCertificateDelegate(Response nextPage(String nextPageLink) { } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. @@ -7943,8 +8137,8 @@ public Observable>> call(String nex } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -7961,8 +8155,8 @@ public Page call(ServiceResponse>> call(ServiceRes } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation @@ -7998,8 +8192,9 @@ public Observable>> getDeletedCerti throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); } final Integer maxresults = null; + final Boolean includePending = null; String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); - return service.getDeletedCertificates(maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + return service.getDeletedCertificates(maxresults, includePending, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) .flatMap(new Func1, Observable>>>() { @Override public Observable>> call(Response response) { @@ -8014,18 +8209,19 @@ public Observable>> call(Response getDeletedCertificates(final String vaultBaseUrl, final Integer maxresults) { - ServiceResponse> response = getDeletedCertificatesSinglePageAsync(vaultBaseUrl, maxresults).toBlocking().single(); + public PagedList getDeletedCertificates(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending) { + ServiceResponse> response = getDeletedCertificatesSinglePageAsync(vaultBaseUrl, maxresults, includePending).toBlocking().single(); return new PagedList(response.body()) { @Override public Page nextPage(String nextPageLink) { @@ -8035,18 +8231,19 @@ public Page nextPage(String nextPageLink) { } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback) { + public ServiceFuture> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getDeletedCertificatesSinglePageAsync(vaultBaseUrl, maxresults), + getDeletedCertificatesSinglePageAsync(vaultBaseUrl, maxresults, includePending), new Func1>>>() { @Override public Observable>> call(String nextPageLink) { @@ -8057,16 +8254,17 @@ public Observable>> call(String nex } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the observable to the PagedList<DeletedCertificateItem> object */ - public Observable> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults) { - return getDeletedCertificatesWithServiceResponseAsync(vaultBaseUrl, maxresults) + public Observable> getDeletedCertificatesAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending) { + return getDeletedCertificatesWithServiceResponseAsync(vaultBaseUrl, maxresults, includePending) .map(new Func1>, Page>() { @Override public Page call(ServiceResponse> response) { @@ -8076,16 +8274,17 @@ public Page call(ServiceResponse>> getDeletedCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults) { - return getDeletedCertificatesSinglePageAsync(vaultBaseUrl, maxresults) + public Observable>> getDeletedCertificatesWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending) { + return getDeletedCertificatesSinglePageAsync(vaultBaseUrl, maxresults, includePending) .concatMap(new Func1>, Observable>>>() { @Override public Observable>> call(ServiceResponse> page) { @@ -8099,15 +8298,16 @@ public Observable>> call(ServiceRes } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + ServiceResponse> * @param includePending Specifies whether to include certificates which are not completely provisioned. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the PagedList<DeletedCertificateItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getDeletedCertificatesSinglePageAsync(final String vaultBaseUrl, final Integer maxresults) { + public Observable>> getDeletedCertificatesSinglePageAsync(final String vaultBaseUrl, final Integer maxresults, final Boolean includePending) { if (vaultBaseUrl == null) { throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); } @@ -8115,7 +8315,7 @@ public Observable>> getDeletedCerti throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); } String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); - return service.getDeletedCertificates(maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + return service.getDeletedCertificates(maxresults, includePending, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) .flatMap(new Func1, Observable>>>() { @Override public Observable>> call(Response response) { @@ -8138,7 +8338,7 @@ private ServiceResponse> getDeletedCertificates /** * Retrieves information about the specified deleted certificate. - * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. + * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -8153,7 +8353,7 @@ public DeletedCertificateBundle getDeletedCertificate(String vaultBaseUrl, Strin /** * Retrieves information about the specified deleted certificate. - * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. + * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -8167,7 +8367,7 @@ public ServiceFuture getDeletedCertificateAsync(String /** * Retrieves information about the specified deleted certificate. - * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. + * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -8185,7 +8385,7 @@ public DeletedCertificateBundle call(ServiceResponse r /** * Retrieves information about the specified deleted certificate. - * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. + * The GetDeletedCertificate operation retrieves the deleted certificate information plus its attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level. This operation requires the certificates/get permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -8226,7 +8426,7 @@ private ServiceResponse getDeletedCertificateDelegate( /** * Permanently deletes the specified deleted certificate. - * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. Requires the explicit granting of the 'purge' permission. + * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. This operation requires the certificate/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -8240,7 +8440,7 @@ public void purgeDeletedCertificate(String vaultBaseUrl, String certificateName) /** * Permanently deletes the specified deleted certificate. - * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. Requires the explicit granting of the 'purge' permission. + * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. This operation requires the certificate/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -8254,7 +8454,7 @@ public ServiceFuture purgeDeletedCertificateAsync(String vaultBaseUrl, Str /** * Permanently deletes the specified deleted certificate. - * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. Requires the explicit granting of the 'purge' permission. + * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. This operation requires the certificate/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -8272,7 +8472,7 @@ public Void call(ServiceResponse response) { /** * Permanently deletes the specified deleted certificate. - * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. Requires the explicit granting of the 'purge' permission. + * The PurgeDeletedCertificate operation performs an irreversible deletion of the specified certificate, without possibility for recovery. The operation is not available if the recovery level does not specify 'Purgeable'. This operation requires the certificate/purge permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the certificate @@ -8313,7 +8513,7 @@ private ServiceResponse purgeDeletedCertificateDelegate(Response recoverDeletedCertificateAsync(String va /** * Recovers the deleted certificate back to its current version under /certificates. - * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). + * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). This operation requires the certificates/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the deleted certificate @@ -8360,7 +8560,7 @@ public CertificateBundle call(ServiceResponse response) { /** * Recovers the deleted certificate back to its current version under /certificates. - * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). + * The RecoverDeletedCertificate operation performs the reversal of the Delete operation. The operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval (available in the deleted certificate's attributes). This operation requires the certificates/recover permission. * * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param certificateName The name of the deleted certificate @@ -8400,107 +8600,105 @@ private ServiceResponse recoverDeletedCertificateDelegate(Res } /** - * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<KeyItem> object if successful. + * @return the PagedList<StorageAccountItem> object if successful. */ - public PagedList getKeyVersionsNext(final String nextPageLink) { - ServiceResponse> response = getKeyVersionsNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getStorageAccounts(final String vaultBaseUrl) { + ServiceResponse> response = getStorageAccountsSinglePageAsync(vaultBaseUrl).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getKeyVersionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getStorageAccountsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getKeyVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getStorageAccountsAsync(final String vaultBaseUrl, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getKeyVersionsNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getStorageAccountsSinglePageAsync(vaultBaseUrl), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getKeyVersionsNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getStorageAccountsNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<KeyItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - public Observable> getKeyVersionsNextAsync(final String nextPageLink) { - return getKeyVersionsNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getStorageAccountsAsync(final String vaultBaseUrl) { + return getStorageAccountsWithServiceResponseAsync(vaultBaseUrl) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<KeyItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - public Observable>> getKeyVersionsNextWithServiceResponseAsync(final String nextPageLink) { - return getKeyVersionsNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getStorageAccountsWithServiceResponseAsync(final String vaultBaseUrl) { + return getStorageAccountsSinglePageAsync(vaultBaseUrl) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getKeyVersionsNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getStorageAccountsNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * Retrieves a list of individual key versions with the same key name. - * The full key identifier, attributes, and tags are provided in the response. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<KeyItem> object wrapped in {@link ServiceResponse} if successful. + * @return the PagedList<StorageAccountItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getKeyVersionsNextSinglePageAsync(final String nextPageLink) { - if (nextPageLink == null) { - throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + public Observable>> getStorageAccountsSinglePageAsync(final String vaultBaseUrl) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); } - String nextUrl = String.format("%s", nextPageLink); - return service.getKeyVersionsNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + final Integer maxresults = null; + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getStorageAccounts(maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getKeyVersionsNextDelegate(response); - return Observable.just(new ServiceResponse>(result.body(), result.response())); + ServiceResponse> result = getStorageAccountsDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); } @@ -8508,115 +8706,110 @@ public Observable>> call(Response re }); } - private ServiceResponse> getKeyVersionsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) - .registerError(KeyVaultErrorException.class) - .build(response); - } - /** - * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<KeyItem> object if successful. + * @return the PagedList<StorageAccountItem> object if successful. */ - public PagedList getKeysNext(final String nextPageLink) { - ServiceResponse> response = getKeysNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getStorageAccounts(final String vaultBaseUrl, final Integer maxresults) { + ServiceResponse> response = getStorageAccountsSinglePageAsync(vaultBaseUrl, maxresults).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getKeysNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getStorageAccountsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getKeysNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getStorageAccountsAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getKeysNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getStorageAccountsSinglePageAsync(vaultBaseUrl, maxresults), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getKeysNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getStorageAccountsNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<KeyItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - public Observable> getKeysNextAsync(final String nextPageLink) { - return getKeysNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getStorageAccountsAsync(final String vaultBaseUrl, final Integer maxresults) { + return getStorageAccountsWithServiceResponseAsync(vaultBaseUrl, maxresults) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<KeyItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - public Observable>> getKeysNextWithServiceResponseAsync(final String nextPageLink) { - return getKeysNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getStorageAccountsWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults) { + return getStorageAccountsSinglePageAsync(vaultBaseUrl, maxresults) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getKeysNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getStorageAccountsNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * List keys in the specified vault. - * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. Authorization: Requires the keys/list permission. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<KeyItem> object wrapped in {@link ServiceResponse} if successful. + * @return the PagedList<StorageAccountItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getKeysNextSinglePageAsync(final String nextPageLink) { - if (nextPageLink == null) { - throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + public Observable>> getStorageAccountsSinglePageAsync(final String vaultBaseUrl, final Integer maxresults) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); } - String nextUrl = String.format("%s", nextPageLink); - return service.getKeysNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getStorageAccounts(maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getKeysNextDelegate(response); - return Observable.just(new ServiceResponse>(result.body(), result.response())); + ServiceResponse> result = getStorageAccountsDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); } @@ -8624,109 +8817,3030 @@ public Observable>> call(Response re }); } - private ServiceResponse> getKeysNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) + private ServiceResponse> getStorageAccountsDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) .registerError(KeyVaultErrorException.class) .build(response); } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<DeletedKeyItem> object if successful. + * @return the PagedList<DeletedStorageAccountItem> object if successful. */ - public PagedList getDeletedKeysNext(final String nextPageLink) { - ServiceResponse> response = getDeletedKeysNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getDeletedStorageAccounts(final String vaultBaseUrl) { + ServiceResponse> response = getDeletedStorageAccountsSinglePageAsync(vaultBaseUrl).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getDeletedKeysNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getDeletedStorageAccountsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. - * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param serviceCallback the async ServiceCallback to handle successful and failed responses. * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getDeletedKeysNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getDeletedStorageAccountsAsync(final String vaultBaseUrl, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getDeletedKeysNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getDeletedStorageAccountsSinglePageAsync(vaultBaseUrl), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getDeletedKeysNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getDeletedStorageAccountsNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedKeyItem> object + * @return the observable to the PagedList<DeletedStorageAccountItem> object */ - public Observable> getDeletedKeysNextAsync(final String nextPageLink) { - return getDeletedKeysNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getDeletedStorageAccountsAsync(final String vaultBaseUrl) { + return getDeletedStorageAccountsWithServiceResponseAsync(vaultBaseUrl) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedKeyItem> object + * @return the observable to the PagedList<DeletedStorageAccountItem> object */ - public Observable>> getDeletedKeysNextWithServiceResponseAsync(final String nextPageLink) { - return getDeletedKeysNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getDeletedStorageAccountsWithServiceResponseAsync(final String vaultBaseUrl) { + return getDeletedStorageAccountsSinglePageAsync(vaultBaseUrl) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getDeletedKeysNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getDeletedStorageAccountsNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * List deleted keys in the specified vault. Authorization: Requires the keys/list permission. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<DeletedKeyItem> object wrapped in {@link ServiceResponse} if successful. + * @return the PagedList<DeletedStorageAccountItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getDeletedKeysNextSinglePageAsync(final String nextPageLink) { - if (nextPageLink == null) { - throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + public Observable>> getDeletedStorageAccountsSinglePageAsync(final String vaultBaseUrl) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); } - String nextUrl = String.format("%s", nextPageLink); - return service.getDeletedKeysNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + final Integer maxresults = null; + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getDeletedStorageAccounts(maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getDeletedKeysNextDelegate(response); + ServiceResponse> result = getDeletedStorageAccountsDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedStorageAccountItem> object if successful. + */ + public PagedList getDeletedStorageAccounts(final String vaultBaseUrl, final Integer maxresults) { + ServiceResponse> response = getDeletedStorageAccountsSinglePageAsync(vaultBaseUrl, maxresults).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getDeletedStorageAccountsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getDeletedStorageAccountsAsync(final String vaultBaseUrl, final Integer maxresults, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getDeletedStorageAccountsSinglePageAsync(vaultBaseUrl, maxresults), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getDeletedStorageAccountsNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedStorageAccountItem> object + */ + public Observable> getDeletedStorageAccountsAsync(final String vaultBaseUrl, final Integer maxresults) { + return getDeletedStorageAccountsWithServiceResponseAsync(vaultBaseUrl, maxresults) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedStorageAccountItem> object + */ + public Observable>> getDeletedStorageAccountsWithServiceResponseAsync(final String vaultBaseUrl, final Integer maxresults) { + return getDeletedStorageAccountsSinglePageAsync(vaultBaseUrl, maxresults) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getDeletedStorageAccountsNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. + * + ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<DeletedStorageAccountItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getDeletedStorageAccountsSinglePageAsync(final String vaultBaseUrl, final Integer maxresults) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getDeletedStorageAccounts(maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getDeletedStorageAccountsDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse> getDeletedStorageAccountsDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Gets the specified deleted storage account. + * The Get Deleted Storage Account operation returns the specified deleted storage account along with its attributes. This operation requires the storage/get permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the DeletedStorageBundle object if successful. + */ + public DeletedStorageBundle getDeletedStorageAccount(String vaultBaseUrl, String storageAccountName) { + return getDeletedStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).toBlocking().single().body(); + } + + /** + * Gets the specified deleted storage account. + * The Get Deleted Storage Account operation returns the specified deleted storage account along with its attributes. This operation requires the storage/get permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture getDeletedStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(getDeletedStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName), serviceCallback); + } + + /** + * Gets the specified deleted storage account. + * The Get Deleted Storage Account operation returns the specified deleted storage account along with its attributes. This operation requires the storage/get permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedStorageBundle object + */ + public Observable getDeletedStorageAccountAsync(String vaultBaseUrl, String storageAccountName) { + return getDeletedStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).map(new Func1, DeletedStorageBundle>() { + @Override + public DeletedStorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Gets the specified deleted storage account. + * The Get Deleted Storage Account operation returns the specified deleted storage account along with its attributes. This operation requires the storage/get permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedStorageBundle object + */ + public Observable> getDeletedStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getDeletedStorageAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = getDeletedStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse getDeletedStorageAccountDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Permanently deletes the specified storage account. + * The purge deleted storage account operation removes the secret permanently, without the possibility of recovery. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/purge permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + */ + public void purgeDeletedStorgeAccount(String vaultBaseUrl, String storageAccountName) { + purgeDeletedStorgeAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).toBlocking().single().body(); + } + + /** + * Permanently deletes the specified storage account. + * The purge deleted storage account operation removes the secret permanently, without the possibility of recovery. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/purge permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture purgeDeletedStorgeAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(purgeDeletedStorgeAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName), serviceCallback); + } + + /** + * Permanently deletes the specified storage account. + * The purge deleted storage account operation removes the secret permanently, without the possibility of recovery. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/purge permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceResponse} object if successful. + */ + public Observable purgeDeletedStorgeAccountAsync(String vaultBaseUrl, String storageAccountName) { + return purgeDeletedStorgeAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).map(new Func1, Void>() { + @Override + public Void call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Permanently deletes the specified storage account. + * The purge deleted storage account operation removes the secret permanently, without the possibility of recovery. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/purge permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceResponse} object if successful. + */ + public Observable> purgeDeletedStorgeAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.purgeDeletedStorgeAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = purgeDeletedStorgeAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse purgeDeletedStorgeAccountDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(204, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Recovers the deleted storage account. + * Recovers the deleted storage account in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + public StorageBundle recoverDeletedStorageAccount(String vaultBaseUrl, String storageAccountName) { + return recoverDeletedStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).toBlocking().single().body(); + } + + /** + * Recovers the deleted storage account. + * Recovers the deleted storage account in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture recoverDeletedStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(recoverDeletedStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName), serviceCallback); + } + + /** + * Recovers the deleted storage account. + * Recovers the deleted storage account in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable recoverDeletedStorageAccountAsync(String vaultBaseUrl, String storageAccountName) { + return recoverDeletedStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).map(new Func1, StorageBundle>() { + @Override + public StorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Recovers the deleted storage account. + * Recovers the deleted storage account in the specified vault. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable> recoverDeletedStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.recoverDeletedStorageAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = recoverDeletedStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse recoverDeletedStorageAccountDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Backs up the specified storage account. + * Requests that a backup of the specified storage account be downloaded to the client. This operation requires the storage/backup permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the BackupStorageResult object if successful. + */ + public BackupStorageResult backupStorageAccount(String vaultBaseUrl, String storageAccountName) { + return backupStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).toBlocking().single().body(); + } + + /** + * Backs up the specified storage account. + * Requests that a backup of the specified storage account be downloaded to the client. This operation requires the storage/backup permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture backupStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(backupStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName), serviceCallback); + } + + /** + * Backs up the specified storage account. + * Requests that a backup of the specified storage account be downloaded to the client. This operation requires the storage/backup permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the BackupStorageResult object + */ + public Observable backupStorageAccountAsync(String vaultBaseUrl, String storageAccountName) { + return backupStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).map(new Func1, BackupStorageResult>() { + @Override + public BackupStorageResult call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Backs up the specified storage account. + * Requests that a backup of the specified storage account be downloaded to the client. This operation requires the storage/backup permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the BackupStorageResult object + */ + public Observable> backupStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.backupStorageAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = backupStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse backupStorageAccountDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Restores a backed up storage account to a vault. + * Restores a backed up storage account to a vault. This operation requires the storage/restore permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageBundleBackup The backup blob associated with a storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + public StorageBundle restoreStorageAccount(String vaultBaseUrl, byte[] storageBundleBackup) { + return restoreStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageBundleBackup).toBlocking().single().body(); + } + + /** + * Restores a backed up storage account to a vault. + * Restores a backed up storage account to a vault. This operation requires the storage/restore permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageBundleBackup The backup blob associated with a storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture restoreStorageAccountAsync(String vaultBaseUrl, byte[] storageBundleBackup, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(restoreStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageBundleBackup), serviceCallback); + } + + /** + * Restores a backed up storage account to a vault. + * Restores a backed up storage account to a vault. This operation requires the storage/restore permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageBundleBackup The backup blob associated with a storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable restoreStorageAccountAsync(String vaultBaseUrl, byte[] storageBundleBackup) { + return restoreStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageBundleBackup).map(new Func1, StorageBundle>() { + @Override + public StorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Restores a backed up storage account to a vault. + * Restores a backed up storage account to a vault. This operation requires the storage/restore permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageBundleBackup The backup blob associated with a storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable> restoreStorageAccountWithServiceResponseAsync(String vaultBaseUrl, byte[] storageBundleBackup) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + if (storageBundleBackup == null) { + throw new IllegalArgumentException("Parameter storageBundleBackup is required and cannot be null."); + } + StorageRestoreParameters parameters = new StorageRestoreParameters(); + parameters.withStorageBundleBackup(storageBundleBackup); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.restoreStorageAccount(this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = restoreStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse restoreStorageAccountDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Deletes a storage account. This operation requires the storage/delete permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the DeletedStorageBundle object if successful. + */ + public DeletedStorageBundle deleteStorageAccount(String vaultBaseUrl, String storageAccountName) { + return deleteStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).toBlocking().single().body(); + } + + /** + * Deletes a storage account. This operation requires the storage/delete permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture deleteStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(deleteStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName), serviceCallback); + } + + /** + * Deletes a storage account. This operation requires the storage/delete permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedStorageBundle object + */ + public Observable deleteStorageAccountAsync(String vaultBaseUrl, String storageAccountName) { + return deleteStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).map(new Func1, DeletedStorageBundle>() { + @Override + public DeletedStorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Deletes a storage account. This operation requires the storage/delete permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedStorageBundle object + */ + public Observable> deleteStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.deleteStorageAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = deleteStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse deleteStorageAccountDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Gets information about a specified storage account. This operation requires the storage/get permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + public StorageBundle getStorageAccount(String vaultBaseUrl, String storageAccountName) { + return getStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).toBlocking().single().body(); + } + + /** + * Gets information about a specified storage account. This operation requires the storage/get permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture getStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(getStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName), serviceCallback); + } + + /** + * Gets information about a specified storage account. This operation requires the storage/get permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable getStorageAccountAsync(String vaultBaseUrl, String storageAccountName) { + return getStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).map(new Func1, StorageBundle>() { + @Override + public StorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Gets information about a specified storage account. This operation requires the storage/get permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable> getStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getStorageAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = getStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse getStorageAccountDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + public StorageBundle setStorageAccount(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey) { + return setStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName, resourceId, activeKeyName, autoRegenerateKey).toBlocking().single().body(); + } + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture setStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(setStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName, resourceId, activeKeyName, autoRegenerateKey), serviceCallback); + } + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable setStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey) { + return setStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName, resourceId, activeKeyName, autoRegenerateKey).map(new Func1, StorageBundle>() { + @Override + public StorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable> setStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + if (resourceId == null) { + throw new IllegalArgumentException("Parameter resourceId is required and cannot be null."); + } + if (activeKeyName == null) { + throw new IllegalArgumentException("Parameter activeKeyName is required and cannot be null."); + } + final String regenerationPeriod = null; + final StorageAccountAttributes storageAccountAttributes = null; + final Map tags = null; + StorageAccountCreateParameters parameters = new StorageAccountCreateParameters(); + parameters.withResourceId(resourceId); + parameters.withActiveKeyName(activeKeyName); + parameters.withAutoRegenerateKey(autoRegenerateKey); + parameters.withRegenerationPeriod(null); + parameters.withStorageAccountAttributes(null); + parameters.withTags(null); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.setStorageAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = setStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + public StorageBundle setStorageAccount(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags) { + return setStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName, resourceId, activeKeyName, autoRegenerateKey, regenerationPeriod, storageAccountAttributes, tags).toBlocking().single().body(); + } + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture setStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(setStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName, resourceId, activeKeyName, autoRegenerateKey, regenerationPeriod, storageAccountAttributes, tags), serviceCallback); + } + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable setStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags) { + return setStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName, resourceId, activeKeyName, autoRegenerateKey, regenerationPeriod, storageAccountAttributes, tags).map(new Func1, StorageBundle>() { + @Override + public StorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Creates or updates a new storage account. This operation requires the storage/set permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param resourceId Storage account resource id. + * @param activeKeyName Current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable> setStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String resourceId, String activeKeyName, boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + if (resourceId == null) { + throw new IllegalArgumentException("Parameter resourceId is required and cannot be null."); + } + if (activeKeyName == null) { + throw new IllegalArgumentException("Parameter activeKeyName is required and cannot be null."); + } + Validator.validate(storageAccountAttributes); + Validator.validate(tags); + StorageAccountCreateParameters parameters = new StorageAccountCreateParameters(); + parameters.withResourceId(resourceId); + parameters.withActiveKeyName(activeKeyName); + parameters.withAutoRegenerateKey(autoRegenerateKey); + parameters.withRegenerationPeriod(regenerationPeriod); + parameters.withStorageAccountAttributes(storageAccountAttributes); + parameters.withTags(tags); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.setStorageAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = setStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse setStorageAccountDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + public StorageBundle updateStorageAccount(String vaultBaseUrl, String storageAccountName) { + return updateStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).toBlocking().single().body(); + } + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture updateStorageAccountAsync(String vaultBaseUrl, String storageAccountName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(updateStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName), serviceCallback); + } + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable updateStorageAccountAsync(String vaultBaseUrl, String storageAccountName) { + return updateStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName).map(new Func1, StorageBundle>() { + @Override + public StorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable> updateStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + final String activeKeyName = null; + final Boolean autoRegenerateKey = null; + final String regenerationPeriod = null; + final StorageAccountAttributes storageAccountAttributes = null; + final Map tags = null; + StorageAccountUpdateParameters parameters = new StorageAccountUpdateParameters(); + parameters.withActiveKeyName(null); + parameters.withAutoRegenerateKey(null); + parameters.withRegenerationPeriod(null); + parameters.withStorageAccountAttributes(null); + parameters.withTags(null); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.updateStorageAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = updateStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param activeKeyName The current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + public StorageBundle updateStorageAccount(String vaultBaseUrl, String storageAccountName, String activeKeyName, Boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags) { + return updateStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName, activeKeyName, autoRegenerateKey, regenerationPeriod, storageAccountAttributes, tags).toBlocking().single().body(); + } + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param activeKeyName The current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture updateStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String activeKeyName, Boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(updateStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName, activeKeyName, autoRegenerateKey, regenerationPeriod, storageAccountAttributes, tags), serviceCallback); + } + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param activeKeyName The current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable updateStorageAccountAsync(String vaultBaseUrl, String storageAccountName, String activeKeyName, Boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags) { + return updateStorageAccountWithServiceResponseAsync(vaultBaseUrl, storageAccountName, activeKeyName, autoRegenerateKey, regenerationPeriod, storageAccountAttributes, tags).map(new Func1, StorageBundle>() { + @Override + public StorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Updates the specified attributes associated with the given storage account. This operation requires the storage/set/update permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param activeKeyName The current active storage account key name. + * @param autoRegenerateKey whether keyvault should manage the storage account for the user. + * @param regenerationPeriod The key regeneration time duration specified in ISO-8601 format. + * @param storageAccountAttributes The attributes of the storage account. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable> updateStorageAccountWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String activeKeyName, Boolean autoRegenerateKey, String regenerationPeriod, StorageAccountAttributes storageAccountAttributes, Map tags) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + Validator.validate(storageAccountAttributes); + Validator.validate(tags); + StorageAccountUpdateParameters parameters = new StorageAccountUpdateParameters(); + parameters.withActiveKeyName(activeKeyName); + parameters.withAutoRegenerateKey(autoRegenerateKey); + parameters.withRegenerationPeriod(regenerationPeriod); + parameters.withStorageAccountAttributes(storageAccountAttributes); + parameters.withTags(tags); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.updateStorageAccount(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = updateStorageAccountDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse updateStorageAccountDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Regenerates the specified key value for the given storage account. This operation requires the storage/regeneratekey permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param keyName The storage account key name. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the StorageBundle object if successful. + */ + public StorageBundle regenerateStorageAccountKey(String vaultBaseUrl, String storageAccountName, String keyName) { + return regenerateStorageAccountKeyWithServiceResponseAsync(vaultBaseUrl, storageAccountName, keyName).toBlocking().single().body(); + } + + /** + * Regenerates the specified key value for the given storage account. This operation requires the storage/regeneratekey permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param keyName The storage account key name. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture regenerateStorageAccountKeyAsync(String vaultBaseUrl, String storageAccountName, String keyName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(regenerateStorageAccountKeyWithServiceResponseAsync(vaultBaseUrl, storageAccountName, keyName), serviceCallback); + } + + /** + * Regenerates the specified key value for the given storage account. This operation requires the storage/regeneratekey permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param keyName The storage account key name. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable regenerateStorageAccountKeyAsync(String vaultBaseUrl, String storageAccountName, String keyName) { + return regenerateStorageAccountKeyWithServiceResponseAsync(vaultBaseUrl, storageAccountName, keyName).map(new Func1, StorageBundle>() { + @Override + public StorageBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Regenerates the specified key value for the given storage account. This operation requires the storage/regeneratekey permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param keyName The storage account key name. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the StorageBundle object + */ + public Observable> regenerateStorageAccountKeyWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String keyName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + if (keyName == null) { + throw new IllegalArgumentException("Parameter keyName is required and cannot be null."); + } + StorageAccountRegenerteKeyParameters parameters = new StorageAccountRegenerteKeyParameters(); + parameters.withKeyName(keyName); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.regenerateStorageAccountKey(storageAccountName, this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = regenerateStorageAccountKeyDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse regenerateStorageAccountKeyDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<SasDefinitionItem> object if successful. + */ + public PagedList getSasDefinitions(final String vaultBaseUrl, final String storageAccountName) { + ServiceResponse> response = getSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getSasDefinitionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getSasDefinitionsNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + public Observable> getSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName) { + return getSasDefinitionsWithServiceResponseAsync(vaultBaseUrl, storageAccountName) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + public Observable>> getSasDefinitionsWithServiceResponseAsync(final String vaultBaseUrl, final String storageAccountName) { + return getSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getSasDefinitionsNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<SasDefinitionItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getSasDefinitionsSinglePageAsync(final String vaultBaseUrl, final String storageAccountName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + final Integer maxresults = null; + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getSasDefinitions(storageAccountName, maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getSasDefinitionsDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<SasDefinitionItem> object if successful. + */ + public PagedList getSasDefinitions(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults) { + ServiceResponse> response = getSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName, maxresults).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getSasDefinitionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName, maxresults), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getSasDefinitionsNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + public Observable> getSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults) { + return getSasDefinitionsWithServiceResponseAsync(vaultBaseUrl, storageAccountName, maxresults) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SasDefinitionItem> object + */ + public Observable>> getSasDefinitionsWithServiceResponseAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults) { + return getSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName, maxresults) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getSasDefinitionsNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. + * + ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param storageAccountName The name of the storage account. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<SasDefinitionItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getSasDefinitionsSinglePageAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getSasDefinitions(storageAccountName, maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getSasDefinitionsDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse> getSasDefinitionsDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedSasDefinitionItem> object if successful. + */ + public PagedList getDeletedSasDefinitions(final String vaultBaseUrl, final String storageAccountName) { + ServiceResponse> response = getDeletedSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getDeletedSasDefinitionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getDeletedSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getDeletedSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getDeletedSasDefinitionsNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + public Observable> getDeletedSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName) { + return getDeletedSasDefinitionsWithServiceResponseAsync(vaultBaseUrl, storageAccountName) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + public Observable>> getDeletedSasDefinitionsWithServiceResponseAsync(final String vaultBaseUrl, final String storageAccountName) { + return getDeletedSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getDeletedSasDefinitionsNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<DeletedSasDefinitionItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getDeletedSasDefinitionsSinglePageAsync(final String vaultBaseUrl, final String storageAccountName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + final Integer maxresults = null; + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getDeletedSasDefinitions(storageAccountName, maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getDeletedSasDefinitionsDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedSasDefinitionItem> object if successful. + */ + public PagedList getDeletedSasDefinitions(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults) { + ServiceResponse> response = getDeletedSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName, maxresults).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getDeletedSasDefinitionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getDeletedSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getDeletedSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName, maxresults), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getDeletedSasDefinitionsNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + public Observable> getDeletedSasDefinitionsAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults) { + return getDeletedSasDefinitionsWithServiceResponseAsync(vaultBaseUrl, storageAccountName, maxresults) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSasDefinitionItem> object + */ + public Observable>> getDeletedSasDefinitionsWithServiceResponseAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults) { + return getDeletedSasDefinitionsSinglePageAsync(vaultBaseUrl, storageAccountName, maxresults) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getDeletedSasDefinitionsNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. + * + ServiceResponse> * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + ServiceResponse> * @param storageAccountName The name of the storage account. + ServiceResponse> * @param maxresults Maximum number of results to return in a page. If not specified the service will return up to 25 results. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<DeletedSasDefinitionItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getDeletedSasDefinitionsSinglePageAsync(final String vaultBaseUrl, final String storageAccountName, final Integer maxresults) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getDeletedSasDefinitions(storageAccountName, maxresults, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getDeletedSasDefinitionsDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse> getDeletedSasDefinitionsDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Gets the specified deleted sas definition. + * The Get Deleted SAS Definition operation returns the specified deleted SAS definition along with its attributes. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the DeletedSasDefinitionBundle object if successful. + */ + public DeletedSasDefinitionBundle getDeletedSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return getDeletedSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).toBlocking().single().body(); + } + + /** + * Gets the specified deleted sas definition. + * The Get Deleted SAS Definition operation returns the specified deleted SAS definition along with its attributes. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture getDeletedSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(getDeletedSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName), serviceCallback); + } + + /** + * Gets the specified deleted sas definition. + * The Get Deleted SAS Definition operation returns the specified deleted SAS definition along with its attributes. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedSasDefinitionBundle object + */ + public Observable getDeletedSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return getDeletedSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).map(new Func1, DeletedSasDefinitionBundle>() { + @Override + public DeletedSasDefinitionBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Gets the specified deleted sas definition. + * The Get Deleted SAS Definition operation returns the specified deleted SAS definition along with its attributes. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedSasDefinitionBundle object + */ + public Observable> getDeletedSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (sasDefinitionName == null) { + throw new IllegalArgumentException("Parameter sasDefinitionName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getDeletedSasDefinition(storageAccountName, sasDefinitionName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = getDeletedSasDefinitionDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse getDeletedSasDefinitionDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Recovers the deleted SAS definition. + * Recovers the deleted SAS definition for the specified storage account. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + public SasDefinitionBundle recoverDeletedSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return recoverDeletedSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).toBlocking().single().body(); + } + + /** + * Recovers the deleted SAS definition. + * Recovers the deleted SAS definition for the specified storage account. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture recoverDeletedSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(recoverDeletedSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName), serviceCallback); + } + + /** + * Recovers the deleted SAS definition. + * Recovers the deleted SAS definition for the specified storage account. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable recoverDeletedSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return recoverDeletedSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).map(new Func1, SasDefinitionBundle>() { + @Override + public SasDefinitionBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Recovers the deleted SAS definition. + * Recovers the deleted SAS definition for the specified storage account. This operation can only be performed on a soft-delete enabled vault. This operation requires the storage/recover permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable> recoverDeletedSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (sasDefinitionName == null) { + throw new IllegalArgumentException("Parameter sasDefinitionName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.recoverDeletedSasDefinition(storageAccountName, sasDefinitionName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = recoverDeletedSasDefinitionDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse recoverDeletedSasDefinitionDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Deletes a SAS definition from a specified storage account. This operation requires the storage/deletesas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the DeletedSasDefinitionBundle object if successful. + */ + public DeletedSasDefinitionBundle deleteSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return deleteSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).toBlocking().single().body(); + } + + /** + * Deletes a SAS definition from a specified storage account. This operation requires the storage/deletesas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture deleteSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(deleteSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName), serviceCallback); + } + + /** + * Deletes a SAS definition from a specified storage account. This operation requires the storage/deletesas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedSasDefinitionBundle object + */ + public Observable deleteSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return deleteSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).map(new Func1, DeletedSasDefinitionBundle>() { + @Override + public DeletedSasDefinitionBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Deletes a SAS definition from a specified storage account. This operation requires the storage/deletesas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the DeletedSasDefinitionBundle object + */ + public Observable> deleteSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (sasDefinitionName == null) { + throw new IllegalArgumentException("Parameter sasDefinitionName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.deleteSasDefinition(storageAccountName, sasDefinitionName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = deleteSasDefinitionDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse deleteSasDefinitionDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Gets information about a SAS definition for the specified storage account. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + public SasDefinitionBundle getSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return getSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).toBlocking().single().body(); + } + + /** + * Gets information about a SAS definition for the specified storage account. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture getSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(getSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName), serviceCallback); + } + + /** + * Gets information about a SAS definition for the specified storage account. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable getSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return getSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).map(new Func1, SasDefinitionBundle>() { + @Override + public SasDefinitionBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Gets information about a SAS definition for the specified storage account. This operation requires the storage/getsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable> getSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (sasDefinitionName == null) { + throw new IllegalArgumentException("Parameter sasDefinitionName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.getSasDefinition(storageAccountName, sasDefinitionName, this.apiVersion(), this.acceptLanguage(), parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = getSasDefinitionDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse getSasDefinitionDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + public SasDefinitionBundle setSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod) { + return setSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName, templateUri, sasType, validityPeriod).toBlocking().single().body(); + } + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture setSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(setSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName, templateUri, sasType, validityPeriod), serviceCallback); + } + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable setSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod) { + return setSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName, templateUri, sasType, validityPeriod).map(new Func1, SasDefinitionBundle>() { + @Override + public SasDefinitionBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable> setSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (sasDefinitionName == null) { + throw new IllegalArgumentException("Parameter sasDefinitionName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + if (templateUri == null) { + throw new IllegalArgumentException("Parameter templateUri is required and cannot be null."); + } + if (sasType == null) { + throw new IllegalArgumentException("Parameter sasType is required and cannot be null."); + } + if (validityPeriod == null) { + throw new IllegalArgumentException("Parameter validityPeriod is required and cannot be null."); + } + final SasDefinitionAttributes sasDefinitionAttributes = null; + final Map tags = null; + SasDefinitionCreateParameters parameters = new SasDefinitionCreateParameters(); + parameters.withTemplateUri(templateUri); + parameters.withSasType(sasType); + parameters.withValidityPeriod(validityPeriod); + parameters.withSasDefinitionAttributes(null); + parameters.withTags(null); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.setSasDefinition(storageAccountName, sasDefinitionName, this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = setSasDefinitionDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + public SasDefinitionBundle setSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags) { + return setSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName, templateUri, sasType, validityPeriod, sasDefinitionAttributes, tags).toBlocking().single().body(); + } + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture setSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(setSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName, templateUri, sasType, validityPeriod, sasDefinitionAttributes, tags), serviceCallback); + } + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable setSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags) { + return setSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName, templateUri, sasType, validityPeriod, sasDefinitionAttributes, tags).map(new Func1, SasDefinitionBundle>() { + @Override + public SasDefinitionBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Creates or updates a new SAS definition for the specified storage account. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable> setSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (sasDefinitionName == null) { + throw new IllegalArgumentException("Parameter sasDefinitionName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + if (templateUri == null) { + throw new IllegalArgumentException("Parameter templateUri is required and cannot be null."); + } + if (sasType == null) { + throw new IllegalArgumentException("Parameter sasType is required and cannot be null."); + } + if (validityPeriod == null) { + throw new IllegalArgumentException("Parameter validityPeriod is required and cannot be null."); + } + Validator.validate(sasDefinitionAttributes); + Validator.validate(tags); + SasDefinitionCreateParameters parameters = new SasDefinitionCreateParameters(); + parameters.withTemplateUri(templateUri); + parameters.withSasType(sasType); + parameters.withValidityPeriod(validityPeriod); + parameters.withSasDefinitionAttributes(sasDefinitionAttributes); + parameters.withTags(tags); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.setSasDefinition(storageAccountName, sasDefinitionName, this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = setSasDefinitionDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse setSasDefinitionDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + public SasDefinitionBundle updateSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return updateSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).toBlocking().single().body(); + } + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture updateSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(updateSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName), serviceCallback); + } + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable updateSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + return updateSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName).map(new Func1, SasDefinitionBundle>() { + @Override + public SasDefinitionBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable> updateSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (sasDefinitionName == null) { + throw new IllegalArgumentException("Parameter sasDefinitionName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + final String templateUri = null; + final SasTokenType sasType = null; + final String validityPeriod = null; + final SasDefinitionAttributes sasDefinitionAttributes = null; + final Map tags = null; + SasDefinitionUpdateParameters parameters = new SasDefinitionUpdateParameters(); + parameters.withTemplateUri(null); + parameters.withSasType(null); + parameters.withValidityPeriod(null); + parameters.withSasDefinitionAttributes(null); + parameters.withTags(null); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.updateSasDefinition(storageAccountName, sasDefinitionName, this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = updateSasDefinitionDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the SasDefinitionBundle object if successful. + */ + public SasDefinitionBundle updateSasDefinition(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags) { + return updateSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName, templateUri, sasType, validityPeriod, sasDefinitionAttributes, tags).toBlocking().single().body(); + } + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture updateSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags, final ServiceCallback serviceCallback) { + return ServiceFuture.fromResponse(updateSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName, templateUri, sasType, validityPeriod, sasDefinitionAttributes, tags), serviceCallback); + } + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable updateSasDefinitionAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags) { + return updateSasDefinitionWithServiceResponseAsync(vaultBaseUrl, storageAccountName, sasDefinitionName, templateUri, sasType, validityPeriod, sasDefinitionAttributes, tags).map(new Func1, SasDefinitionBundle>() { + @Override + public SasDefinitionBundle call(ServiceResponse response) { + return response.body(); + } + }); + } + + /** + * Updates the specified attributes associated with the given SAS definition. This operation requires the storage/setsas permission. + * + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param storageAccountName The name of the storage account. + * @param sasDefinitionName The name of the SAS definition. + * @param templateUri The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template. + * @param sasType The type of SAS token the SAS definition will create. Possible values include: 'account', 'service' + * @param validityPeriod The validity period of SAS tokens created according to the SAS definition. + * @param sasDefinitionAttributes The attributes of the SAS definition. + * @param tags Application specific metadata in the form of key-value pairs. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the SasDefinitionBundle object + */ + public Observable> updateSasDefinitionWithServiceResponseAsync(String vaultBaseUrl, String storageAccountName, String sasDefinitionName, String templateUri, SasTokenType sasType, String validityPeriod, SasDefinitionAttributes sasDefinitionAttributes, Map tags) { + if (vaultBaseUrl == null) { + throw new IllegalArgumentException("Parameter vaultBaseUrl is required and cannot be null."); + } + if (storageAccountName == null) { + throw new IllegalArgumentException("Parameter storageAccountName is required and cannot be null."); + } + if (sasDefinitionName == null) { + throw new IllegalArgumentException("Parameter sasDefinitionName is required and cannot be null."); + } + if (this.apiVersion() == null) { + throw new IllegalArgumentException("Parameter this.apiVersion() is required and cannot be null."); + } + Validator.validate(sasDefinitionAttributes); + Validator.validate(tags); + SasDefinitionUpdateParameters parameters = new SasDefinitionUpdateParameters(); + parameters.withTemplateUri(templateUri); + parameters.withSasType(sasType); + parameters.withValidityPeriod(validityPeriod); + parameters.withSasDefinitionAttributes(sasDefinitionAttributes); + parameters.withTags(tags); + String parameterizedHost = Joiner.on(", ").join("{vaultBaseUrl}", vaultBaseUrl); + return service.updateSasDefinition(storageAccountName, sasDefinitionName, this.apiVersion(), this.acceptLanguage(), parameters, parameterizedHost, this.userAgent()) + .flatMap(new Func1, Observable>>() { + @Override + public Observable> call(Response response) { + try { + ServiceResponse clientResponse = updateSasDefinitionDelegate(response); + return Observable.just(clientResponse); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse updateSasDefinitionDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory().newInstance(this.serializerAdapter()) + .register(200, new TypeToken() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Retrieves a list of individual key versions with the same key name. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<KeyItem> object if successful. + */ + public PagedList getKeyVersionsNext(final String nextPageLink) { + ServiceResponse> response = getKeyVersionsNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getKeyVersionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * Retrieves a list of individual key versions with the same key name. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getKeyVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getKeyVersionsNextSinglePageAsync(nextPageLink), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getKeyVersionsNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * Retrieves a list of individual key versions with the same key name. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<KeyItem> object + */ + public Observable> getKeyVersionsNextAsync(final String nextPageLink) { + return getKeyVersionsNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * Retrieves a list of individual key versions with the same key name. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<KeyItem> object + */ + public Observable>> getKeyVersionsNextWithServiceResponseAsync(final String nextPageLink) { + return getKeyVersionsNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getKeyVersionsNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * Retrieves a list of individual key versions with the same key name. + * The full key identifier, attributes, and tags are provided in the response. This operation requires the keys/list permission. + * + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<KeyItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getKeyVersionsNextSinglePageAsync(final String nextPageLink) { + if (nextPageLink == null) { + throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + } + String nextUrl = String.format("%s", nextPageLink); + return service.getKeyVersionsNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getKeyVersionsNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse> getKeyVersionsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * List keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<KeyItem> object if successful. + */ + public PagedList getKeysNext(final String nextPageLink) { + ServiceResponse> response = getKeysNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getKeysNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * List keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getKeysNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getKeysNextSinglePageAsync(nextPageLink), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getKeysNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * List keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<KeyItem> object + */ + public Observable> getKeysNextAsync(final String nextPageLink) { + return getKeysNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * List keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<KeyItem> object + */ + public Observable>> getKeysNextWithServiceResponseAsync(final String nextPageLink) { + return getKeysNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getKeysNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * List keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a stored key. The LIST operation is applicable to all key types, however only the base key identifier, attributes, and tags are provided in the response. Individual versions of a key are not listed in the response. This operation requires the keys/list permission. + * + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<KeyItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getKeysNextSinglePageAsync(final String nextPageLink) { + if (nextPageLink == null) { + throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + } + String nextUrl = String.format("%s", nextPageLink); + return service.getKeysNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getKeysNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse> getKeysNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedKeyItem> object if successful. + */ + public PagedList getDeletedKeysNext(final String nextPageLink) { + ServiceResponse> response = getDeletedKeysNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getDeletedKeysNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getDeletedKeysNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getDeletedKeysNextSinglePageAsync(nextPageLink), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getDeletedKeysNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedKeyItem> object + */ + public Observable> getDeletedKeysNextAsync(final String nextPageLink) { + return getDeletedKeysNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedKeyItem> object + */ + public Observable>> getDeletedKeysNextWithServiceResponseAsync(final String nextPageLink) { + return getDeletedKeysNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getDeletedKeysNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * Lists the deleted keys in the specified vault. + * Retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a deleted key. This operation includes deletion-specific information. The Get Deleted Keys operation is applicable for vaults enabled for soft-delete. While the operation can be invoked on any vault, it will return an error if invoked on a non soft-delete enabled vault. This operation requires the keys/list permission. + * + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<DeletedKeyItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getDeletedKeysNextSinglePageAsync(final String nextPageLink) { + if (nextPageLink == null) { + throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + } + String nextUrl = String.format("%s", nextPageLink); + return service.getDeletedKeysNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getDeletedKeysNextDelegate(response); return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); @@ -8735,36 +11849,384 @@ public Observable>> call(Response> getDeletedKeysNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) + private ServiceResponse> getDeletedKeysNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * List secrets in a specified key vault. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<SecretItem> object if successful. + */ + public PagedList getSecretsNext(final String nextPageLink) { + ServiceResponse> response = getSecretsNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getSecretsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * List secrets in a specified key vault. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getSecretsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getSecretsNextSinglePageAsync(nextPageLink), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getSecretsNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * List secrets in a specified key vault. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SecretItem> object + */ + public Observable> getSecretsNextAsync(final String nextPageLink) { + return getSecretsNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * List secrets in a specified key vault. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SecretItem> object + */ + public Observable>> getSecretsNextWithServiceResponseAsync(final String nextPageLink) { + return getSecretsNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getSecretsNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * List secrets in a specified key vault. + * The Get Secrets operation is applicable to the entire vault. However, only the base secret identifier and its attributes are provided in the response. Individual secret versions are not listed in the response. This operation requires the secrets/list permission. + * + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<SecretItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getSecretsNextSinglePageAsync(final String nextPageLink) { + if (nextPageLink == null) { + throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + } + String nextUrl = String.format("%s", nextPageLink); + return service.getSecretsNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getSecretsNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse> getSecretsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<SecretItem> object if successful. + */ + public PagedList getSecretVersionsNext(final String nextPageLink) { + ServiceResponse> response = getSecretVersionsNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getSecretVersionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getSecretVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getSecretVersionsNextSinglePageAsync(nextPageLink), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getSecretVersionsNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SecretItem> object + */ + public Observable> getSecretVersionsNextAsync(final String nextPageLink) { + return getSecretVersionsNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<SecretItem> object + */ + public Observable>> getSecretVersionsNextWithServiceResponseAsync(final String nextPageLink) { + return getSecretVersionsNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getSecretVersionsNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * List all versions of the specified secret. + * The full secret identifier and attributes are provided in the response. No values are returned for the secrets. This operations requires the secrets/list permission. + * + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<SecretItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getSecretVersionsNextSinglePageAsync(final String nextPageLink) { + if (nextPageLink == null) { + throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + } + String nextUrl = String.format("%s", nextPageLink); + return service.getSecretVersionsNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getSecretVersionsNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse> getSecretVersionsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<DeletedSecretItem> object if successful. + */ + public PagedList getDeletedSecretsNext(final String nextPageLink) { + ServiceResponse> response = getDeletedSecretsNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getDeletedSecretsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getDeletedSecretsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getDeletedSecretsNextSinglePageAsync(nextPageLink), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getDeletedSecretsNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSecretItem> object + */ + public Observable> getDeletedSecretsNextAsync(final String nextPageLink) { + return getDeletedSecretsNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<DeletedSecretItem> object + */ + public Observable>> getDeletedSecretsNextWithServiceResponseAsync(final String nextPageLink) { + return getDeletedSecretsNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getDeletedSecretsNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for soft-delete. This operation requires the secrets/list permission. + * + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<DeletedSecretItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getDeletedSecretsNextSinglePageAsync(final String nextPageLink) { + if (nextPageLink == null) { + throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + } + String nextUrl = String.format("%s", nextPageLink); + return service.getDeletedSecretsNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getDeletedSecretsNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse> getDeletedSecretsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) .registerError(KeyVaultErrorException.class) .build(response); } /** - * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<SecretItem> object if successful. + * @return the PagedList<CertificateItem> object if successful. */ - public PagedList getSecretsNext(final String nextPageLink) { - ServiceResponse> response = getSecretsNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getCertificatesNext(final String nextPageLink) { + ServiceResponse> response = getCertificatesNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getSecretsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getCertificatesNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @param serviceFuture the ServiceFuture object tracking the Retrofit calls @@ -8772,78 +12234,194 @@ public Page nextPage(String nextPageLink) { * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getSecretsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getCertificatesNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getSecretsNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getCertificatesNextSinglePageAsync(nextPageLink), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getSecretsNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getCertificatesNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<SecretItem> object + * @return the observable to the PagedList<CertificateItem> object */ - public Observable> getSecretsNextAsync(final String nextPageLink) { - return getSecretsNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getCertificatesNextAsync(final String nextPageLink) { + return getCertificatesNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<SecretItem> object + * @return the observable to the PagedList<CertificateItem> object */ - public Observable>> getSecretsNextWithServiceResponseAsync(final String nextPageLink) { - return getSecretsNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getCertificatesNextWithServiceResponseAsync(final String nextPageLink) { + return getCertificatesNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getSecretsNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getCertificatesNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * List secrets in a specified key vault. - * The LIST operation is applicable to the entire vault, however only the base secret identifier and attributes are provided in the response. Individual secret versions are not listed in the response. + * List certificates in a specified key vault. + * The GetCertificates operation returns the set of certificates resources in the specified key vault. This operation requires the certificates/list permission. + * + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<CertificateItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getCertificatesNextSinglePageAsync(final String nextPageLink) { + if (nextPageLink == null) { + throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); + } + String nextUrl = String.format("%s", nextPageLink); + return service.getCertificatesNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { + @Override + public Observable>> call(Response response) { + try { + ServiceResponse> result = getCertificatesNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); + } catch (Throwable t) { + return Observable.error(t); + } + } + }); + } + + private ServiceResponse> getCertificatesNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) + .registerError(KeyVaultErrorException.class) + .build(response); + } + + /** + * List certificate issuers for a specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<SecretItem> object wrapped in {@link ServiceResponse} if successful. + * @throws KeyVaultErrorException thrown if the request is rejected by server + * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent + * @return the PagedList<CertificateIssuerItem> object if successful. */ - public Observable>> getSecretsNextSinglePageAsync(final String nextPageLink) { + public PagedList getCertificateIssuersNext(final String nextPageLink) { + ServiceResponse> response = getCertificateIssuersNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { + @Override + public Page nextPage(String nextPageLink) { + return getCertificateIssuersNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + } + }; + } + + /** + * List certificate issuers for a specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @param serviceFuture the ServiceFuture object tracking the Retrofit calls + * @param serviceCallback the async ServiceCallback to handle successful and failed responses. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the {@link ServiceFuture} object + */ + public ServiceFuture> getCertificateIssuersNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + return AzureServiceFuture.fromPageResponse( + getCertificateIssuersNextSinglePageAsync(nextPageLink), + new Func1>>>() { + @Override + public Observable>> call(String nextPageLink) { + return getCertificateIssuersNextSinglePageAsync(nextPageLink); + } + }, + serviceCallback); + } + + /** + * List certificate issuers for a specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateIssuerItem> object + */ + public Observable> getCertificateIssuersNextAsync(final String nextPageLink) { + return getCertificateIssuersNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { + @Override + public Page call(ServiceResponse> response) { + return response.body(); + } + }); + } + + /** + * List certificate issuers for a specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. + * + * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the observable to the PagedList<CertificateIssuerItem> object + */ + public Observable>> getCertificateIssuersNextWithServiceResponseAsync(final String nextPageLink) { + return getCertificateIssuersNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { + @Override + public Observable>> call(ServiceResponse> page) { + String nextPageLink = page.body().nextPageLink(); + if (nextPageLink == null) { + return Observable.just(page); + } + return Observable.just(page).concatWith(getCertificateIssuersNextWithServiceResponseAsync(nextPageLink)); + } + }); + } + + /** + * List certificate issuers for a specified key vault. + * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. This operation requires the certificates/manageissuers/getissuers permission. + * + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. + * @throws IllegalArgumentException thrown if parameters fail the validation + * @return the PagedList<CertificateIssuerItem> object wrapped in {@link ServiceResponse} if successful. + */ + public Observable>> getCertificateIssuersNextSinglePageAsync(final String nextPageLink) { if (nextPageLink == null) { throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); } String nextUrl = String.format("%s", nextPageLink); - return service.getSecretsNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + return service.getCertificateIssuersNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getSecretsNextDelegate(response); - return Observable.just(new ServiceResponse>(result.body(), result.response())); + ServiceResponse> result = getCertificateIssuersNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); } @@ -8851,36 +12429,36 @@ public Observable>> call(Response }); } - private ServiceResponse> getSecretsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) + private ServiceResponse> getCertificateIssuersNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) .registerError(KeyVaultErrorException.class) .build(response); } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List the versions of a certificate. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<SecretItem> object if successful. + * @return the PagedList<CertificateItem> object if successful. */ - public PagedList getSecretVersionsNext(final String nextPageLink) { - ServiceResponse> response = getSecretVersionsNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getCertificateVersionsNext(final String nextPageLink) { + ServiceResponse> response = getCertificateVersionsNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getSecretVersionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getCertificateVersionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List the versions of a certificate. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @param serviceFuture the ServiceFuture object tracking the Retrofit calls @@ -8888,78 +12466,78 @@ public Page nextPage(String nextPageLink) { * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getSecretVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getCertificateVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getSecretVersionsNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getCertificateVersionsNextSinglePageAsync(nextPageLink), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getSecretVersionsNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getCertificateVersionsNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List the versions of a certificate. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<SecretItem> object + * @return the observable to the PagedList<CertificateItem> object */ - public Observable> getSecretVersionsNextAsync(final String nextPageLink) { - return getSecretVersionsNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getCertificateVersionsNextAsync(final String nextPageLink) { + return getCertificateVersionsNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List the versions of a certificate. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<SecretItem> object + * @return the observable to the PagedList<CertificateItem> object */ - public Observable>> getSecretVersionsNextWithServiceResponseAsync(final String nextPageLink) { - return getSecretVersionsNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getCertificateVersionsNextWithServiceResponseAsync(final String nextPageLink) { + return getCertificateVersionsNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getSecretVersionsNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getCertificateVersionsNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * List the versions of the specified secret. - * The LIST VERSIONS operation can be applied to all versions having the same secret name in the same key vault. The full secret identifier and attributes are provided in the response. No values are returned for the secrets and only current versions of a secret are listed. + * List the versions of a certificate. + * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. This operation requires the certificates/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<SecretItem> object wrapped in {@link ServiceResponse} if successful. + * @return the PagedList<CertificateItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getSecretVersionsNextSinglePageAsync(final String nextPageLink) { + public Observable>> getCertificateVersionsNextSinglePageAsync(final String nextPageLink) { if (nextPageLink == null) { throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); } String nextUrl = String.format("%s", nextPageLink); - return service.getSecretVersionsNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + return service.getCertificateVersionsNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getSecretVersionsNextDelegate(response); - return Observable.just(new ServiceResponse>(result.body(), result.response())); + ServiceResponse> result = getCertificateVersionsNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); } @@ -8967,34 +12545,36 @@ public Observable>> call(Response }); } - private ServiceResponse> getSecretVersionsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) + private ServiceResponse> getCertificateVersionsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) .registerError(KeyVaultErrorException.class) .build(response); } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<DeletedSecretItem> object if successful. + * @return the PagedList<DeletedCertificateItem> object if successful. */ - public PagedList getDeletedSecretsNext(final String nextPageLink) { - ServiceResponse> response = getDeletedSecretsNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getDeletedCertificatesNext(final String nextPageLink) { + ServiceResponse> response = getDeletedCertificatesNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getDeletedSecretsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getDeletedCertificatesNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @param serviceFuture the ServiceFuture object tracking the Retrofit calls @@ -9002,75 +12582,78 @@ public Page nextPage(String nextPageLink) { * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getDeletedSecretsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getDeletedCertificatesNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getDeletedSecretsNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getDeletedCertificatesNextSinglePageAsync(nextPageLink), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getDeletedSecretsNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getDeletedCertificatesNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedSecretItem> object + * @return the observable to the PagedList<DeletedCertificateItem> object */ - public Observable> getDeletedSecretsNextAsync(final String nextPageLink) { - return getDeletedSecretsNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getDeletedCertificatesNextAsync(final String nextPageLink) { + return getDeletedCertificatesNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedSecretItem> object + * @return the observable to the PagedList<DeletedCertificateItem> object */ - public Observable>> getDeletedSecretsNextWithServiceResponseAsync(final String nextPageLink) { - return getDeletedSecretsNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getDeletedCertificatesNextWithServiceResponseAsync(final String nextPageLink) { + return getDeletedCertificatesNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getDeletedSecretsNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getDeletedCertificatesNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * List deleted secrets in the specified vault. Authorization: requires the secrets/list permission. + * Lists the deleted certificates in the specified vault currently available for recovery. + * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. This operation includes deletion-specific information. This operation requires the certificates/get/list permission. This operation can only be enabled on soft-delete enabled vaults. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<DeletedSecretItem> object wrapped in {@link ServiceResponse} if successful. + * @return the PagedList<DeletedCertificateItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getDeletedSecretsNextSinglePageAsync(final String nextPageLink) { + public Observable>> getDeletedCertificatesNextSinglePageAsync(final String nextPageLink) { if (nextPageLink == null) { throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); } String nextUrl = String.format("%s", nextPageLink); - return service.getDeletedSecretsNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + return service.getDeletedCertificatesNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getDeletedSecretsNextDelegate(response); - return Observable.just(new ServiceResponse>(result.body(), result.response())); + ServiceResponse> result = getDeletedCertificatesNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); } @@ -9078,36 +12661,34 @@ public Observable>> call(Response> getDeletedSecretsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) + private ServiceResponse> getDeletedCertificatesNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) .registerError(KeyVaultErrorException.class) .build(response); } /** - * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<CertificateItem> object if successful. + * @return the PagedList<StorageAccountItem> object if successful. */ - public PagedList getCertificatesNext(final String nextPageLink) { - ServiceResponse> response = getCertificatesNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getStorageAccountsNext(final String nextPageLink) { + ServiceResponse> response = getStorageAccountsNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getCertificatesNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getStorageAccountsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @param serviceFuture the ServiceFuture object tracking the Retrofit calls @@ -9115,78 +12696,75 @@ public Page nextPage(String nextPageLink) { * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getCertificatesNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getStorageAccountsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getCertificatesNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getStorageAccountsNextSinglePageAsync(nextPageLink), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getCertificatesNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getStorageAccountsNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - public Observable> getCertificatesNextAsync(final String nextPageLink) { - return getCertificatesNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getStorageAccountsNextAsync(final String nextPageLink) { + return getStorageAccountsNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateItem> object + * @return the observable to the PagedList<StorageAccountItem> object */ - public Observable>> getCertificatesNextWithServiceResponseAsync(final String nextPageLink) { - return getCertificatesNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getStorageAccountsNextWithServiceResponseAsync(final String nextPageLink) { + return getStorageAccountsNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getCertificatesNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getStorageAccountsNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * List certificates in a specified key vault. - * The GetCertificates operation returns the set of certificates resources in the specified key vault. + * List storage accounts managed by the specified key vault. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<CertificateItem> object wrapped in {@link ServiceResponse} if successful. + * @return the PagedList<StorageAccountItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getCertificatesNextSinglePageAsync(final String nextPageLink) { + public Observable>> getStorageAccountsNextSinglePageAsync(final String nextPageLink) { if (nextPageLink == null) { throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); } String nextUrl = String.format("%s", nextPageLink); - return service.getCertificatesNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + return service.getStorageAccountsNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getCertificatesNextDelegate(response); - return Observable.just(new ServiceResponse>(result.body(), result.response())); + ServiceResponse> result = getStorageAccountsNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); } @@ -9194,36 +12772,36 @@ public Observable>> call(Response> getCertificatesNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) + private ServiceResponse> getStorageAccountsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) .registerError(KeyVaultErrorException.class) .build(response); } /** - * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<CertificateIssuerItem> object if successful. + * @return the PagedList<DeletedStorageAccountItem> object if successful. */ - public PagedList getCertificateIssuersNext(final String nextPageLink) { - ServiceResponse> response = getCertificateIssuersNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getDeletedStorageAccountsNext(final String nextPageLink) { + ServiceResponse> response = getDeletedStorageAccountsNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getCertificateIssuersNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getDeletedStorageAccountsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @param serviceFuture the ServiceFuture object tracking the Retrofit calls @@ -9231,78 +12809,78 @@ public Page nextPage(String nextPageLink) { * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getCertificateIssuersNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getDeletedStorageAccountsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getCertificateIssuersNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getDeletedStorageAccountsNextSinglePageAsync(nextPageLink), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getCertificateIssuersNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getDeletedStorageAccountsNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateIssuerItem> object + * @return the observable to the PagedList<DeletedStorageAccountItem> object */ - public Observable> getCertificateIssuersNextAsync(final String nextPageLink) { - return getCertificateIssuersNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getDeletedStorageAccountsNextAsync(final String nextPageLink) { + return getDeletedStorageAccountsNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateIssuerItem> object + * @return the observable to the PagedList<DeletedStorageAccountItem> object */ - public Observable>> getCertificateIssuersNextWithServiceResponseAsync(final String nextPageLink) { - return getCertificateIssuersNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getDeletedStorageAccountsNextWithServiceResponseAsync(final String nextPageLink) { + return getDeletedStorageAccountsNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getCertificateIssuersNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getDeletedStorageAccountsNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * List certificate issuers for a specified key vault. - * The GetCertificateIssuers operation returns the set of certificate issuer resources in the specified key vault. + * Lists deleted storage accounts for the specified vault. + * The Get Deleted Storage Accounts operation returns the storage accounts that have been deleted for a vault enabled for soft-delete. This operation requires the storage/list permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<CertificateIssuerItem> object wrapped in {@link ServiceResponse} if successful. + * @return the PagedList<DeletedStorageAccountItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getCertificateIssuersNextSinglePageAsync(final String nextPageLink) { + public Observable>> getDeletedStorageAccountsNextSinglePageAsync(final String nextPageLink) { if (nextPageLink == null) { throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); } String nextUrl = String.format("%s", nextPageLink); - return service.getCertificateIssuersNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + return service.getDeletedStorageAccountsNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getCertificateIssuersNextDelegate(response); - return Observable.just(new ServiceResponse>(result.body(), result.response())); + ServiceResponse> result = getDeletedStorageAccountsNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); } @@ -9310,36 +12888,34 @@ public Observable>> call(Response> getCertificateIssuersNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) + private ServiceResponse> getDeletedStorageAccountsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) .registerError(KeyVaultErrorException.class) .build(response); } /** - * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<CertificateItem> object if successful. + * @return the PagedList<SasDefinitionItem> object if successful. */ - public PagedList getCertificateVersionsNext(final String nextPageLink) { - ServiceResponse> response = getCertificateVersionsNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getSasDefinitionsNext(final String nextPageLink) { + ServiceResponse> response = getSasDefinitionsNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getCertificateVersionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getSasDefinitionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @param serviceFuture the ServiceFuture object tracking the Retrofit calls @@ -9347,78 +12923,75 @@ public Page nextPage(String nextPageLink) { * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getCertificateVersionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getSasDefinitionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getCertificateVersionsNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getSasDefinitionsNextSinglePageAsync(nextPageLink), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getCertificateVersionsNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getSasDefinitionsNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateItem> object + * @return the observable to the PagedList<SasDefinitionItem> object */ - public Observable> getCertificateVersionsNextAsync(final String nextPageLink) { - return getCertificateVersionsNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getSasDefinitionsNextAsync(final String nextPageLink) { + return getSasDefinitionsNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<CertificateItem> object + * @return the observable to the PagedList<SasDefinitionItem> object */ - public Observable>> getCertificateVersionsNextWithServiceResponseAsync(final String nextPageLink) { - return getCertificateVersionsNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getSasDefinitionsNextWithServiceResponseAsync(final String nextPageLink) { + return getSasDefinitionsNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getCertificateVersionsNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getSasDefinitionsNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * List the versions of a certificate. - * The GetCertificateVersions operation returns the versions of a certificate in the specified key vault. + * List storage SAS definitions for the given storage account. This operation requires the storage/listsas permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<CertificateItem> object wrapped in {@link ServiceResponse} if successful. + * @return the PagedList<SasDefinitionItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getCertificateVersionsNextSinglePageAsync(final String nextPageLink) { + public Observable>> getSasDefinitionsNextSinglePageAsync(final String nextPageLink) { if (nextPageLink == null) { throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); } String nextUrl = String.format("%s", nextPageLink); - return service.getCertificateVersionsNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + return service.getSasDefinitionsNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getCertificateVersionsNextDelegate(response); - return Observable.just(new ServiceResponse>(result.body(), result.response())); + ServiceResponse> result = getSasDefinitionsNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); } @@ -9426,36 +12999,36 @@ public Observable>> call(Response> getCertificateVersionsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) + private ServiceResponse> getSasDefinitionsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) .registerError(KeyVaultErrorException.class) .build(response); } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation * @throws KeyVaultErrorException thrown if the request is rejected by server * @throws RuntimeException all other wrapped checked exceptions if the request fails to be sent - * @return the PagedList<DeletedCertificateItem> object if successful. + * @return the PagedList<DeletedSasDefinitionItem> object if successful. */ - public PagedList getDeletedCertificatesNext(final String nextPageLink) { - ServiceResponse> response = getDeletedCertificatesNextSinglePageAsync(nextPageLink).toBlocking().single(); - return new PagedList(response.body()) { + public PagedList getDeletedSasDefinitionsNext(final String nextPageLink) { + ServiceResponse> response = getDeletedSasDefinitionsNextSinglePageAsync(nextPageLink).toBlocking().single(); + return new PagedList(response.body()) { @Override - public Page nextPage(String nextPageLink) { - return getDeletedCertificatesNextSinglePageAsync(nextPageLink).toBlocking().single().body(); + public Page nextPage(String nextPageLink) { + return getDeletedSasDefinitionsNextSinglePageAsync(nextPageLink).toBlocking().single().body(); } }; } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @param serviceFuture the ServiceFuture object tracking the Retrofit calls @@ -9463,78 +13036,78 @@ public Page nextPage(String nextPageLink) { * @throws IllegalArgumentException thrown if parameters fail the validation * @return the {@link ServiceFuture} object */ - public ServiceFuture> getDeletedCertificatesNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { + public ServiceFuture> getDeletedSasDefinitionsNextAsync(final String nextPageLink, final ServiceFuture> serviceFuture, final ListOperationCallback serviceCallback) { return AzureServiceFuture.fromPageResponse( - getDeletedCertificatesNextSinglePageAsync(nextPageLink), - new Func1>>>() { + getDeletedSasDefinitionsNextSinglePageAsync(nextPageLink), + new Func1>>>() { @Override - public Observable>> call(String nextPageLink) { - return getDeletedCertificatesNextSinglePageAsync(nextPageLink); + public Observable>> call(String nextPageLink) { + return getDeletedSasDefinitionsNextSinglePageAsync(nextPageLink); } }, serviceCallback); } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedCertificateItem> object + * @return the observable to the PagedList<DeletedSasDefinitionItem> object */ - public Observable> getDeletedCertificatesNextAsync(final String nextPageLink) { - return getDeletedCertificatesNextWithServiceResponseAsync(nextPageLink) - .map(new Func1>, Page>() { + public Observable> getDeletedSasDefinitionsNextAsync(final String nextPageLink) { + return getDeletedSasDefinitionsNextWithServiceResponseAsync(nextPageLink) + .map(new Func1>, Page>() { @Override - public Page call(ServiceResponse> response) { + public Page call(ServiceResponse> response) { return response.body(); } }); } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. * * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the observable to the PagedList<DeletedCertificateItem> object + * @return the observable to the PagedList<DeletedSasDefinitionItem> object */ - public Observable>> getDeletedCertificatesNextWithServiceResponseAsync(final String nextPageLink) { - return getDeletedCertificatesNextSinglePageAsync(nextPageLink) - .concatMap(new Func1>, Observable>>>() { + public Observable>> getDeletedSasDefinitionsNextWithServiceResponseAsync(final String nextPageLink) { + return getDeletedSasDefinitionsNextSinglePageAsync(nextPageLink) + .concatMap(new Func1>, Observable>>>() { @Override - public Observable>> call(ServiceResponse> page) { + public Observable>> call(ServiceResponse> page) { String nextPageLink = page.body().nextPageLink(); if (nextPageLink == null) { return Observable.just(page); } - return Observable.just(page).concatWith(getDeletedCertificatesNextWithServiceResponseAsync(nextPageLink)); + return Observable.just(page).concatWith(getDeletedSasDefinitionsNextWithServiceResponseAsync(nextPageLink)); } }); } /** - * Lists the deleted certificates in the specified vault, currently available for recovery. - * The GetDeletedCertificates operation retrieves the certificates in the current vault which are in a deleted state and ready for recovery or purging. + * Lists deleted SAS definitions for the specified vault and storage account. + * The Get Deleted Sas Definitions operation returns the SAS definitions that have been deleted for a vault enabled for soft-delete. This operation requires the storage/listsas permission. * - * @param nextPageLink The NextLink from the previous successful call to List operation. + ServiceResponse> * @param nextPageLink The NextLink from the previous successful call to List operation. * @throws IllegalArgumentException thrown if parameters fail the validation - * @return the PagedList<DeletedCertificateItem> object wrapped in {@link ServiceResponse} if successful. + * @return the PagedList<DeletedSasDefinitionItem> object wrapped in {@link ServiceResponse} if successful. */ - public Observable>> getDeletedCertificatesNextSinglePageAsync(final String nextPageLink) { + public Observable>> getDeletedSasDefinitionsNextSinglePageAsync(final String nextPageLink) { if (nextPageLink == null) { throw new IllegalArgumentException("Parameter nextPageLink is required and cannot be null."); } String nextUrl = String.format("%s", nextPageLink); - return service.getDeletedCertificatesNext(nextUrl, this.acceptLanguage(), this.userAgent()) - .flatMap(new Func1, Observable>>>() { + return service.getDeletedSasDefinitionsNext(nextUrl, this.acceptLanguage(), this.userAgent()) + .flatMap(new Func1, Observable>>>() { @Override - public Observable>> call(Response response) { + public Observable>> call(Response response) { try { - ServiceResponse> result = getDeletedCertificatesNextDelegate(response); - return Observable.just(new ServiceResponse>(result.body(), result.response())); + ServiceResponse> result = getDeletedSasDefinitionsNextDelegate(response); + return Observable.just(new ServiceResponse>(result.body(), result.response())); } catch (Throwable t) { return Observable.error(t); } @@ -9542,9 +13115,9 @@ public Observable>> call(Response> getDeletedCertificatesNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { - return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) - .register(200, new TypeToken>() { }.getType()) + private ServiceResponse> getDeletedSasDefinitionsNextDelegate(Response response) throws KeyVaultErrorException, IOException, IllegalArgumentException { + return this.restClient().responseBuilderFactory()., KeyVaultErrorException>newInstance(this.serializerAdapter()) + .register(200, new TypeToken>() { }.getType()) .registerError(KeyVaultErrorException.class) .build(response); } diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/implementation/KeyVaultClientCustomImpl.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/implementation/KeyVaultClientCustomImpl.java index 2f6d608..aabc994 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/implementation/KeyVaultClientCustomImpl.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/implementation/KeyVaultClientCustomImpl.java @@ -3,6 +3,7 @@ import com.google.common.base.Joiner; import com.microsoft.azure.AzureClient; import com.microsoft.azure.ListOperationCallback; +import com.microsoft.azure.Page; import com.microsoft.azure.PagedList; import com.microsoft.azure.keyvault.CertificateIdentifier; import com.microsoft.azure.keyvault.KeyIdentifier; @@ -11,7 +12,9 @@ import com.microsoft.azure.keyvault.models.*; import com.microsoft.azure.keyvault.requests.*; import com.microsoft.azure.keyvault.webkey.JsonWebKeyEncryptionAlgorithm; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyOperation; import com.microsoft.azure.keyvault.webkey.JsonWebKeySignatureAlgorithm; +import com.microsoft.azure.keyvault.webkey.JsonWebKeyType; import com.microsoft.rest.RestClient; import com.microsoft.rest.ServiceCallback; import com.microsoft.rest.ServiceFuture; @@ -26,6 +29,7 @@ import rx.functions.Func1; import java.util.List; +import java.util.Map; public class KeyVaultClientCustomImpl extends KeyVaultClientBaseImpl implements KeyVaultClientCustom { @@ -1378,5 +1382,76 @@ public Observable> call(Response response) }); } + @Override + public KeyBundle createKey(String vaultBaseUrl, String keyName, JsonWebKeyType kty, Integer keySize, + List keyOps, KeyAttributes keyAttributes, Map tags) { + return createKey(vaultBaseUrl, keyName, kty, keySize, keyOps, keyAttributes, tags, null); + } + + @Override + public ServiceFuture createKeyAsync(String vaultBaseUrl, String keyName, JsonWebKeyType kty, + Integer keySize, List keyOps, KeyAttributes keyAttributes, Map tags, + ServiceCallback serviceCallback) { + return createKeyAsync(vaultBaseUrl, keyName, kty, keySize, keyOps, keyAttributes, tags, null, serviceCallback); + } + + @Override + public Observable createKeyAsync(String vaultBaseUrl, String keyName, JsonWebKeyType kty, + Integer keySize, List keyOps, KeyAttributes keyAttributes, Map tags) { + return createKeyAsync(vaultBaseUrl, keyName, kty, keySize, keyOps, keyAttributes, tags, (JsonWebKeyCurveName) null); + } + + @Override + public Observable> createKeyWithServiceResponseAsync(String vaultBaseUrl, String keyName, + JsonWebKeyType kty, Integer keySize, List keyOps, KeyAttributes keyAttributes, + Map tags) { + return createKeyWithServiceResponseAsync(vaultBaseUrl, keyName, kty, keySize, keyOps, keyAttributes, tags, null); + } + + @Override + public PagedList getCertificates(String vaultBaseUrl, Integer maxresults) { + return getCertificates(vaultBaseUrl, maxresults, false); + } + + @Override + public ServiceFuture> getCertificatesAsync(String vaultBaseUrl, Integer maxresults, + ListOperationCallback serviceCallback) { + return getCertificatesAsync(vaultBaseUrl, maxresults, false, serviceCallback); + } + + @Override + public Observable> getCertificatesAsync(String vaultBaseUrl, Integer maxresults) { + return getCertificatesAsync(vaultBaseUrl, maxresults, false); + } + + @Override + public Observable>> getCertificatesWithServiceResponseAsync( + String vaultBaseUrl, Integer maxresults) { + return getCertificatesWithServiceResponseAsync(vaultBaseUrl, maxresults, false); + } + + @Override + public PagedList getDeletedCertificates(String vaultBaseUrl, Integer maxresults) { + return getDeletedCertificates(vaultBaseUrl, maxresults, false); + } + + @Override + public ServiceFuture> getDeletedCertificatesAsync(String vaultBaseUrl, + Integer maxresults, ListOperationCallback serviceCallback) { + return getDeletedCertificatesAsync(vaultBaseUrl, maxresults, false, serviceCallback); + } + + @Override + public Observable> getDeletedCertificatesAsync(String vaultBaseUrl, + Integer maxresults) { + return getDeletedCertificatesAsync(vaultBaseUrl, maxresults, false); + } + + @Override + public Observable>> getDeletedCertificatesWithServiceResponseAsync( + String vaultBaseUrl, Integer maxresults) { + return getDeletedCertificatesWithServiceResponseAsync(vaultBaseUrl, maxresults, false); + } + } \ No newline at end of file diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Action.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Action.java index bdfbb0d..9037841 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Action.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Action.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/ActionType.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/ActionType.java index 36a586f..872cf84 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/ActionType.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/ActionType.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/AdministratorDetails.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/AdministratorDetails.java index 826cae5..053adb9 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/AdministratorDetails.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/AdministratorDetails.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Attributes.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Attributes.java index 41a88e4..fef08ab 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Attributes.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Attributes.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupKeyResult.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupKeyResult.java index 4607ed2..f975c72 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupKeyResult.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupKeyResult.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupSecretResult.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupSecretResult.java index d62fcbb..bc76f33 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupSecretResult.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupSecretResult.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupStorageResult.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupStorageResult.java new file mode 100644 index 0000000..48adf0d --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/BackupStorageResult.java @@ -0,0 +1,36 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import com.microsoft.rest.Base64Url; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The backup storage result, containing the backup blob. + */ +public class BackupStorageResult { + /** + * The backup blob containing the backed up storage account. + */ + @JsonProperty(value = "value", access = JsonProperty.Access.WRITE_ONLY) + private Base64Url value; + + /** + * Get the value value. + * + * @return the value value + */ + public byte[] value() { + if (this.value == null) { + return null; + } + return this.value.decodedBytes(); + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateAttributes.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateAttributes.java index 0492054..c2f9484 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateAttributes.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateAttributes.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateBundle.java index 8e2eea8..373c3a0 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateBundle.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateBundle.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateCreateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateCreateParameters.java index 9bee246..6012e5e 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateCreateParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateCreateParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateImportParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateImportParameters.java index c237bbf..0a79aeb 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateImportParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateImportParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerItem.java index 477b34a..e3b4774 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerItem.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerItem.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerSetParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerSetParameters.java index c6e300d..401e48e 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerSetParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerSetParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerUpdateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerUpdateParameters.java index 662afa0..12c2dc5 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerUpdateParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateIssuerUpdateParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateItem.java index beeca84..4d8356a 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateItem.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateItem.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateMergeParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateMergeParameters.java index 522e659..9fb1b98 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateMergeParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateMergeParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateOperation.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateOperation.java index c01f4f1..eea5853 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateOperation.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateOperation.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateOperationUpdateParameter.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateOperationUpdateParameter.java index 2d1eb2d..d0ec158 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateOperationUpdateParameter.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateOperationUpdateParameter.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificatePolicy.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificatePolicy.java index 0581e84..78a2687 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificatePolicy.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificatePolicy.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateUpdateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateUpdateParameters.java index 2f214f5..5ac31a1 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateUpdateParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/CertificateUpdateParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Contact.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Contact.java index 72d45c0..13a2376 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Contact.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Contact.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Contacts.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Contacts.java index faf304b..14a7a94 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Contacts.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Contacts.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedCertificateBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedCertificateBundle.java index 59c71c9..afe1634 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedCertificateBundle.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedCertificateBundle.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedCertificateItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedCertificateItem.java index 7c38a81..9aff462 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedCertificateItem.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedCertificateItem.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedKeyBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedKeyBundle.java index 651ed9d..0499195 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedKeyBundle.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedKeyBundle.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedKeyItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedKeyItem.java index a16d5a7..dd67370 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedKeyItem.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedKeyItem.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSasDefinitionBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSasDefinitionBundle.java new file mode 100644 index 0000000..d7da4f6 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSasDefinitionBundle.java @@ -0,0 +1,83 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import org.joda.time.DateTime; +import org.joda.time.DateTimeZone; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * A deleted SAS definition bundle consisting of its previous id, attributes + * and its tags, as well as information on when it will be purged. + */ +public class DeletedSasDefinitionBundle extends SasDefinitionBundle { + /** + * The url of the recovery object, used to identify and recover the deleted + * SAS definition. + */ + @JsonProperty(value = "recoveryId") + private String recoveryId; + + /** + * The time when the SAS definition is scheduled to be purged, in UTC. + */ + @JsonProperty(value = "scheduledPurgeDate", access = JsonProperty.Access.WRITE_ONLY) + private Long scheduledPurgeDate; + + /** + * The time when the SAS definition was deleted, in UTC. + */ + @JsonProperty(value = "deletedDate", access = JsonProperty.Access.WRITE_ONLY) + private Long deletedDate; + + /** + * Get the recoveryId value. + * + * @return the recoveryId value + */ + public String recoveryId() { + return this.recoveryId; + } + + /** + * Set the recoveryId value. + * + * @param recoveryId the recoveryId value to set + * @return the DeletedSasDefinitionBundle object itself. + */ + public DeletedSasDefinitionBundle withRecoveryId(String recoveryId) { + this.recoveryId = recoveryId; + return this; + } + + /** + * Get the scheduledPurgeDate value. + * + * @return the scheduledPurgeDate value + */ + public DateTime scheduledPurgeDate() { + if (this.scheduledPurgeDate == null) { + return null; + } + return new DateTime(this.scheduledPurgeDate * 1000L, DateTimeZone.UTC); + } + + /** + * Get the deletedDate value. + * + * @return the deletedDate value + */ + public DateTime deletedDate() { + if (this.deletedDate == null) { + return null; + } + return new DateTime(this.deletedDate * 1000L, DateTimeZone.UTC); + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSasDefinitionItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSasDefinitionItem.java new file mode 100644 index 0000000..b68d052 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSasDefinitionItem.java @@ -0,0 +1,83 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import org.joda.time.DateTime; +import org.joda.time.DateTimeZone; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The deleted SAS definition item containing metadata about the deleted SAS + * definition. + */ +public class DeletedSasDefinitionItem extends SasDefinitionItem { + /** + * The url of the recovery object, used to identify and recover the deleted + * SAS definition. + */ + @JsonProperty(value = "recoveryId") + private String recoveryId; + + /** + * The time when the SAS definition is scheduled to be purged, in UTC. + */ + @JsonProperty(value = "scheduledPurgeDate", access = JsonProperty.Access.WRITE_ONLY) + private Long scheduledPurgeDate; + + /** + * The time when the SAS definition was deleted, in UTC. + */ + @JsonProperty(value = "deletedDate", access = JsonProperty.Access.WRITE_ONLY) + private Long deletedDate; + + /** + * Get the recoveryId value. + * + * @return the recoveryId value + */ + public String recoveryId() { + return this.recoveryId; + } + + /** + * Set the recoveryId value. + * + * @param recoveryId the recoveryId value to set + * @return the DeletedSasDefinitionItem object itself. + */ + public DeletedSasDefinitionItem withRecoveryId(String recoveryId) { + this.recoveryId = recoveryId; + return this; + } + + /** + * Get the scheduledPurgeDate value. + * + * @return the scheduledPurgeDate value + */ + public DateTime scheduledPurgeDate() { + if (this.scheduledPurgeDate == null) { + return null; + } + return new DateTime(this.scheduledPurgeDate * 1000L, DateTimeZone.UTC); + } + + /** + * Get the deletedDate value. + * + * @return the deletedDate value + */ + public DateTime deletedDate() { + if (this.deletedDate == null) { + return null; + } + return new DateTime(this.deletedDate * 1000L, DateTimeZone.UTC); + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSecretBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSecretBundle.java index 858b5f7..eb9be19 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSecretBundle.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSecretBundle.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSecretItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSecretItem.java index 90e321e..586ad64 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSecretItem.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedSecretItem.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedStorageAccountItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedStorageAccountItem.java new file mode 100644 index 0000000..6f1fd90 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedStorageAccountItem.java @@ -0,0 +1,83 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import org.joda.time.DateTime; +import org.joda.time.DateTimeZone; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The deleted storage account item containing metadata about the deleted + * storage account. + */ +public class DeletedStorageAccountItem extends StorageAccountItem { + /** + * The url of the recovery object, used to identify and recover the deleted + * storage account. + */ + @JsonProperty(value = "recoveryId") + private String recoveryId; + + /** + * The time when the storage account is scheduled to be purged, in UTC. + */ + @JsonProperty(value = "scheduledPurgeDate", access = JsonProperty.Access.WRITE_ONLY) + private Long scheduledPurgeDate; + + /** + * The time when the storage account was deleted, in UTC. + */ + @JsonProperty(value = "deletedDate", access = JsonProperty.Access.WRITE_ONLY) + private Long deletedDate; + + /** + * Get the recoveryId value. + * + * @return the recoveryId value + */ + public String recoveryId() { + return this.recoveryId; + } + + /** + * Set the recoveryId value. + * + * @param recoveryId the recoveryId value to set + * @return the DeletedStorageAccountItem object itself. + */ + public DeletedStorageAccountItem withRecoveryId(String recoveryId) { + this.recoveryId = recoveryId; + return this; + } + + /** + * Get the scheduledPurgeDate value. + * + * @return the scheduledPurgeDate value + */ + public DateTime scheduledPurgeDate() { + if (this.scheduledPurgeDate == null) { + return null; + } + return new DateTime(this.scheduledPurgeDate * 1000L, DateTimeZone.UTC); + } + + /** + * Get the deletedDate value. + * + * @return the deletedDate value + */ + public DateTime deletedDate() { + if (this.deletedDate == null) { + return null; + } + return new DateTime(this.deletedDate * 1000L, DateTimeZone.UTC); + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedStorageBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedStorageBundle.java new file mode 100644 index 0000000..ff49fb1 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletedStorageBundle.java @@ -0,0 +1,83 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import org.joda.time.DateTime; +import org.joda.time.DateTimeZone; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * A deleted storage account bundle consisting of its previous id, attributes + * and its tags, as well as information on when it will be purged. + */ +public class DeletedStorageBundle extends StorageBundle { + /** + * The url of the recovery object, used to identify and recover the deleted + * storage account. + */ + @JsonProperty(value = "recoveryId") + private String recoveryId; + + /** + * The time when the storage account is scheduled to be purged, in UTC. + */ + @JsonProperty(value = "scheduledPurgeDate", access = JsonProperty.Access.WRITE_ONLY) + private Long scheduledPurgeDate; + + /** + * The time when the storage account was deleted, in UTC. + */ + @JsonProperty(value = "deletedDate", access = JsonProperty.Access.WRITE_ONLY) + private Long deletedDate; + + /** + * Get the recoveryId value. + * + * @return the recoveryId value + */ + public String recoveryId() { + return this.recoveryId; + } + + /** + * Set the recoveryId value. + * + * @param recoveryId the recoveryId value to set + * @return the DeletedStorageBundle object itself. + */ + public DeletedStorageBundle withRecoveryId(String recoveryId) { + this.recoveryId = recoveryId; + return this; + } + + /** + * Get the scheduledPurgeDate value. + * + * @return the scheduledPurgeDate value + */ + public DateTime scheduledPurgeDate() { + if (this.scheduledPurgeDate == null) { + return null; + } + return new DateTime(this.scheduledPurgeDate * 1000L, DateTimeZone.UTC); + } + + /** + * Get the deletedDate value. + * + * @return the deletedDate value + */ + public DateTime deletedDate() { + if (this.deletedDate == null) { + return null; + } + return new DateTime(this.deletedDate * 1000L, DateTimeZone.UTC); + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletionRecoveryLevel.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletionRecoveryLevel.java index 9811bd4..8a282c8 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletionRecoveryLevel.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/DeletionRecoveryLevel.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Error.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Error.java index 9fe649f..46dba39 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Error.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Error.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerAttributes.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerAttributes.java index 63b7ab7..32d1d01 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerAttributes.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerAttributes.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerBundle.java index 2cb397f..811300c 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerBundle.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerBundle.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerCredentials.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerCredentials.java index 6b9d9d8..5651c64 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerCredentials.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerCredentials.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerParameters.java index d877ea1..1c1c0f6 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/IssuerParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/JsonWebKeyCurveName.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/JsonWebKeyCurveName.java index 77a70d2..b4e6a5f 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/JsonWebKeyCurveName.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/JsonWebKeyCurveName.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyAttributes.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyAttributes.java index 581c5c4..7d750ed 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyAttributes.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyAttributes.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyBundle.java index 1638ff5..28330b5 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyBundle.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyBundle.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyCreateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyCreateParameters.java index b0b9457..6716a58 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyCreateParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyCreateParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyImportParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyImportParameters.java index 0137255..d46af97 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyImportParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyImportParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyItem.java index eb1de27..63cd0fe 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyItem.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyItem.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyOperationResult.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyOperationResult.java index 4f77fe6..1b94980 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyOperationResult.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyOperationResult.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyOperationsParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyOperationsParameters.java index a766393..fab5425 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyOperationsParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyOperationsParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyProperties.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyProperties.java index 61be827..0b2d3e3 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyProperties.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyProperties.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyRestoreParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyRestoreParameters.java index b42af00..6145dd0 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyRestoreParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyRestoreParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeySignParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeySignParameters.java index 331cc08..8765f27 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeySignParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeySignParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyUpdateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyUpdateParameters.java index 2bd52d9..f7eeea6 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyUpdateParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyUpdateParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyUsageType.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyUsageType.java index cb054fe..3162866 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyUsageType.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyUsageType.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVaultError.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVaultError.java index e4bcf81..95acc32 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVaultError.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVaultError.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVaultErrorException.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVaultErrorException.java index 95ed1e4..64eafe2 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVaultErrorException.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVaultErrorException.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVerifyParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVerifyParameters.java index 83fcd7e..a649ade 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVerifyParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVerifyParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVerifyResult.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVerifyResult.java index 45d2da9..cdb9c7a 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVerifyResult.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/KeyVerifyResult.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/LifetimeAction.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/LifetimeAction.java index 82f9b43..42580cb 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/LifetimeAction.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/LifetimeAction.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/OrganizationDetails.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/OrganizationDetails.java index 3dd3187..3cac3ef 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/OrganizationDetails.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/OrganizationDetails.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/PageImpl.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/PageImpl.java index 88e5617..4e8c2ec 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/PageImpl.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/PageImpl.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/PendingCertificateSigningRequestResult.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/PendingCertificateSigningRequestResult.java index bac5c8f..72f53ad 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/PendingCertificateSigningRequestResult.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/PendingCertificateSigningRequestResult.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionAttributes.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionAttributes.java new file mode 100644 index 0000000..c5fa856 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionAttributes.java @@ -0,0 +1,102 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import org.joda.time.DateTime; +import org.joda.time.DateTimeZone; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The SAS definition management attributes. + */ +public class SasDefinitionAttributes { + /** + * the enabled state of the object. + */ + @JsonProperty(value = "enabled") + private Boolean enabled; + + /** + * Creation time in UTC. + */ + @JsonProperty(value = "created", access = JsonProperty.Access.WRITE_ONLY) + private Long created; + + /** + * Last updated time in UTC. + */ + @JsonProperty(value = "updated", access = JsonProperty.Access.WRITE_ONLY) + private Long updated; + + /** + * Reflects the deletion recovery level currently in effect for SAS + * definitions in the current vault. If it contains 'Purgeable' the SAS + * definition can be permanently deleted by a privileged user; otherwise, + * only the system can purge the SAS definition, at the end of the + * retention interval. Possible values include: 'Purgeable', + * 'Recoverable+Purgeable', 'Recoverable', + * 'Recoverable+ProtectedSubscription'. + */ + @JsonProperty(value = "recoveryLevel", access = JsonProperty.Access.WRITE_ONLY) + private DeletionRecoveryLevel recoveryLevel; + + /** + * Get the enabled value. + * + * @return the enabled value + */ + public Boolean enabled() { + return this.enabled; + } + + /** + * Set the enabled value. + * + * @param enabled the enabled value to set + * @return the SasDefinitionAttributes object itself. + */ + public SasDefinitionAttributes withEnabled(Boolean enabled) { + this.enabled = enabled; + return this; + } + + /** + * Get the created value. + * + * @return the created value + */ + public DateTime created() { + if (this.created == null) { + return null; + } + return new DateTime(this.created * 1000L, DateTimeZone.UTC); + } + + /** + * Get the updated value. + * + * @return the updated value + */ + public DateTime updated() { + if (this.updated == null) { + return null; + } + return new DateTime(this.updated * 1000L, DateTimeZone.UTC); + } + + /** + * Get the recoveryLevel value. + * + * @return the recoveryLevel value + */ + public DeletionRecoveryLevel recoveryLevel() { + return this.recoveryLevel; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionBundle.java new file mode 100644 index 0000000..3d719cc --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionBundle.java @@ -0,0 +1,128 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import java.util.Map; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * A SAS definition bundle consists of key vault SAS definition details plus + * its attributes. + */ +public class SasDefinitionBundle { + /** + * The SAS definition id. + */ + @JsonProperty(value = "id", access = JsonProperty.Access.WRITE_ONLY) + private String id; + + /** + * Storage account SAS definition secret id. + */ + @JsonProperty(value = "sid", access = JsonProperty.Access.WRITE_ONLY) + private String secretId; + + /** + * The SAS definition token template signed with an arbitrary key. Tokens + * created according to the SAS definition will have the same properties as + * the template. + */ + @JsonProperty(value = "templateUri", access = JsonProperty.Access.WRITE_ONLY) + private String templateUri; + + /** + * The type of SAS token the SAS definition will create. Possible values + * include: 'account', 'service'. + */ + @JsonProperty(value = "sasType", access = JsonProperty.Access.WRITE_ONLY) + private SasTokenType sasType; + + /** + * The validity period of SAS tokens created according to the SAS + * definition. + */ + @JsonProperty(value = "validityPeriod", access = JsonProperty.Access.WRITE_ONLY) + private String validityPeriod; + + /** + * The SAS definition attributes. + */ + @JsonProperty(value = "attributes", access = JsonProperty.Access.WRITE_ONLY) + private SasDefinitionAttributes attributes; + + /** + * Application specific metadata in the form of key-value pairs. + */ + @JsonProperty(value = "tags", access = JsonProperty.Access.WRITE_ONLY) + private Map tags; + + /** + * Get the id value. + * + * @return the id value + */ + public String id() { + return this.id; + } + + /** + * Get the secretId value. + * + * @return the secretId value + */ + public String secretId() { + return this.secretId; + } + + /** + * Get the templateUri value. + * + * @return the templateUri value + */ + public String templateUri() { + return this.templateUri; + } + + /** + * Get the sasType value. + * + * @return the sasType value + */ + public SasTokenType sasType() { + return this.sasType; + } + + /** + * Get the validityPeriod value. + * + * @return the validityPeriod value + */ + public String validityPeriod() { + return this.validityPeriod; + } + + /** + * Get the attributes value. + * + * @return the attributes value + */ + public SasDefinitionAttributes attributes() { + return this.attributes; + } + + /** + * Get the tags value. + * + * @return the tags value + */ + public Map tags() { + return this.tags; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionCreateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionCreateParameters.java new file mode 100644 index 0000000..f07a25b --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionCreateParameters.java @@ -0,0 +1,152 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import java.util.Map; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The SAS definition create parameters. + */ +public class SasDefinitionCreateParameters { + /** + * The SAS definition token template signed with an arbitrary key. Tokens + * created according to the SAS definition will have the same properties as + * the template. + */ + @JsonProperty(value = "templateUri", required = true) + private String templateUri; + + /** + * The type of SAS token the SAS definition will create. Possible values + * include: 'account', 'service'. + */ + @JsonProperty(value = "sasType", required = true) + private SasTokenType sasType; + + /** + * The validity period of SAS tokens created according to the SAS + * definition. + */ + @JsonProperty(value = "validityPeriod", required = true) + private String validityPeriod; + + /** + * The attributes of the SAS definition. + */ + @JsonProperty(value = "attributes") + private SasDefinitionAttributes sasDefinitionAttributes; + + /** + * Application specific metadata in the form of key-value pairs. + */ + @JsonProperty(value = "tags") + private Map tags; + + /** + * Get the templateUri value. + * + * @return the templateUri value + */ + public String templateUri() { + return this.templateUri; + } + + /** + * Set the templateUri value. + * + * @param templateUri the templateUri value to set + * @return the SasDefinitionCreateParameters object itself. + */ + public SasDefinitionCreateParameters withTemplateUri(String templateUri) { + this.templateUri = templateUri; + return this; + } + + /** + * Get the sasType value. + * + * @return the sasType value + */ + public SasTokenType sasType() { + return this.sasType; + } + + /** + * Set the sasType value. + * + * @param sasType the sasType value to set + * @return the SasDefinitionCreateParameters object itself. + */ + public SasDefinitionCreateParameters withSasType(SasTokenType sasType) { + this.sasType = sasType; + return this; + } + + /** + * Get the validityPeriod value. + * + * @return the validityPeriod value + */ + public String validityPeriod() { + return this.validityPeriod; + } + + /** + * Set the validityPeriod value. + * + * @param validityPeriod the validityPeriod value to set + * @return the SasDefinitionCreateParameters object itself. + */ + public SasDefinitionCreateParameters withValidityPeriod(String validityPeriod) { + this.validityPeriod = validityPeriod; + return this; + } + + /** + * Get the sasDefinitionAttributes value. + * + * @return the sasDefinitionAttributes value + */ + public SasDefinitionAttributes sasDefinitionAttributes() { + return this.sasDefinitionAttributes; + } + + /** + * Set the sasDefinitionAttributes value. + * + * @param sasDefinitionAttributes the sasDefinitionAttributes value to set + * @return the SasDefinitionCreateParameters object itself. + */ + public SasDefinitionCreateParameters withSasDefinitionAttributes(SasDefinitionAttributes sasDefinitionAttributes) { + this.sasDefinitionAttributes = sasDefinitionAttributes; + return this; + } + + /** + * Get the tags value. + * + * @return the tags value + */ + public Map tags() { + return this.tags; + } + + /** + * Set the tags value. + * + * @param tags the tags value to set + * @return the SasDefinitionCreateParameters object itself. + */ + public SasDefinitionCreateParameters withTags(Map tags) { + this.tags = tags; + return this; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionItem.java new file mode 100644 index 0000000..6dc2c93 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionItem.java @@ -0,0 +1,78 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import java.util.Map; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The SAS definition item containing storage SAS definition metadata. + */ +public class SasDefinitionItem { + /** + * The storage SAS identifier. + */ + @JsonProperty(value = "id", access = JsonProperty.Access.WRITE_ONLY) + private String id; + + /** + * The storage account SAS definition secret id. + */ + @JsonProperty(value = "sid", access = JsonProperty.Access.WRITE_ONLY) + private String secretId; + + /** + * The SAS definition management attributes. + */ + @JsonProperty(value = "attributes", access = JsonProperty.Access.WRITE_ONLY) + private SasDefinitionAttributes attributes; + + /** + * Application specific metadata in the form of key-value pairs. + */ + @JsonProperty(value = "tags", access = JsonProperty.Access.WRITE_ONLY) + private Map tags; + + /** + * Get the id value. + * + * @return the id value + */ + public String id() { + return this.id; + } + + /** + * Get the secretId value. + * + * @return the secretId value + */ + public String secretId() { + return this.secretId; + } + + /** + * Get the attributes value. + * + * @return the attributes value + */ + public SasDefinitionAttributes attributes() { + return this.attributes; + } + + /** + * Get the tags value. + * + * @return the tags value + */ + public Map tags() { + return this.tags; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionUpdateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionUpdateParameters.java new file mode 100644 index 0000000..adbdd1e --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasDefinitionUpdateParameters.java @@ -0,0 +1,152 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import java.util.Map; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The SAS definition update parameters. + */ +public class SasDefinitionUpdateParameters { + /** + * The SAS definition token template signed with an arbitrary key. Tokens + * created according to the SAS definition will have the same properties as + * the template. + */ + @JsonProperty(value = "templateUri") + private String templateUri; + + /** + * The type of SAS token the SAS definition will create. Possible values + * include: 'account', 'service'. + */ + @JsonProperty(value = "sasType") + private SasTokenType sasType; + + /** + * The validity period of SAS tokens created according to the SAS + * definition. + */ + @JsonProperty(value = "validityPeriod") + private String validityPeriod; + + /** + * The attributes of the SAS definition. + */ + @JsonProperty(value = "attributes") + private SasDefinitionAttributes sasDefinitionAttributes; + + /** + * Application specific metadata in the form of key-value pairs. + */ + @JsonProperty(value = "tags") + private Map tags; + + /** + * Get the templateUri value. + * + * @return the templateUri value + */ + public String templateUri() { + return this.templateUri; + } + + /** + * Set the templateUri value. + * + * @param templateUri the templateUri value to set + * @return the SasDefinitionUpdateParameters object itself. + */ + public SasDefinitionUpdateParameters withTemplateUri(String templateUri) { + this.templateUri = templateUri; + return this; + } + + /** + * Get the sasType value. + * + * @return the sasType value + */ + public SasTokenType sasType() { + return this.sasType; + } + + /** + * Set the sasType value. + * + * @param sasType the sasType value to set + * @return the SasDefinitionUpdateParameters object itself. + */ + public SasDefinitionUpdateParameters withSasType(SasTokenType sasType) { + this.sasType = sasType; + return this; + } + + /** + * Get the validityPeriod value. + * + * @return the validityPeriod value + */ + public String validityPeriod() { + return this.validityPeriod; + } + + /** + * Set the validityPeriod value. + * + * @param validityPeriod the validityPeriod value to set + * @return the SasDefinitionUpdateParameters object itself. + */ + public SasDefinitionUpdateParameters withValidityPeriod(String validityPeriod) { + this.validityPeriod = validityPeriod; + return this; + } + + /** + * Get the sasDefinitionAttributes value. + * + * @return the sasDefinitionAttributes value + */ + public SasDefinitionAttributes sasDefinitionAttributes() { + return this.sasDefinitionAttributes; + } + + /** + * Set the sasDefinitionAttributes value. + * + * @param sasDefinitionAttributes the sasDefinitionAttributes value to set + * @return the SasDefinitionUpdateParameters object itself. + */ + public SasDefinitionUpdateParameters withSasDefinitionAttributes(SasDefinitionAttributes sasDefinitionAttributes) { + this.sasDefinitionAttributes = sasDefinitionAttributes; + return this; + } + + /** + * Get the tags value. + * + * @return the tags value + */ + public Map tags() { + return this.tags; + } + + /** + * Set the tags value. + * + * @param tags the tags value to set + * @return the SasDefinitionUpdateParameters object itself. + */ + public SasDefinitionUpdateParameters withTags(Map tags) { + this.tags = tags; + return this; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasTokenType.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasTokenType.java new file mode 100644 index 0000000..9e39e73 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SasTokenType.java @@ -0,0 +1,59 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import com.fasterxml.jackson.annotation.JsonValue; + +/** + * Defines values for SasTokenType. + */ +public final class SasTokenType { + /** Static value account for SasTokenType. */ + public static final SasTokenType ACCOUNT = new SasTokenType("account"); + + /** Static value service for SasTokenType. */ + public static final SasTokenType SERVICE = new SasTokenType("service"); + + private String value; + + /** + * Creates a custom value for SasTokenType. + * @param value the custom value + */ + public SasTokenType(String value) { + this.value = value; + } + + @JsonValue + @Override + public String toString() { + return value; + } + + @Override + public int hashCode() { + return value.hashCode(); + } + + @Override + public boolean equals(Object obj) { + if (!(obj instanceof SasTokenType)) { + return false; + } + if (obj == this) { + return true; + } + SasTokenType rhs = (SasTokenType) obj; + if (value == null) { + return rhs.value == null; + } else { + return value.equals(rhs.value); + } + } +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretAttributes.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretAttributes.java index c0373cb..6175c02 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretAttributes.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretAttributes.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretBundle.java index 4ca9afe..63082b8 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretBundle.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretBundle.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretItem.java index 4033065..be25b0e 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretItem.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretItem.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretProperties.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretProperties.java index 7b09e34..0877359 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretProperties.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretProperties.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretRestoreParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretRestoreParameters.java index f0741b8..651f814 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretRestoreParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretRestoreParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretSetParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretSetParameters.java index 04c6317..8c9b5b4 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretSetParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretSetParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretUpdateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretUpdateParameters.java index d069c65..ec0fa2b 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretUpdateParameters.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SecretUpdateParameters.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountAttributes.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountAttributes.java new file mode 100644 index 0000000..4f4dbdf --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountAttributes.java @@ -0,0 +1,101 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import org.joda.time.DateTime; +import org.joda.time.DateTimeZone; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The storage account management attributes. + */ +public class StorageAccountAttributes { + /** + * the enabled state of the object. + */ + @JsonProperty(value = "enabled") + private Boolean enabled; + + /** + * Creation time in UTC. + */ + @JsonProperty(value = "created", access = JsonProperty.Access.WRITE_ONLY) + private Long created; + + /** + * Last updated time in UTC. + */ + @JsonProperty(value = "updated", access = JsonProperty.Access.WRITE_ONLY) + private Long updated; + + /** + * Reflects the deletion recovery level currently in effect for storage + * accounts in the current vault. If it contains 'Purgeable' the storage + * account can be permanently deleted by a privileged user; otherwise, only + * the system can purge the storage account, at the end of the retention + * interval. Possible values include: 'Purgeable', 'Recoverable+Purgeable', + * 'Recoverable', 'Recoverable+ProtectedSubscription'. + */ + @JsonProperty(value = "recoveryLevel", access = JsonProperty.Access.WRITE_ONLY) + private DeletionRecoveryLevel recoveryLevel; + + /** + * Get the enabled value. + * + * @return the enabled value + */ + public Boolean enabled() { + return this.enabled; + } + + /** + * Set the enabled value. + * + * @param enabled the enabled value to set + * @return the StorageAccountAttributes object itself. + */ + public StorageAccountAttributes withEnabled(Boolean enabled) { + this.enabled = enabled; + return this; + } + + /** + * Get the created value. + * + * @return the created value + */ + public DateTime created() { + if (this.created == null) { + return null; + } + return new DateTime(this.created * 1000L, DateTimeZone.UTC); + } + + /** + * Get the updated value. + * + * @return the updated value + */ + public DateTime updated() { + if (this.updated == null) { + return null; + } + return new DateTime(this.updated * 1000L, DateTimeZone.UTC); + } + + /** + * Get the recoveryLevel value. + * + * @return the recoveryLevel value + */ + public DeletionRecoveryLevel recoveryLevel() { + return this.recoveryLevel; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountCreateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountCreateParameters.java new file mode 100644 index 0000000..eb91fd9 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountCreateParameters.java @@ -0,0 +1,174 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import java.util.Map; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The storage account create parameters. + */ +public class StorageAccountCreateParameters { + /** + * Storage account resource id. + */ + @JsonProperty(value = "resourceId", required = true) + private String resourceId; + + /** + * Current active storage account key name. + */ + @JsonProperty(value = "activeKeyName", required = true) + private String activeKeyName; + + /** + * whether keyvault should manage the storage account for the user. + */ + @JsonProperty(value = "autoRegenerateKey", required = true) + private boolean autoRegenerateKey; + + /** + * The key regeneration time duration specified in ISO-8601 format. + */ + @JsonProperty(value = "regenerationPeriod") + private String regenerationPeriod; + + /** + * The attributes of the storage account. + */ + @JsonProperty(value = "attributes") + private StorageAccountAttributes storageAccountAttributes; + + /** + * Application specific metadata in the form of key-value pairs. + */ + @JsonProperty(value = "tags") + private Map tags; + + /** + * Get the resourceId value. + * + * @return the resourceId value + */ + public String resourceId() { + return this.resourceId; + } + + /** + * Set the resourceId value. + * + * @param resourceId the resourceId value to set + * @return the StorageAccountCreateParameters object itself. + */ + public StorageAccountCreateParameters withResourceId(String resourceId) { + this.resourceId = resourceId; + return this; + } + + /** + * Get the activeKeyName value. + * + * @return the activeKeyName value + */ + public String activeKeyName() { + return this.activeKeyName; + } + + /** + * Set the activeKeyName value. + * + * @param activeKeyName the activeKeyName value to set + * @return the StorageAccountCreateParameters object itself. + */ + public StorageAccountCreateParameters withActiveKeyName(String activeKeyName) { + this.activeKeyName = activeKeyName; + return this; + } + + /** + * Get the autoRegenerateKey value. + * + * @return the autoRegenerateKey value + */ + public boolean autoRegenerateKey() { + return this.autoRegenerateKey; + } + + /** + * Set the autoRegenerateKey value. + * + * @param autoRegenerateKey the autoRegenerateKey value to set + * @return the StorageAccountCreateParameters object itself. + */ + public StorageAccountCreateParameters withAutoRegenerateKey(boolean autoRegenerateKey) { + this.autoRegenerateKey = autoRegenerateKey; + return this; + } + + /** + * Get the regenerationPeriod value. + * + * @return the regenerationPeriod value + */ + public String regenerationPeriod() { + return this.regenerationPeriod; + } + + /** + * Set the regenerationPeriod value. + * + * @param regenerationPeriod the regenerationPeriod value to set + * @return the StorageAccountCreateParameters object itself. + */ + public StorageAccountCreateParameters withRegenerationPeriod(String regenerationPeriod) { + this.regenerationPeriod = regenerationPeriod; + return this; + } + + /** + * Get the storageAccountAttributes value. + * + * @return the storageAccountAttributes value + */ + public StorageAccountAttributes storageAccountAttributes() { + return this.storageAccountAttributes; + } + + /** + * Set the storageAccountAttributes value. + * + * @param storageAccountAttributes the storageAccountAttributes value to set + * @return the StorageAccountCreateParameters object itself. + */ + public StorageAccountCreateParameters withStorageAccountAttributes(StorageAccountAttributes storageAccountAttributes) { + this.storageAccountAttributes = storageAccountAttributes; + return this; + } + + /** + * Get the tags value. + * + * @return the tags value + */ + public Map tags() { + return this.tags; + } + + /** + * Set the tags value. + * + * @param tags the tags value to set + * @return the StorageAccountCreateParameters object itself. + */ + public StorageAccountCreateParameters withTags(Map tags) { + this.tags = tags; + return this; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountItem.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountItem.java new file mode 100644 index 0000000..1114a88 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountItem.java @@ -0,0 +1,78 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import java.util.Map; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The storage account item containing storage account metadata. + */ +public class StorageAccountItem { + /** + * Storage identifier. + */ + @JsonProperty(value = "id", access = JsonProperty.Access.WRITE_ONLY) + private String id; + + /** + * Storage account resource Id. + */ + @JsonProperty(value = "resourceId", access = JsonProperty.Access.WRITE_ONLY) + private String resourceId; + + /** + * The storage account management attributes. + */ + @JsonProperty(value = "attributes", access = JsonProperty.Access.WRITE_ONLY) + private StorageAccountAttributes attributes; + + /** + * Application specific metadata in the form of key-value pairs. + */ + @JsonProperty(value = "tags", access = JsonProperty.Access.WRITE_ONLY) + private Map tags; + + /** + * Get the id value. + * + * @return the id value + */ + public String id() { + return this.id; + } + + /** + * Get the resourceId value. + * + * @return the resourceId value + */ + public String resourceId() { + return this.resourceId; + } + + /** + * Get the attributes value. + * + * @return the attributes value + */ + public StorageAccountAttributes attributes() { + return this.attributes; + } + + /** + * Get the tags value. + * + * @return the tags value + */ + public Map tags() { + return this.tags; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountRegenerteKeyParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountRegenerteKeyParameters.java new file mode 100644 index 0000000..973b19e --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountRegenerteKeyParameters.java @@ -0,0 +1,43 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The storage account key regenerate parameters. + */ +public class StorageAccountRegenerteKeyParameters { + /** + * The storage account key name. + */ + @JsonProperty(value = "keyName", required = true) + private String keyName; + + /** + * Get the keyName value. + * + * @return the keyName value + */ + public String keyName() { + return this.keyName; + } + + /** + * Set the keyName value. + * + * @param keyName the keyName value to set + * @return the StorageAccountRegenerteKeyParameters object itself. + */ + public StorageAccountRegenerteKeyParameters withKeyName(String keyName) { + this.keyName = keyName; + return this; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountUpdateParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountUpdateParameters.java new file mode 100644 index 0000000..2fa74d1 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageAccountUpdateParameters.java @@ -0,0 +1,148 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import java.util.Map; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The storage account update parameters. + */ +public class StorageAccountUpdateParameters { + /** + * The current active storage account key name. + */ + @JsonProperty(value = "activeKeyName") + private String activeKeyName; + + /** + * whether keyvault should manage the storage account for the user. + */ + @JsonProperty(value = "autoRegenerateKey") + private Boolean autoRegenerateKey; + + /** + * The key regeneration time duration specified in ISO-8601 format. + */ + @JsonProperty(value = "regenerationPeriod") + private String regenerationPeriod; + + /** + * The attributes of the storage account. + */ + @JsonProperty(value = "attributes") + private StorageAccountAttributes storageAccountAttributes; + + /** + * Application specific metadata in the form of key-value pairs. + */ + @JsonProperty(value = "tags") + private Map tags; + + /** + * Get the activeKeyName value. + * + * @return the activeKeyName value + */ + public String activeKeyName() { + return this.activeKeyName; + } + + /** + * Set the activeKeyName value. + * + * @param activeKeyName the activeKeyName value to set + * @return the StorageAccountUpdateParameters object itself. + */ + public StorageAccountUpdateParameters withActiveKeyName(String activeKeyName) { + this.activeKeyName = activeKeyName; + return this; + } + + /** + * Get the autoRegenerateKey value. + * + * @return the autoRegenerateKey value + */ + public Boolean autoRegenerateKey() { + return this.autoRegenerateKey; + } + + /** + * Set the autoRegenerateKey value. + * + * @param autoRegenerateKey the autoRegenerateKey value to set + * @return the StorageAccountUpdateParameters object itself. + */ + public StorageAccountUpdateParameters withAutoRegenerateKey(Boolean autoRegenerateKey) { + this.autoRegenerateKey = autoRegenerateKey; + return this; + } + + /** + * Get the regenerationPeriod value. + * + * @return the regenerationPeriod value + */ + public String regenerationPeriod() { + return this.regenerationPeriod; + } + + /** + * Set the regenerationPeriod value. + * + * @param regenerationPeriod the regenerationPeriod value to set + * @return the StorageAccountUpdateParameters object itself. + */ + public StorageAccountUpdateParameters withRegenerationPeriod(String regenerationPeriod) { + this.regenerationPeriod = regenerationPeriod; + return this; + } + + /** + * Get the storageAccountAttributes value. + * + * @return the storageAccountAttributes value + */ + public StorageAccountAttributes storageAccountAttributes() { + return this.storageAccountAttributes; + } + + /** + * Set the storageAccountAttributes value. + * + * @param storageAccountAttributes the storageAccountAttributes value to set + * @return the StorageAccountUpdateParameters object itself. + */ + public StorageAccountUpdateParameters withStorageAccountAttributes(StorageAccountAttributes storageAccountAttributes) { + this.storageAccountAttributes = storageAccountAttributes; + return this; + } + + /** + * Get the tags value. + * + * @return the tags value + */ + public Map tags() { + return this.tags; + } + + /** + * Set the tags value. + * + * @param tags the tags value to set + * @return the StorageAccountUpdateParameters object itself. + */ + public StorageAccountUpdateParameters withTags(Map tags) { + this.tags = tags; + return this; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageBundle.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageBundle.java new file mode 100644 index 0000000..fe44233 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageBundle.java @@ -0,0 +1,124 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import java.util.Map; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * A Storage account bundle consists of key vault storage account details plus + * its attributes. + */ +public class StorageBundle { + /** + * The storage account id. + */ + @JsonProperty(value = "id", access = JsonProperty.Access.WRITE_ONLY) + private String id; + + /** + * The storage account resource id. + */ + @JsonProperty(value = "resourceId", access = JsonProperty.Access.WRITE_ONLY) + private String resourceId; + + /** + * The current active storage account key name. + */ + @JsonProperty(value = "activeKeyName", access = JsonProperty.Access.WRITE_ONLY) + private String activeKeyName; + + /** + * whether keyvault should manage the storage account for the user. + */ + @JsonProperty(value = "autoRegenerateKey", access = JsonProperty.Access.WRITE_ONLY) + private Boolean autoRegenerateKey; + + /** + * The key regeneration time duration specified in ISO-8601 format. + */ + @JsonProperty(value = "regenerationPeriod", access = JsonProperty.Access.WRITE_ONLY) + private String regenerationPeriod; + + /** + * The storage account attributes. + */ + @JsonProperty(value = "attributes", access = JsonProperty.Access.WRITE_ONLY) + private StorageAccountAttributes attributes; + + /** + * Application specific metadata in the form of key-value pairs. + */ + @JsonProperty(value = "tags", access = JsonProperty.Access.WRITE_ONLY) + private Map tags; + + /** + * Get the id value. + * + * @return the id value + */ + public String id() { + return this.id; + } + + /** + * Get the resourceId value. + * + * @return the resourceId value + */ + public String resourceId() { + return this.resourceId; + } + + /** + * Get the activeKeyName value. + * + * @return the activeKeyName value + */ + public String activeKeyName() { + return this.activeKeyName; + } + + /** + * Get the autoRegenerateKey value. + * + * @return the autoRegenerateKey value + */ + public Boolean autoRegenerateKey() { + return this.autoRegenerateKey; + } + + /** + * Get the regenerationPeriod value. + * + * @return the regenerationPeriod value + */ + public String regenerationPeriod() { + return this.regenerationPeriod; + } + + /** + * Get the attributes value. + * + * @return the attributes value + */ + public StorageAccountAttributes attributes() { + return this.attributes; + } + + /** + * Get the tags value. + * + * @return the tags value + */ + public Map tags() { + return this.tags; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageRestoreParameters.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageRestoreParameters.java new file mode 100644 index 0000000..4f23c77 --- /dev/null +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/StorageRestoreParameters.java @@ -0,0 +1,51 @@ +/** + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + */ + +package com.microsoft.azure.keyvault.models; + +import com.microsoft.rest.Base64Url; +import com.fasterxml.jackson.annotation.JsonProperty; + +/** + * The secret restore parameters. + */ +public class StorageRestoreParameters { + /** + * The backup blob associated with a storage account. + */ + @JsonProperty(value = "value", required = true) + private Base64Url storageBundleBackup; + + /** + * Get the storageBundleBackup value. + * + * @return the storageBundleBackup value + */ + public byte[] storageBundleBackup() { + if (this.storageBundleBackup == null) { + return null; + } + return this.storageBundleBackup.decodedBytes(); + } + + /** + * Set the storageBundleBackup value. + * + * @param storageBundleBackup the storageBundleBackup value to set + * @return the StorageRestoreParameters object itself. + */ + public StorageRestoreParameters withStorageBundleBackup(byte[] storageBundleBackup) { + if (storageBundleBackup == null) { + this.storageBundleBackup = null; + } else { + this.storageBundleBackup = Base64Url.encode(storageBundleBackup); + } + return this; + } + +} diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SubjectAlternativeNames.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SubjectAlternativeNames.java index a1357b5..cc373d1 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SubjectAlternativeNames.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/SubjectAlternativeNames.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Trigger.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Trigger.java index 3a3d286..544a760 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Trigger.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/Trigger.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; @@ -20,7 +22,9 @@ public class Trigger { private Integer lifetimePercentage; /** - * Days before expiry. + * Days before expiry to attempt renewal. Value should be between 1 and + * validity_in_months multiplied by 27. If validity_in_months is 36, then + * value should be between 1 and 972 (36 * 27). */ @JsonProperty(value = "days_before_expiry") private Integer daysBeforeExpiry; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/X509CertificateProperties.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/X509CertificateProperties.java index b10b968..ad09b29 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/X509CertificateProperties.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/X509CertificateProperties.java @@ -1,7 +1,9 @@ /** - * Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Copyright (c) Microsoft Corporation. All rights reserved. + * Licensed under the MIT License. See License.txt in the project root for + * license information. + * + * Code generated by Microsoft (R) AutoRest Code Generator. */ package com.microsoft.azure.keyvault.models; diff --git a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/package-info.java b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/package-info.java index 8635d41..e06b098 100644 --- a/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/package-info.java +++ b/azure-keyvault/src/main/java/com/microsoft/azure/keyvault/models/package-info.java @@ -1,6 +1,8 @@ -// Code generated by Microsoft (R) AutoRest Code Generator 1.2.2.0 -// Changes may cause incorrect behavior and will be lost if the code is -// regenerated. +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for +// license information. +// +// Code generated by Microsoft (R) AutoRest Code Generator. /** * This package contains the models classes for KeyVaultClientBase. diff --git a/azure-keyvault/src/test/java/com/microsoft/azure/keyvault/test/AsyncOperationsTest.java b/azure-keyvault/src/test/java/com/microsoft/azure/keyvault/test/AsyncOperationsTest.java index 1a1a405..11c8cf4 100644 --- a/azure-keyvault/src/test/java/com/microsoft/azure/keyvault/test/AsyncOperationsTest.java +++ b/azure-keyvault/src/test/java/com/microsoft/azure/keyvault/test/AsyncOperationsTest.java @@ -7,6 +7,7 @@ package com.microsoft.azure.keyvault.test; import java.security.MessageDigest; +import java.util.ArrayList; import java.util.HashMap; import java.util.List; import java.util.Map; @@ -22,6 +23,7 @@ import com.microsoft.azure.keyvault.models.CertificateItem; import com.microsoft.azure.keyvault.models.CertificateOperation; import com.microsoft.azure.keyvault.models.CertificatePolicy; +import com.microsoft.azure.keyvault.models.Contact; import com.microsoft.azure.keyvault.models.Contacts; import com.microsoft.azure.keyvault.models.IssuerBundle; import com.microsoft.azure.keyvault.models.IssuerParameters; @@ -47,6 +49,7 @@ import com.microsoft.azure.keyvault.webkey.JsonWebKeyEncryptionAlgorithm; import com.microsoft.azure.keyvault.webkey.JsonWebKeySignatureAlgorithm; import com.microsoft.azure.keyvault.webkey.JsonWebKeyType; +import com.microsoft.azure.keyvault.webkey.JsonWebKey; import com.microsoft.rest.ServiceCallback; public class AsyncOperationsTest extends KeyVaultClientIntegrationTestBase { @@ -180,6 +183,7 @@ public void secretAsyncForAsyncOperationsTest() throws Exception { } pollOnSecretDeletion(vault, secretname); keyVaultClient.purgeDeletedSecretAsync(vault, secretname, null).get(); + Thread.sleep(20000); } @Test @@ -255,6 +259,7 @@ public void certificateAsyncForAsyncOperationsTest() throws Exception { } keyVaultClient.purgeDeletedCertificate(vault, certificateName); + Thread.sleep(20000); } @Test @@ -287,8 +292,25 @@ public void issuerAsyncForAsyncOperationsTest() throws Exception { public void certificateContactsAsyncForAsyncOperationsTest() throws Exception { String vault = getVaultUri(); - - Contacts contacts = keyVaultClient.setCertificateContactsAsync(vault, new Contacts(), null).get(); + + Contact contact1 = new Contact(); + contact1.withName("James"); + contact1.withEmailAddress("james@contoso.com"); + contact1.withPhone("7777777777"); + + Contact contact2 = new Contact(); + contact2.withName("Ethan"); + contact2.withEmailAddress("ethan@contoso.com"); + contact2.withPhone("8888888888"); + + List contactList = new ArrayList(); + contactList.add(contact1); + contactList.add(contact2); + + Contacts certificateContacts = new Contacts(); + certificateContacts.withContactList(contactList); + + Contacts contacts = keyVaultClient.setCertificateContactsAsync(vault, certificateContacts, (ServiceCallback) null).get(); Assert.assertNotNull(contacts); contacts = keyVaultClient.getCertificateContactsAsync(vault, null).get(); diff --git a/azure-keyvault/src/test/java/com/microsoft/azure/keyvault/test/CertificateOperationsTest.java b/azure-keyvault/src/test/java/com/microsoft/azure/keyvault/test/CertificateOperationsTest.java index 2cc7b10..797d32b 100644 --- a/azure-keyvault/src/test/java/com/microsoft/azure/keyvault/test/CertificateOperationsTest.java +++ b/azure-keyvault/src/test/java/com/microsoft/azure/keyvault/test/CertificateOperationsTest.java @@ -23,6 +23,7 @@ import java.security.spec.InvalidKeySpecException; import java.security.spec.PKCS8EncodedKeySpec; import java.util.ArrayList; +import java.util.Arrays; import java.util.Collections; import java.util.HashMap; import java.util.HashSet; @@ -184,12 +185,17 @@ public void createSelfSignedCertificatePkcs12ForCertificateOperationsTest() thro CertificateBundle deletedCertificateBundle = keyVaultClient.deleteCertificate(getVaultUri(), certificateName); Assert.assertNotNull(deletedCertificateBundle); + + pollOnCertificateDeletion(getVaultUri(), certificateName); try { keyVaultClient.getCertificate(deletedCertificateBundle.certificateIdentifier().baseIdentifier()); } catch (KeyVaultErrorException e) { Assert.assertNotNull(e.body().error()); Assert.assertEquals("CertificateNotFound", e.body().error().code()); } + + keyVaultClient.purgeDeletedCertificate(getVaultUri(), certificateName); + Thread.sleep(20000); } /** @@ -243,6 +249,11 @@ public void createSelfSignedCertificatePemForCertificateOperationsTest() throws Assert.assertNotNull(e.body().error()); Assert.assertEquals("CertificateNotFound", e.body().error().code()); } + + pollOnCertificateDeletion(getVaultUri(), certificateName); + + keyVaultClient.purgeDeletedCertificate(getVaultUri(), certificateName); + Thread.sleep(20000); } /** @@ -341,6 +352,11 @@ public void createCertificatePkcs12ForCertificateOperationsTest() throws Excepti Assert.assertNotNull(e.body().error()); Assert.assertEquals("CertificateNotFound", e.body().error().code()); } + + pollOnCertificateDeletion(getVaultUri(), certificateName); + + keyVaultClient.purgeDeletedCertificate(getVaultUri(), certificateName); + Thread.sleep(20000); } /** @@ -415,6 +431,7 @@ public void createCertificatePemForCertificateOperationsTest() throws Exception CertificateBundle deletedCertificateBundle = keyVaultClient.deleteCertificate(getVaultUri(), certificateName); Assert.assertNotNull(deletedCertificateBundle); + try { keyVaultClient.getCertificate(deletedCertificateBundle.certificateIdentifier().baseIdentifier()); } @@ -422,20 +439,19 @@ public void createCertificatePemForCertificateOperationsTest() throws Exception Assert.assertNotNull(e.body().error()); Assert.assertEquals("CertificateNotFound", e.body().error().code()); } + + pollOnCertificateDeletion(getVaultUri(), certificateName); + + keyVaultClient.purgeDeletedCertificate(getVaultUri(), certificateName); + Thread.sleep(20000); } /** * Create a certificate signing request with key in Key Vault. - * @throws ExecutionException - * @throws InterruptedException - * @throws IOException - * @throws IllegalArgumentException - * @throws KeyVaultErrorException - * * @throws Exception */ @Test - public void createCsrForCertificateOperationsTest() throws InterruptedException, ExecutionException, KeyVaultErrorException, IllegalArgumentException, IOException { + public void createCsrForCertificateOperationsTest() throws Exception { SecretProperties secretProperties = new SecretProperties(); secretProperties.withContentType(MIME_PKCS12); @@ -471,23 +487,26 @@ public void createCsrForCertificateOperationsTest() throws InterruptedException, CertificateBundle deletedCertificateBundle = keyVaultClient.deleteCertificate(getVaultUri(), certificateName); Assert.assertNotNull(deletedCertificateBundle); + pollOnCertificateDeletion(getVaultUri(), certificateName); + try { keyVaultClient.getCertificate(deletedCertificateBundle.certificateIdentifier().baseIdentifier()); } catch (KeyVaultErrorException e) { Assert.assertNotNull(e.body().error()); Assert.assertEquals("CertificateNotFound", e.body().error().code()); } + + keyVaultClient.purgeDeletedCertificate(getVaultUri(), certificateName); + Thread.sleep(20000); } /** * Cancel the certificate create asynchronously - * @throws IOException - * @throws IllegalArgumentException - * @throws KeyVaultErrorException + * @throws Exception * */ @Test - public void certificateAsyncRequestCancellationForCertificateOperationsTest() throws KeyVaultErrorException, IllegalArgumentException, IOException { + public void certificateAsyncRequestCancellationForCertificateOperationsTest() throws Exception { // Set content type to indicate the certificate is PKCS12 format. SecretProperties secretProperties = new SecretProperties() .withContentType(MIME_PKCS12); @@ -524,6 +543,9 @@ public void certificateAsyncRequestCancellationForCertificateOperationsTest() th keyVaultClient.deleteCertificateOperation(getVaultUri(), certificateName); keyVaultClient.deleteCertificate(getVaultUri(), certificateName); + pollOnCertificateDeletion(getVaultUri(), certificateName); + keyVaultClient.purgeDeletedCertificate(getVaultUri(), certificateName); + Thread.sleep(20000); } /** @@ -574,13 +596,17 @@ public void importCertificatePkcs12ForCertificateOperationsTest() throws Excepti validateCertificateKeyInKeyStore(keyStore, x509Certificate, secretPassword); CertificateBundle deletedCertificateBundle = keyVaultClient.deleteCertificate(getVaultUri(), certificateName); - + pollOnCertificateDeletion(getVaultUri(), certificateName); + try { keyVaultClient.getCertificate(deletedCertificateBundle.certificateIdentifier().baseIdentifier()); } catch (KeyVaultErrorException e) { Assert.assertNotNull(e.body().error()); Assert.assertEquals("CertificateNotFound", e.body().error().code()); } + + keyVaultClient.purgeDeletedCertificate(getVaultUri(), certificateName); + Thread.sleep(10000); } /** @@ -629,6 +655,10 @@ public void certificateUpdateForCertificateOperationsTest() throws Exception { Assert.assertEquals(certificatePolicyUpdate.issuerParameters().name(), policy.issuerParameters().name()); keyVaultClient.deleteCertificate(getVaultUri(), certificateName); + pollOnCertificateDeletion(getVaultUri(), certificateName); + + keyVaultClient.purgeDeletedCertificate(getVaultUri(), certificateName); + Thread.sleep(10000); } /** @@ -691,6 +721,9 @@ public void listCertificatesForCertificateOperationsTest() throws Exception { for (String toDeleteCertificateName : toDelete) { keyVaultClient.deleteCertificate(getVaultUri(), toDeleteCertificateName); + pollOnCertificateDeletion(getVaultUri(), toDeleteCertificateName); + keyVaultClient.purgeDeletedCertificate(getVaultUri(), toDeleteCertificateName); + Thread.sleep(10000); } } @@ -751,6 +784,8 @@ public void listCertificateVersionsForCertificateOperationsTest() throws Excepti Assert.assertEquals(0, certificates.size()); keyVaultClient.deleteCertificate(getVaultUri(), certificateName); + pollOnCertificateDeletion(getVaultUri(), certificateName); + keyVaultClient.purgeDeletedCertificate(getVaultUri(), certificateName); } /** @@ -916,7 +951,7 @@ private static CertificateBundle pollOnCertificateOperation(CertificateOperation throw new Exception("Pending certificate processing delayed"); } - + /** * Extracts private key from PEM contents * diff --git a/azure-keyvault/target/test-classes/session-records/backupRestoreForKeyOperationsTest.json b/azure-keyvault/target/test-classes/session-records/backupRestoreForKeyOperationsTest.json index 43bd4f3..f6720f5 100644 --- a/azure-keyvault/target/test-classes/session-records/backupRestoreForKeyOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/backupRestoreForKeyOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:08:44 GMT", + "date" : "Thu, 08 Mar 2018 20:02:16 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "24918480-5c31-4e5b-90d4-13ade7c7fc9e", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c22194e3-3eb0-4bad-b107-88ed7e4106c1", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:08:45 GMT", + "date" : "Thu, 08 Mar 2018 20:02:16 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,20 +47,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8fcf42f4-92c5-4ca0-a04d-01d1294021e4", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/3738ef10154a459dbc162189a0274a3b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"lnkL47pSMyyH8rr3BE-Pr46OhBiJZWzyzH1zde4J8ljhZX1fvfzyhhG6vyaMtwHlGIqXTvpYpRxyreXvgokX2RmH3ldgaCQ-qjZ6-Ivnsfsb8ELZo4B7K7Ex5WoVZs2JBykiwDblwfgb_p4t6lxOkv2wvNI4zWJotbHD_9NM2ABeL1n7h0Do6cnOza0h8pr2J8BW_gBi3uOWxBR8-fck7Xv14qhsqpktYoEj-IxgsICXqEFH4ujFs1adg_mCQtITX1lZTRKB8Eub6a900LNsyW2rP-Uv6C3zCKJuBOsr0BbFGSiSeF20PqOLqNU6n5gqSS833QVRouf4K-hzUKUxtw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230125,\"updated\":1511230125,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "851eb1f5-5072-4a31-818c-bbffa984cdb3", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/cfafbccc14bc46f2814d75f6944ce8b0\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"3gSbCxEf9tZg-WBzbwWPZ5kGPbO1QxARdEaJWmfh4BImRY9mm6gTX2R6xN8V1ILIsrb7fSRjSSWQURlrD9MrLddAMicgCQEIKcaFxToGJkLC2BChTYaZQlcWWy2fBp7DMVdFHJ074PcVozgxjcyTRLUJLzdIE2nvDsW4JVaP3fHUkGhJb3CEsNjDVlArpeKhNqhB4Z14_BJs4qOBiu-yZehjcKYMUxv_2uPgfbAtsc9k6Dst8KykYF4YCHOU8Swgjd8y7VZsGDZXyp4wuOj_EsD2LDuFc07Gf5EBtXYaTOS2QhL6XTRrqg7nBQAe06VLQ8cmKTrzzYNhe1pH48U7TQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539336,\"updated\":1520539336,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/backup?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/backup?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:08:45 GMT", - "content-length" : "18543", + "date" : "Thu, 08 Mar 2018 20:02:17 GMT", + "content-length" : "19168", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1f67349d-02da-49e3-bf71-095870bf8bdc", - "Body" : "{\"value\":\"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\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "85e5aa1e-bbfe-41ab-bd0a-f3e71955fc8b", + "Body" : "{\"value\":\"&AzureKeyVaultKeyBackupV1.microsoft.comeyJraWQiOiI0Mzg1YjA3Yi1kNTQ3LTQyZTUtYWU5ZS02MTBkYzM5ZGZhZjgiLCJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.ZhTbglcHtQ9-1nk-DBGax1P1soQedZXbf5Ng36dcBmEKix2gxe9OcYp-POFGuv5hprg_ukruuezDgcd8mdC01OJ-OL76eMpQKsgR6bjXml-Tf_vpEd3pHkV_fuyFoQsJaEUJYDK1DH8OsinkfVj6GuWqpg4LJIwBekEa9fivMdZdSAI_51Qckbug4TM0vhmKqVPd8PxaSWZzhm3T7DHp1_z3YNqhQMFladFTX0qNMZqwh_N-j_05W-s_gblQH1FmEwKq8dA4uGWc5pamwyKr7O1KOmhVckrrJAF1oxddS4W0P7qGoIQMSY1tBZqJB1fS1-RUSt04CWGCL7vqrZAx3A.Md8djFUzRW4bkCIhHcNAdg.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.YsaR6ZikZnsqjziluUrw3w\"}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:09:06 GMT", + "date" : "Thu, 08 Mar 2018 20:02:37 GMT", "content-length" : "803", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4bdff6a6-949f-45fc-a067-8860bb4aeb3e", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1511230146,\"scheduledPurgeDate\":1519006146,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/3738ef10154a459dbc162189a0274a3b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"lnkL47pSMyyH8rr3BE-Pr46OhBiJZWzyzH1zde4J8ljhZX1fvfzyhhG6vyaMtwHlGIqXTvpYpRxyreXvgokX2RmH3ldgaCQ-qjZ6-Ivnsfsb8ELZo4B7K7Ex5WoVZs2JBykiwDblwfgb_p4t6lxOkv2wvNI4zWJotbHD_9NM2ABeL1n7h0Do6cnOza0h8pr2J8BW_gBi3uOWxBR8-fck7Xv14qhsqpktYoEj-IxgsICXqEFH4ujFs1adg_mCQtITX1lZTRKB8Eub6a900LNsyW2rP-Uv6C3zCKJuBOsr0BbFGSiSeF20PqOLqNU6n5gqSS833QVRouf4K-hzUKUxtw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230125,\"updated\":1511230125,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0c16f8f2-2d59-457f-87a4-76ad1cff5ae4", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1520539357,\"scheduledPurgeDate\":1528315357,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/cfafbccc14bc46f2814d75f6944ce8b0\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"3gSbCxEf9tZg-WBzbwWPZ5kGPbO1QxARdEaJWmfh4BImRY9mm6gTX2R6xN8V1ILIsrb7fSRjSSWQURlrD9MrLddAMicgCQEIKcaFxToGJkLC2BChTYaZQlcWWy2fBp7DMVdFHJ074PcVozgxjcyTRLUJLzdIE2nvDsW4JVaP3fHUkGhJb3CEsNjDVlArpeKhNqhB4Z14_BJs4qOBiu-yZehjcKYMUxv_2uPgfbAtsc9k6Dst8KykYF4YCHOU8Swgjd8y7VZsGDZXyp4wuOj_EsD2LDuFc07Gf5EBtXYaTOS2QhL6XTRrqg7nBQAe06VLQ8cmKTrzzYNhe1pH48U7TQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539336,\"updated\":1520539336,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:09:06 GMT", + "date" : "Thu, 08 Mar 2018 20:02:37 GMT", "content-length" : "75", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,45 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bbf66c46-e64b-4fec-9c33-21e695400e4e", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "3c64d59e-d3f0-4a23-9f88-3c66910f3ac9", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:09:15 GMT", - "content-length" : "75", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cb2b7999-e7fa-4781-9e2d-b7456b7c1dc2", - "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 02:09:26 GMT", + "date" : "Thu, 08 Mar 2018 20:02:47 GMT", "content-length" : "803", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -177,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b6c148e7-9805-4de8-8dba-a70b8610b0ae", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1511230146,\"scheduledPurgeDate\":1519006146,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/3738ef10154a459dbc162189a0274a3b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"lnkL47pSMyyH8rr3BE-Pr46OhBiJZWzyzH1zde4J8ljhZX1fvfzyhhG6vyaMtwHlGIqXTvpYpRxyreXvgokX2RmH3ldgaCQ-qjZ6-Ivnsfsb8ELZo4B7K7Ex5WoVZs2JBykiwDblwfgb_p4t6lxOkv2wvNI4zWJotbHD_9NM2ABeL1n7h0Do6cnOza0h8pr2J8BW_gBi3uOWxBR8-fck7Xv14qhsqpktYoEj-IxgsICXqEFH4ujFs1adg_mCQtITX1lZTRKB8Eub6a900LNsyW2rP-Uv6C3zCKJuBOsr0BbFGSiSeF20PqOLqNU6n5gqSS833QVRouf4K-hzUKUxtw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230125,\"updated\":1511230125,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "76df5805-542f-465d-bd1c-5ea22e028726", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1520539357,\"scheduledPurgeDate\":1528315357,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/cfafbccc14bc46f2814d75f6944ce8b0\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"3gSbCxEf9tZg-WBzbwWPZ5kGPbO1QxARdEaJWmfh4BImRY9mm6gTX2R6xN8V1ILIsrb7fSRjSSWQURlrD9MrLddAMicgCQEIKcaFxToGJkLC2BChTYaZQlcWWy2fBp7DMVdFHJ074PcVozgxjcyTRLUJLzdIE2nvDsW4JVaP3fHUkGhJb3CEsNjDVlArpeKhNqhB4Z14_BJs4qOBiu-yZehjcKYMUxv_2uPgfbAtsc9k6Dst8KykYF4YCHOU8Swgjd8y7VZsGDZXyp4wuOj_EsD2LDuFc07Gf5EBtXYaTOS2QhL6XTRrqg7nBQAe06VLQ8cmKTrzzYNhe1pH48U7TQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539336,\"updated\":1520539336,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:09:27 GMT", + "date" : "Thu, 08 Mar 2018 20:02:47 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -201,19 +175,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "432574a7-e617-4859-971a-188c73c69969", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b8c22c13-c8bf-468d-baa4-af3253f0247d", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/restore?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/restore?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:08 GMT", + "date" : "Thu, 08 Mar 2018 20:03:28 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -227,9 +201,9 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "43ddb8d2-1fb9-437a-b33e-803ed5a048da", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/3738ef10154a459dbc162189a0274a3b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"lnkL47pSMyyH8rr3BE-Pr46OhBiJZWzyzH1zde4J8ljhZX1fvfzyhhG6vyaMtwHlGIqXTvpYpRxyreXvgokX2RmH3ldgaCQ-qjZ6-Ivnsfsb8ELZo4B7K7Ex5WoVZs2JBykiwDblwfgb_p4t6lxOkv2wvNI4zWJotbHD_9NM2ABeL1n7h0Do6cnOza0h8pr2J8BW_gBi3uOWxBR8-fck7Xv14qhsqpktYoEj-IxgsICXqEFH4ujFs1adg_mCQtITX1lZTRKB8Eub6a900LNsyW2rP-Uv6C3zCKJuBOsr0BbFGSiSeF20PqOLqNU6n5gqSS833QVRouf4K-hzUKUxtw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230125,\"updated\":1511230125,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "bbe2688c-8410-4f19-8478-aaa3b2e670d3", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/cfafbccc14bc46f2814d75f6944ce8b0\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"3gSbCxEf9tZg-WBzbwWPZ5kGPbO1QxARdEaJWmfh4BImRY9mm6gTX2R6xN8V1ILIsrb7fSRjSSWQURlrD9MrLddAMicgCQEIKcaFxToGJkLC2BChTYaZQlcWWy2fBp7DMVdFHJ074PcVozgxjcyTRLUJLzdIE2nvDsW4JVaP3fHUkGhJb3CEsNjDVlArpeKhNqhB4Z14_BJs4qOBiu-yZehjcKYMUxv_2uPgfbAtsc9k6Dst8KykYF4YCHOU8Swgjd8y7VZsGDZXyp4wuOj_EsD2LDuFc07Gf5EBtXYaTOS2QhL6XTRrqg7nBQAe06VLQ8cmKTrzzYNhe1pH48U7TQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539336,\"updated\":1520539336,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } } ], "variables" : [ ] diff --git a/azure-keyvault/target/test-classes/session-records/certificateAsyncForAsyncOperationsTest.json b/azure-keyvault/target/test-classes/session-records/certificateAsyncForAsyncOperationsTest.json index f61339c..379788d 100644 --- a/azure-keyvault/target/test-classes/session-records/certificateAsyncForAsyncOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/certificateAsyncForAsyncOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:44 GMT", + "date" : "Wed, 07 Mar 2018 19:05:06 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "05955e0d-951f-4026-b1af-f49c34a55fa5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9f3c5d18-a22e-42f4-bcba-baaf6d0d3911", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:45 GMT", + "date" : "Wed, 07 Mar 2018 19:05:07 GMT", "content-length" : "1313", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -45,22 +45,22 @@ "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", "content-type" : "application/json; charset=utf-8", - "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=2016-10-01&request_id=ecd1032b344b4e2ca397811fe31b3b26", + "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=7.0-preview&request_id=ea185859713d41418f69b4ce3b35a29e", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "7e0df764-6dca-437c-bfc6-6db508ee1fc7", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ecd1032b344b4e2ca397811fe31b3b26\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "94785777-d5d3-4a9f-95f7-d2fd7f5d280a", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"MIICrzCCAZcCAQAwHzEdMBsGA1UEAxMUU2VsZlNpZ25lZEphdmFQa2NzMTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDgIRIJB9Ud8x54eW/c0C8e7l92mNvrJAX5RK5fKwsYaAqSn4ALxpd/7tO1jfjFyNzU8klh+XUWvMXMSdQwueMfpx86nGvsAOSPKzjd7lthAEWIiIgGs8Ey/eOmjkZV/ho2r0mIyUqQdYo6yoAzUccXKRH0p/ZIz51jUu5JJmLb/Z/jTncpvFnEFR39OdA/1CW0uabi/2o7hVBrp2D30l2OY7f/aQ4zFXzmLjqnbDHPdoVYFEmaSvGVC3H9UEh/Y6aMqaIQ9Lz+uC0hxO6D/vHhip/c81SssDLANzfbVMWSfq2xDMA3mfaDAlpPYgzDBuDDuwWXgeGuQQA4+DdfQxmLAgMBAAGgSzBJBgkqhkiG9w0BCQ4xPDA6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCQYDVR0TBAIwADANBgkqhkiG9w0BAQsFAAOCAQEAkeEF5lhbL/KFcR0BTIZAblUDCmqPGPs2PsOoHqkm2sYlaL5VFjRt0kF6yL0QpDMWj6H4DIWDKnyFBOW9E/nC1l5BiD9ZHJRG1t6oORpngwjxjrGA9YDw/A2YFsKvzKwtLS6mV47TYNV/8tNswPmt06sMw9r392+VDExkRn8urMqO7Xfb5sAIAdBpEBHQC1LzAEvEb79/RLwnnsySxldR1gOkqXQkEzj2ToBBL/WwyEpwPOiehJ2rtkN3/J1QwcDdvh4HwQR8h2rXUiFVZJGvlkJnMQwtcC61Q+PPQ2eN8B0YzMZ3RkviItlpRY/bGy2t6c0r0erNJ/Z+qCm+2d18xw==\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ea185859713d41418f69b4ce3b35a29e\"}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:47 GMT", + "date" : "Wed, 07 Mar 2018 19:05:07 GMT", "content-length" : "1313", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -74,19 +74,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1b439e7e-f6af-42d4-b192-39c3decfc34c", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ecd1032b344b4e2ca397811fe31b3b26\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a34dbdab-2fae-4a82-ba2f-94328930d2d6", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ea185859713d41418f69b4ce3b35a29e\"}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:47 GMT", + "date" : "Wed, 07 Mar 2018 19:05:08 GMT", "content-length" : "1015", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -100,19 +100,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "07ff76b5-088e-433b-a564-7eeb61077e86", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/aab58894f4c24cfb998687f536941345\",\"attributes\":{\"enabled\":false,\"nbf\":1511294145,\"exp\":1542830745,\"created\":1511294745,\"updated\":1511294747,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"tag1\":\"foo\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511294745,\"updated\":1511294747}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0a448b16-479d-43ed-9a7f-2c319ed68085", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/0e975c19de66430682aa0042fb6d8e1b\",\"attributes\":{\"enabled\":false,\"nbf\":1520448906,\"exp\":1551985506,\"created\":1520449506,\"updated\":1520449508,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"tag1\":\"foo\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520449507,\"updated\":1520449508}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\"}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:48 GMT", + "date" : "Wed, 07 Mar 2018 19:05:08 GMT", "content-length" : "620", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -126,19 +126,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b160538e-711c-42f8-b10c-a6a0af21812a", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511294745,\"updated\":1511294748}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "aae3e87a-2b15-4980-9430-adc6f88d1700", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520449507,\"updated\":1520449509}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:48 GMT", + "date" : "Wed, 07 Mar 2018 19:05:08 GMT", "content-length" : "620", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -152,19 +152,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "6585761d-d047-4f57-a8f5-af768cc5de93", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511294745,\"updated\":1511294748}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "2b8b1580-a0c6-409e-876f-e7f3db2534e3", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520449507,\"updated\":1520449509}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:48 GMT", + "date" : "Wed, 07 Mar 2018 19:05:09 GMT", "content-length" : "1313", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -178,19 +178,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8ddd5745-46b9-4801-87a0-cca6ccb0ddb8", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ecd1032b344b4e2ca397811fe31b3b26\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "09c7a2c3-0025-4f1c-9fe7-8024ae9e6370", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ea185859713d41418f69b4ce3b35a29e\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:48 GMT", + "date" : "Wed, 07 Mar 2018 19:05:09 GMT", "content-length" : "1015", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -204,19 +204,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c48e2546-35c5-4baf-adee-4ddd3198eb75", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/aab58894f4c24cfb998687f536941345\",\"attributes\":{\"enabled\":false,\"nbf\":1511294145,\"exp\":1542830745,\"created\":1511294745,\"updated\":1511294747,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"tag1\":\"foo\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511294745,\"updated\":1511294748}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fbec32c1-e6d6-484b-aa74-24f888391a61", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/0e975c19de66430682aa0042fb6d8e1b\",\"attributes\":{\"enabled\":false,\"nbf\":1520448906,\"exp\":1551985506,\"created\":1520449506,\"updated\":1520449508,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"tag1\":\"foo\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520449507,\"updated\":1520449509}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:49 GMT", + "date" : "Wed, 07 Mar 2018 19:05:09 GMT", "content-length" : "924", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -230,20 +230,20 @@ "content-type" : "application/pkcs10; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "aa14add4-c105-4fe9-9778-eeeb4b3fe22c", - "Body" : "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" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d9e64089-a1a6-4025-8ce6-c5eeb41ed68c", + "Body" : "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" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:49 GMT", - "content-length" : "28", + "date" : "Wed, 07 Mar 2018 19:05:10 GMT", + "content-length" : "939", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -256,19 +256,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "78973e79-c6bb-497c-bb32-cdf954643dda", - "Body" : "{\"value\":[],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c47c8b2d-5c05-492d-9fa0-9072ae22737e", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036639,\"updated\":1520036639}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036640,\"updated\":1520036640}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036641,\"updated\":1520036641}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036641,\"updated\":1520036641}}],\"nextLink\":null}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/versions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/versions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:49 GMT", + "date" : "Wed, 07 Mar 2018 19:05:10 GMT", "content-length" : "28", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -282,19 +282,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cf39f045-1683-4419-b1a3-14cfa354a7c0", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "4cd1c5fc-d5b7-4b22-bc5c-a48bbac859f9", "Body" : "{\"value\":[],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:50 GMT", + "date" : "Wed, 07 Mar 2018 19:05:10 GMT", "content-length" : "1313", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -308,19 +308,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4cfd8484-d991-48c7-93df-e8635c93b8de", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ecd1032b344b4e2ca397811fe31b3b26\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c0238cec-58af-466f-87d1-ceaefe7795f8", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ea185859713d41418f69b4ce3b35a29e\"}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:50 GMT", + "date" : "Wed, 07 Mar 2018 19:05:11 GMT", "content-length" : "1067", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -334,45 +334,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "6c18fcbc-41e7-465c-ad94-c11532851fec", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate\",\"deletedDate\":1511294750,\"scheduledPurgeDate\":1519070750,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/aab58894f4c24cfb998687f536941345\",\"attributes\":{\"enabled\":false,\"nbf\":1511294145,\"exp\":1542830745,\"created\":1511294745,\"updated\":1511294747,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"tag1\":\"foo\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511294745,\"updated\":1511294748}}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:50 GMT", - "content-length" : "97", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e5589c89-563f-448b-bbfe-dbc4b42e3da1", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: myCertificate\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b9088ada-7854-46c3-a994-c03184e3b055", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate\",\"deletedDate\":1520449511,\"scheduledPurgeDate\":1528225511,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/0e975c19de66430682aa0042fb6d8e1b\",\"attributes\":{\"enabled\":false,\"nbf\":1520448906,\"exp\":1551985506,\"created\":1520449506,\"updated\":1520449508,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"tag1\":\"foo\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520449507,\"updated\":1520449509}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:00 GMT", + "date" : "Wed, 07 Mar 2018 19:05:11 GMT", "content-length" : "97", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -386,19 +360,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "30e3e691-2822-4c0e-b216-f5efa944fa50", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "6ef44bfe-7933-412f-8aba-46768c4a3215", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: myCertificate\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:11 GMT", + "date" : "Wed, 07 Mar 2018 19:05:21 GMT", "content-length" : "97", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -412,19 +386,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9d8a089a-c76b-403c-b6dc-0ef38cd78142", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0947abc5-339a-4368-89d6-5bb24be551fc", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: myCertificate\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:21 GMT", + "date" : "Wed, 07 Mar 2018 19:05:32 GMT", "content-length" : "1067", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -438,19 +412,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e4f9fc99-4487-4447-b858-429004a0bed3", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate\",\"deletedDate\":1511294750,\"scheduledPurgeDate\":1519070750,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/aab58894f4c24cfb998687f536941345\",\"attributes\":{\"enabled\":false,\"nbf\":1511294145,\"exp\":1542830745,\"created\":1511294745,\"updated\":1511294747,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"tag1\":\"foo\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511294745,\"updated\":1511294748}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0ebcec03-38c6-4c7f-9830-41821732e820", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate\",\"deletedDate\":1520449511,\"scheduledPurgeDate\":1528225511,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/0e975c19de66430682aa0042fb6d8e1b\",\"attributes\":{\"enabled\":false,\"nbf\":1520448906,\"exp\":1551985506,\"created\":1520449506,\"updated\":1520449508,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"tag1\":\"foo\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520449507,\"updated\":1520449509}}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/myCertificate?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:21 GMT", + "date" : "Wed, 07 Mar 2018 19:05:32 GMT", "content-length" : "89", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -464,19 +438,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "573c9bd0-5b9a-4da2-b5fd-cc9e1be2e697", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "8a63851d-c37b-4c73-88ea-8723fffaa9f0", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: myCertificate\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/myCertificate?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:22 GMT", + "date" : "Wed, 07 Mar 2018 19:05:32 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -488,8 +462,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "fb1df3a4-99c5-4cb9-8b8d-df2727df76bd", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "bd4b9374-f7ae-4870-b5ac-c19230f03134", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/certificateAsyncRequestCancellationForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/certificateAsyncRequestCancellationForCertificateOperationsTest.json index a79c3e5..81a89f0 100644 --- a/azure-keyvault/target/test-classes/session-records/certificateAsyncRequestCancellationForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/certificateAsyncRequestCancellationForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:08 GMT", + "date" : "Wed, 07 Mar 2018 22:04:54 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "78281ba9-bd9f-4b72-a260-6c4b9f267204", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "123fe1e9-288f-48c8-a871-f66f127f59ea", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:11 GMT", + "date" : "Wed, 07 Mar 2018 22:04:56 GMT", "content-length" : "1329", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -45,22 +45,22 @@ "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", "content-type" : "application/json; charset=utf-8", - "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending?api-version=2016-10-01&request_id=29811fdc28954f08ab79df6b574e2a24", + "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending?api-version=7.0-preview&request_id=bd9b8a6dc3c64264904600f3e3088669", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e0e157e9-a146-443e-95ef-94fddc5099c9", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"29811fdc28954f08ab79df6b574e2a24\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7197c19c-e810-4c7d-a182-cb12e3c08229", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"bd9b8a6dc3c64264904600f3e3088669\"}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:11 GMT", + "date" : "Wed, 07 Mar 2018 22:04:56 GMT", "content-length" : "1328", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -74,19 +74,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ef790cf9-706a-42e4-91cb-805de67524d1", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"MIICrzCCAZcCAQAwHzEdMBsGA1UEAxMUU2VsZlNpZ25lZEphdmFQa2NzMTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCT9Ee8MbIKngGR8fyStXx+BQrp9YbWFY8AbGqLdtl15HW1+64tnmCGLbXxP3J5bi+GPmF2Mi314wAHaWMGVQbHUmYS8Z4rKq9zXoWkrz0fnGYrlpjLE572iQx6VqeNaZ8gMHkT1MOpkLd+wgt4FsnlBS1X1L4RQ9I14WrFbwxI0s3Vu/+Ot9h/mQ8t1H16aysE4ukmgd6D8JqHbQPdAFP5485rkLv2nlWejsNy0T7sa63HnnF2kOWyXNYZHoevIghYXFHzzGMWwZaNqGl136dIMyhvk4Qpkax7EHnB12SHRp2Wkv20TvY8XnDDJK2SNDkdgkfQYn1G5885YjrEsLxTAgMBAAGgSzBJBgkqhkiG9w0BCQ4xPDA6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCQYDVR0TBAIwADANBgkqhkiG9w0BAQsFAAOCAQEAZTqNn0ESLulI3u3y+QMYNZXutIuefK6ULJp6QZs1Aud09Hfi6Eyt9P7ZhQVjokLzCv6z5UfmcDCsws6E60AqLBl97uAb7ktQ3JiQU5rYaDhKnlDUjNq89/7kWTihqcIAPBNjFXC6QtJ/qZLrV45sQC6CedEiIiMGcEKevYgTyjeZ5rry95ilhYNEP/xVjylmzvbhmQssS/2Dfc5y0kOAN9c1rpWpPwbiEBYuTE98Jo3bXOxH7SoRhCN54XvmmLVzIdHWyLAB6g9GX71hRHI5KB3Wr48XhDhd/UQ6o1+05uoKhwzsR/Fb2sw4pj7f+gATzs1t1U/ypjRHV4SevaDAIQ==\",\"cancellation_requested\":true,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"29811fdc28954f08ab79df6b574e2a24\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d16849cf-d662-46e7-ad54-4953b50b7e36", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":true,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"bd9b8a6dc3c64264904600f3e3088669\"}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:12 GMT", + "date" : "Wed, 07 Mar 2018 22:04:57 GMT", "content-length" : "1328", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -100,19 +100,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cacf3a88-1535-4d76-a3aa-6c76fb4c0569", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":true,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"29811fdc28954f08ab79df6b574e2a24\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "190454f2-ed88-4f92-a18c-31bd1aa1fbd1", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":true,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"bd9b8a6dc3c64264904600f3e3088669\"}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:12 GMT", + "date" : "Wed, 07 Mar 2018 22:04:57 GMT", "content-length" : "1093", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -126,19 +126,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2e9aea8d-1145-4134-a35c-0e97958af749", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava\",\"deletedDate\":1511297952,\"scheduledPurgeDate\":1519073952,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/d32ed2ad8dd341198efeed8a70220eb6\",\"attributes\":{\"enabled\":false,\"nbf\":1511297350,\"exp\":1542833950,\"created\":1511297950,\"updated\":1511297950,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511297951,\"updated\":1511297951}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "471087ba-3118-4216-b736-c113ffa1e1ed", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava\",\"deletedDate\":1520460297,\"scheduledPurgeDate\":1528236297,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/4321edf8e6f34393b228bd9fa5f9d4b3\",\"attributes\":{\"enabled\":false,\"nbf\":1520459695,\"exp\":1551996295,\"created\":1520460295,\"updated\":1520460295,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520460295,\"updated\":1520460295}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:12 GMT", + "date" : "Wed, 07 Mar 2018 22:04:57 GMT", "content-length" : "113", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -152,45 +152,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "96400692-e0ba-4e8f-8da3-e19b466bbf4c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c56c0752-8f38-49d4-ad41-534419edb17e", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: cancellationRequestedCertJava\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:22 GMT", - "content-length" : "113", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cb08a0ba-3832-4bdf-8cfd-4462ac6c8244", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: cancellationRequestedCertJava\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:32 GMT", + "date" : "Wed, 07 Mar 2018 22:05:07 GMT", "content-length" : "1093", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -204,19 +178,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9890177a-fe67-450e-9c3b-9599039b1678", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava\",\"deletedDate\":1511297952,\"scheduledPurgeDate\":1519073952,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/d32ed2ad8dd341198efeed8a70220eb6\",\"attributes\":{\"enabled\":false,\"nbf\":1511297350,\"exp\":1542833950,\"created\":1511297950,\"updated\":1511297950,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511297951,\"updated\":1511297951}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "15b70026-a7f1-4197-a3de-a0d174f97a47", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava\",\"deletedDate\":1520460297,\"scheduledPurgeDate\":1528236297,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/4321edf8e6f34393b228bd9fa5f9d4b3\",\"attributes\":{\"enabled\":false,\"nbf\":1520459695,\"exp\":1551996295,\"created\":1520460295,\"updated\":1520460295,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/cancellationRequestedCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520460295,\"updated\":1520460295}}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:34 GMT", + "date" : "Wed, 07 Mar 2018 22:05:07 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -228,36 +202,10 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "90b73a76-294a-4149-8024-f7cc5aed2c40", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "30934f61-64bc-4221-9134-c3b1c6bec972", "Body" : "" } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/cancellationRequestedCertJava?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:34 GMT", - "content-length" : "113", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ed808159-bfaf-4629-9445-913922b1b7d0", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: cancellationRequestedCertJava\"}}" - } } ], "variables" : [ ] } \ No newline at end of file diff --git a/azure-keyvault/target/test-classes/session-records/certificateContactsAsyncForAsyncOperationsTest.json b/azure-keyvault/target/test-classes/session-records/certificateContactsAsyncForAsyncOperationsTest.json index d44b13e..9beece9 100644 --- a/azure-keyvault/target/test-classes/session-records/certificateContactsAsyncForAsyncOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/certificateContactsAsyncForAsyncOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:43 GMT", + "date" : "Wed, 07 Mar 2018 19:05:04 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,20 +21,20 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "774b1562-339d-42d4-a35a-54c9eb87ad86", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "aad53d41-872f-4d1f-bfe3-9e757f918850", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:43 GMT", - "content-length" : "77", + "date" : "Wed, 07 Mar 2018 19:05:04 GMT", + "content-length" : "222", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -47,20 +47,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9c362671-644f-4ac6-b408-c167c2f05c1a", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "cbfaaeff-21b2-4627-b0bd-43363403e1ca", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts\",\"contacts\":[{\"email\":\"james@contoso.com\",\"name\":\"James\",\"phone\":\"7777777777\"},{\"email\":\"ethan@contoso.com\",\"name\":\"Ethan\",\"phone\":\"8888888888\"}]}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:44 GMT", - "content-length" : "77", + "date" : "Wed, 07 Mar 2018 19:05:04 GMT", + "content-length" : "222", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -73,20 +73,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bc1534c6-7a7b-4cd2-abb2-3f8716b41ceb", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "19eb66b2-2234-4ba7-80f5-4ac7b94bee1d", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts\",\"contacts\":[{\"email\":\"james@contoso.com\",\"name\":\"James\",\"phone\":\"7777777777\"},{\"email\":\"ethan@contoso.com\",\"name\":\"Ethan\",\"phone\":\"8888888888\"}]}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:05:44 GMT", - "content-length" : "77", + "date" : "Wed, 07 Mar 2018 19:05:05 GMT", + "content-length" : "222", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -99,9 +99,9 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "59d924c8-1e0a-416a-86a6-a77161c5d378", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9fe24833-8c38-4724-9059-c945f91f2d99", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts\",\"contacts\":[{\"email\":\"james@contoso.com\",\"name\":\"James\",\"phone\":\"7777777777\"},{\"email\":\"ethan@contoso.com\",\"name\":\"Ethan\",\"phone\":\"8888888888\"}]}" } } ], "variables" : [ ] diff --git a/azure-keyvault/target/test-classes/session-records/certificateUpdateForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/certificateUpdateForCertificateOperationsTest.json index b00477b..a291529 100644 --- a/azure-keyvault/target/test-classes/session-records/certificateUpdateForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/certificateUpdateForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:07 GMT", + "date" : "Wed, 07 Mar 2018 22:14:34 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bd6a6832-2237-435e-9f80-10db6f99b8ac", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b8362194-4acd-406a-b96a-96fa665a900f", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:07 GMT", + "date" : "Wed, 07 Mar 2018 22:14:36 GMT", "content-length" : "1846", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "93752987-34af-4af6-ae1e-d4f067c30023", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/73181f920c51400787058d082305753a\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/updateCertJava/73181f920c51400787058d082305753a\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/updateCertJava/73181f920c51400787058d082305753a\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298127,\"updated\":1511298127,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298127,\"updated\":1511298127}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "03303389-ee16-4dae-810f-fb36bb3dd9bc", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520460875,\"updated\":1520460875,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520460875,\"updated\":1520460875}}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:08 GMT", + "date" : "Wed, 07 Mar 2018 22:14:36 GMT", "content-length" : "1857", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4401ac1b-e117-4856-8043-7186d1ac76b1", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/73181f920c51400787058d082305753a\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/updateCertJava/73181f920c51400787058d082305753a\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/updateCertJava/73181f920c51400787058d082305753a\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":false,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298127,\"updated\":1511298128,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298127,\"updated\":1511298128}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "1240be4f-fcd4-4002-b304-db820e1010d8", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":false,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520460875,\"updated\":1520460876,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520460875,\"updated\":1520460876}}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:09 GMT", + "date" : "Wed, 07 Mar 2018 22:14:37 GMT", "content-length" : "543", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ff4ec830-a006-4c3c-a38d-956646540d38", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298127,\"updated\":1511298129}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "df2c1eb0-a63b-4519-96e0-01a9ac635fc7", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520460875,\"updated\":1520460877}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:09 GMT", + "date" : "Wed, 07 Mar 2018 22:14:37 GMT", "content-length" : "543", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,19 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bd27ba72-0544-4d8e-9e75-3cc3cff62adc", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298127,\"updated\":1511298129}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5fc3cc46-825d-4b51-ac3c-5de81fc2d607", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520460875,\"updated\":1520460877}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:10 GMT", + "date" : "Wed, 07 Mar 2018 22:14:38 GMT", "content-length" : "2008", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "be4973c4-aac7-4572-bbff-32c7d00a41ae", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava\",\"deletedDate\":1511298129,\"scheduledPurgeDate\":1519074129,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/73181f920c51400787058d082305753a\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/updateCertJava/73181f920c51400787058d082305753a\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/updateCertJava/73181f920c51400787058d082305753a\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":false,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298127,\"updated\":1511298128,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298127,\"updated\":1511298129}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a5e3c1ae-a393-497a-acc5-db4a6634a59c", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava\",\"deletedDate\":1520460878,\"scheduledPurgeDate\":1528236878,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":false,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520460875,\"updated\":1520460876,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520460875,\"updated\":1520460877}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:10 GMT", + "date" : "Wed, 07 Mar 2018 22:14:38 GMT", "content-length" : "98", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -177,45 +177,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2e765381-f743-4bff-acac-3be0252a9905", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f3929f88-2cf8-420c-a99b-fa1a59cdb7d5", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: updateCertJava\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:20 GMT", - "content-length" : "98", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "09095dc6-bce7-463f-8cad-9615c5e75d1f", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: updateCertJava\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:31 GMT", + "date" : "Wed, 07 Mar 2018 22:14:48 GMT", "content-length" : "2008", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -229,19 +203,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4c8a2581-647d-4851-a28a-8699a70ddc71", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava\",\"deletedDate\":1511298129,\"scheduledPurgeDate\":1519074129,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/73181f920c51400787058d082305753a\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/updateCertJava/73181f920c51400787058d082305753a\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/updateCertJava/73181f920c51400787058d082305753a\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":false,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298127,\"updated\":1511298128,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298127,\"updated\":1511298129}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ddcd4c89-cde8-4bc5-a8ea-d55ed6e0d252", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava\",\"deletedDate\":1520460878,\"scheduledPurgeDate\":1528236878,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/updateCertJava/2506ef63803a4dc1a313f67240af6094\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":false,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520460875,\"updated\":1520460876,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/updateCertJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520460875,\"updated\":1520460877}}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/updateCertJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:32 GMT", + "date" : "Wed, 07 Mar 2018 22:14:48 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -253,8 +227,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a817453e-fafd-4476-bf85-96a34fb82d1e", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "44546158-670a-48e6-82cf-92f34b9c66dd", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/contactsCrudOperationsForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/contactsCrudOperationsForCertificateOperationsTest.json index de65f65..277e22a 100644 --- a/azure-keyvault/target/test-classes/session-records/contactsCrudOperationsForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/contactsCrudOperationsForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:15 GMT", + "date" : "Wed, 07 Mar 2018 22:16:54 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8e7f7cca-128e-4c64-abce-314561c4b76b", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "afb9074f-bc23-4e08-b337-a21a106fa854", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:15 GMT", + "date" : "Wed, 07 Mar 2018 22:16:54 GMT", "content-length" : "222", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "6e99af50-deaa-42fc-a720-fbc21dfb8d81", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "17611dd9-fa26-47ea-a8ec-119b05c697cb", "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts\",\"contacts\":[{\"email\":\"james@contoso.com\",\"name\":\"James\",\"phone\":\"7777777777\"},{\"email\":\"ethan@contoso.com\",\"name\":\"Ethan\",\"phone\":\"8888888888\"}]}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:16 GMT", + "date" : "Wed, 07 Mar 2018 22:16:55 GMT", "content-length" : "222", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e1a2182f-8394-4a6f-bec3-a02c735b65cd", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e8551b5b-b3b0-4465-b556-8471e818f429", "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts\",\"contacts\":[{\"email\":\"james@contoso.com\",\"name\":\"James\",\"phone\":\"7777777777\"},{\"email\":\"ethan@contoso.com\",\"name\":\"Ethan\",\"phone\":\"8888888888\"}]}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:16 GMT", + "date" : "Wed, 07 Mar 2018 22:16:55 GMT", "content-length" : "222", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b82af677-5e92-4c14-9ff7-ffb2fc9d7aaf", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "91944fbc-108b-4da1-be1f-d813b2984c2a", "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts\",\"contacts\":[{\"email\":\"james@contoso.com\",\"name\":\"James\",\"phone\":\"7777777777\"},{\"email\":\"ethan@contoso.com\",\"name\":\"Ethan\",\"phone\":\"8888888888\"}]}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/contacts?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:16 GMT", + "date" : "Wed, 07 Mar 2018 22:16:55 GMT", "content-length" : "68", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,8 +125,8 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cd4174cc-16bb-418f-8f28-b2d050addd7a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7017ff90-c0a2-4aea-8571-5928913e5d43", "Body" : "{\"error\":{\"code\":\"ContactsNotFound\",\"message\":\"Contacts not found\"}}" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/createCertificatePemForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/createCertificatePemForCertificateOperationsTest.json index c7244d3..ed26394 100644 --- a/azure-keyvault/target/test-classes/session-records/createCertificatePemForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/createCertificatePemForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPemIssuer01?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPemIssuer01?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:34 GMT", + "date" : "Wed, 07 Mar 2018 22:17:29 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "93bc2687-144b-4cde-8884-c1347a269903", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d6c99d67-6b75-4be6-ad14-6643c0f4cd7b", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPemIssuer01?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPemIssuer01?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:34 GMT", + "date" : "Wed, 07 Mar 2018 22:17:29 GMT", "content-length" : "373", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "73b5eed8-b35e-4d0c-b1f7-7b60ec0d0aae", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPemIssuer01\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account1\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1504827186,\"updated\":1511297974}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5ae5f6fe-0f31-485d-bf37-66a263b51887", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPemIssuer01\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account1\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1504827186,\"updated\":1520461050}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:36 GMT", + "date" : "Wed, 07 Mar 2018 22:17:32 GMT", "content-length" : "1333", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -71,22 +71,22 @@ "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", "content-type" : "application/json; charset=utf-8", - "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending?api-version=2016-10-01&request_id=af63a55ef1ae4aac8e2d153ed3bac6db", + "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending?api-version=7.0-preview&request_id=673385ba95554c19a1424b95591f9818", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "106d2ceb-4605-4142-a162-f9d6cc135b0d", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\",\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"af63a55ef1ae4aac8e2d153ed3bac6db\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "198920d0-8e7a-4ea2-857b-7f02ef640c12", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\",\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"673385ba95554c19a1424b95591f9818\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:36 GMT", + "date" : "Wed, 07 Mar 2018 22:17:32 GMT", "content-length" : "1333", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -100,19 +100,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5b6a674a-b789-4ade-b6d7-5dcf72d62837", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\",\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"csr\":\"MIICpjCCAY4CAQAwFjEUMBIGA1UEAxMLVGVzdEphdmFQZW0wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9ptRDnOjUczy3vHqzkXc9P394rChCDi0fZqRE32cl6NFsYeaDWJjb//yZ26IlPQIQt7ZBQ4uMaecpLqwStKAZs1WiVZFtgN+0lgT+VO/7DjextQivGjP6HF+vwaL0ME2wtkufHgpkSEtiYwkNyUXbyapUH5nTGUU/lMZmQ+Ty45INjKNb/eP2OcbteCjGzj4fs4bsL8WpytkdJ10uFb30D51i26wxFoYeLm2rVo644kxNYvjIKVd+Z7xo6H5DD9S54Zjec/tpTLp62VlbUrGsgYz/MicGuYrA/lGRGXFOxoMUacaxOFnO2yezYcDbR1feoY4jFD2v1qDVeLv9KH7RAgMBAAGgSzBJBgkqhkiG9w0BCQ4xPDA6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCQYDVR0TBAIwADANBgkqhkiG9w0BAQsFAAOCAQEAFBtzchXIEw6Hvy4MZ7O6NeKex5U8dFwDHm6ZZSgqW8vzd6lZInYQEN4rWZJW8atMIVcJOknw1JI18qAFXWJW0OqxJ8yEFit555GyL9oS5rn6pFT7T1F38493SymdqRczYO/DnrGQ/nKkXsFYZ13T+l+7OW0MKUZyOjMuKkTlrmKHstQwtwN2MSPjJ3JRVYwOuQkRrQt3U1Fx+TVAMYX0SBs04t6x7VU4egiIArvXYPFbUo7nIQOWIHWZyVKt9UigMnxqRjKU4szmA2h3VpJ4FVmGfSBVkzGAj1U92w3ClW8q7GZbTYBHaYT62IHtmsoTXDgbfMueJg6sPWxj7K3X+g==\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"af63a55ef1ae4aac8e2d153ed3bac6db\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "4dafea4e-0a14-4df7-bb77-7eccb878d915", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\",\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"673385ba95554c19a1424b95591f9818\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:46 GMT", + "date" : "Wed, 07 Mar 2018 22:17:42 GMT", "content-length" : "1333", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -126,19 +126,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ae2126b8-cd4e-4481-aff3-a1417aeea98f", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\",\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"af63a55ef1ae4aac8e2d153ed3bac6db\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a3821b81-6b60-40f4-b77e-248329265350", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\",\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"csr\":\"MIICpjCCAY4CAQAwFjEUMBIGA1UEAxMLVGVzdEphdmFQZW0wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCk5lT8W3cxRbjG+/vkDZhq1Adx4ffJ0o9+Oj0UpyiQJAbP3f8+iKxWHE7nTjVcuVUNQvE31/MQcEUcy8Mx9dOjv/hCLSRs42YXX8pmTQvNdrcyLs7/u25Vb8wc5BHn0TRnS9ehWD2LMFr4Z8fEu46G2/UKyA61iS0II0r6BkEUHp0CyKx/CpsRit/EueGC5luRIbG7Jq3mKXgnIbsi1xTRpZpZAu+26+CyewDgs1+6uKZNRRIO+3OHkKYbSyMUSvcgvlu7fH5HWu04QNbFEYQKEZRkM4J+0ZwNIFyGA97S749owsC9Th7suDSUZKNCxgbKE0svl6fjoPW9m/pcVisfAgMBAAGgSzBJBgkqhkiG9w0BCQ4xPDA6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCQYDVR0TBAIwADANBgkqhkiG9w0BAQsFAAOCAQEAJUjCKagi5m9GWg84i/OfqkJMIPo505enulaIjatPmr4zFpJyliH4zjPUqcS4/MWSvk/FrmPNO7iFjpIu3ZpLHVE5ghibs1DEbVI9GhgsMULgDRSVUtNRAMg/A6u9AFm4lo1PQt6Z/85+tU5u147avibjNEWJvy8etVAvCz6t/c6B5cPokGDG2Lgob+sElSXt1c8EunYFrQC8cRStGGHrUkIQ3DfqOLrWI290nb8Y+MrSJ+4fAB07ge/qP6M3BkIiBcbHj0v0qOyH75UjqGtYd3lRWQ2PETNs56iC9706FW50OUU9wvT0SEma9JXI5GJklAULv01CmsYGJbz+i8fMqQ==\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"673385ba95554c19a1424b95591f9818\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:56 GMT", + "date" : "Wed, 07 Mar 2018 22:17:52 GMT", "content-length" : "1257", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -152,19 +152,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "6c614497-ddf1-4e7c-a512-d840610c475e", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\",\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"completed\",\"target\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem\",\"request_id\":\"af63a55ef1ae4aac8e2d153ed3bac6db\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b2fc1c64-8425-4847-80cf-8d3483c1f814", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\",\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"completed\",\"target\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem\",\"request_id\":\"673385ba95554c19a1424b95591f9818\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:57 GMT", + "date" : "Wed, 07 Mar 2018 22:17:52 GMT", "content-length" : "2391", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -178,19 +178,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "57d1f66b-e606-4ee3-915e-e89dfa11cd1c", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"x5t\":\"4Kdg-ND1Ytsp7lC8uW4V-y1lc2M\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297388,\"exp\":1542833988,\"created\":1511297988,\"updated\":1511297988,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=TestJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"attributes\":{\"enabled\":true,\"created\":1511297976,\"updated\":1511297976}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0184e21d-4f5c-4e5d-b78b-4a671e1b2eda", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"x5t\":\"ZBIJi8orGNr44JEHUxVEapDdJXg\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520460463,\"exp\":1551997063,\"created\":1520461063,\"updated\":1520461063,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=TestJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"attributes\":{\"enabled\":true,\"created\":1520461051,\"updated\":1520461051}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:57 GMT", + "date" : "Wed, 07 Mar 2018 22:17:52 GMT", "content-length" : "3356", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -204,19 +204,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1cde1747-525b-494f-975d-c02f96dfbf24", - "Body" : "{\"value\":\"-----BEGIN PRIVATE KEY-----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\\nRtKgnKuvc7ZolAZp01DlF+0R\\n-----END PRIVATE KEY-----\\n-----BEGIN CERTIFICATE-----\\nMIIDMjCCAhqgAwIBAgIQI4MSXaydSri0oR3fKzDMDTANBgkqhkiG9w0BAQsFADAW\\nMRQwEgYDVQQDEwtUZXN0SmF2YVBlbTAeFw0xNzExMjEyMDQ5NDhaFw0xODExMjEy\\nMDU5NDhaMBYxFDASBgNVBAMTC1Rlc3RKYXZhUGVtMIIBIjANBgkqhkiG9w0BAQEF\\nAAOCAQ8AMIIBCgKCAQEAvabUQ5zo1HM8t7x6s5F3PT9/eKwoQg4tH2akRN9nJejR\\nbGHmg1iY2//8mduiJT0CELe2QUOLjGnnKS6sErSgGbNVolWRbYDftJYE/lTv+w43\\nsbUIrxoz+hxfr8Gi9DBNsLZLnx4KZEhLYmMJDclF28mqVB+Z0xlFP5TGZkPk8uOS\\nDYyjW/3j9jnG7Xgoxs4+H7OG7C/FqcrZHSddLhW99A+dYtusMRaGHi5tq1aOuOJM\\nTWL4yClXfme8aOh+Qw/UueGY3nP7aUy6etlZW1KxrIGM/zInBrmKwP5RkRlxTsaD\\nFGnGsThZztsns2HA20dX3qGOIxQ9r9ag1Xi7/Sh+0QIDAQABo3wwejAOBgNVHQ8B\\nAf8EBAMCBaAwCQYDVR0TBAIwADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUH\\nAwIwHwYDVR0jBBgwFoAUTMvJKlXlNuEVCoJxEYydVoAkBzEwHQYDVR0OBBYEFBCO\\nmrwKkzcHZwDP8I2+AcKYDIIpMA0GCSqGSIb3DQEBCwUAA4IBAQAaKqlzRQZC+6pA\\ncrEy5VD8/o4dHD3mwcqkLALzUjTz/MWSw7ncHJvDowwcJTF24jXPOjt0aZubToyc\\nB+tLB5/s109TOGj8MS3ZPAWKA98/bpymckjRuu4LatW0AsS3y1ZPdsvJf9HffpUD\\nKJuw+kyK2DcgnSOvGbfqlRSa4t18Qf4uQ/8eY9B3pj2xT16jYxjO1x/bqBnSJ9wP\\nIxqSc4pX6lK1Slj+hx1mb5hGUhK7tcT5ldnAp2QpgzbFBtCAWQUZ1K/60tvxmoy+\\nS6LkqHO1OkENAm89LtlZyqDuOKG0vpVqgqxgRZLCMMjosUOzws73Ag5lm0joXtA1\\nHiz5NOEg\\n-----END CERTIFICATE-----\\n\",\"contentType\":\"application/x-pem-file\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1511297388,\"exp\":1542833988,\"created\":1511297988,\"updated\":1511297988,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5bea23f5-e041-4178-8b66-b45f8551e0cf", + "Body" : "{\"value\":\"-----BEGIN PRIVATE KEY-----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\\nAxnSNlIhAWHR8MVIPKDSYxqo\\n-----END PRIVATE KEY-----\\n-----BEGIN CERTIFICATE-----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\\nSTDfl0zt\\n-----END CERTIFICATE-----\\n\",\"contentType\":\"application/x-pem-file\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1520460463,\"exp\":1551997063,\"created\":1520461063,\"updated\":1520461063,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\"}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:58 GMT", + "date" : "Wed, 07 Mar 2018 22:17:52 GMT", "content-length" : "2548", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -230,20 +230,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "96e53ad7-6044-4131-914f-cc492e29186f", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem\",\"deletedDate\":1511297998,\"scheduledPurgeDate\":1519073998,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"x5t\":\"4Kdg-ND1Ytsp7lC8uW4V-y1lc2M\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297388,\"exp\":1542833988,\"created\":1511297988,\"updated\":1511297988,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=TestJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"attributes\":{\"enabled\":true,\"created\":1511297976,\"updated\":1511297976}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "46bdb4c1-4ba3-45d6-a1bb-e1f27a535786", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem\",\"deletedDate\":1520461073,\"scheduledPurgeDate\":1528237073,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"x5t\":\"ZBIJi8orGNr44JEHUxVEapDdJXg\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520460463,\"exp\":1551997063,\"created\":1520461063,\"updated\":1520461063,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=TestJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"attributes\":{\"enabled\":true,\"created\":1520461051,\"updated\":1520461051}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:58 GMT", - "content-length" : "101", + "date" : "Wed, 07 Mar 2018 22:17:52 GMT", + "content-length" : "93", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -256,19 +256,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "317bd83c-f6f2-4a36-b988-84650ac1ad45", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createTestJavaPem\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c6a4de2a-db74-445b-9881-e19f0db2df74", + "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: createTestJavaPem\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:08 GMT", + "date" : "Wed, 07 Mar 2018 22:17:54 GMT", "content-length" : "101", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -282,19 +282,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "0a285a26-bde3-4a53-bbda-6850b3039fae", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "6d98643c-2577-422d-858d-71dd1ef4d915", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createTestJavaPem\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:19 GMT", + "date" : "Wed, 07 Mar 2018 22:18:04 GMT", "content-length" : "2548", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -308,45 +308,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4abec88a-5bf3-4b4e-b66d-41191f94def9", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem\",\"deletedDate\":1511297998,\"scheduledPurgeDate\":1519073998,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/bc02941e882940a08941e4f65dd7b425\",\"x5t\":\"4Kdg-ND1Ytsp7lC8uW4V-y1lc2M\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297388,\"exp\":1542833988,\"created\":1511297988,\"updated\":1511297988,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=TestJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"attributes\":{\"enabled\":true,\"created\":1511297976,\"updated\":1511297976}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:19 GMT", - "content-length" : "93", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "668297f4-8f1a-432c-aae1-32d30b329696", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: createTestJavaPem\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e4fd8003-74b1-4ee7-ada2-cefbda266e68", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem\",\"deletedDate\":1520461073,\"scheduledPurgeDate\":1528237073,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPem/12a5e63ca5dc413db39a98df9302dde7\",\"x5t\":\"ZBIJi8orGNr44JEHUxVEapDdJXg\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520460463,\"exp\":1551997063,\"created\":1520461063,\"updated\":1520461063,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=TestJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPemIssuer01\"},\"attributes\":{\"enabled\":true,\"created\":1520461051,\"updated\":1520461051}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPem/pending\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPem?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:19 GMT", + "date" : "Wed, 07 Mar 2018 22:18:04 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -358,8 +332,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "31a8d564-cdcc-4206-b691-81a5c2ebcf24", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fac1d2e9-9114-4bda-9415-6b70bfc4b683", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/createCertificatePkcs12ForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/createCertificatePkcs12ForCertificateOperationsTest.json index af353e8..3636727 100644 --- a/azure-keyvault/target/test-classes/session-records/createCertificatePkcs12ForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/createCertificatePkcs12ForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPkcs12Issuer01?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPkcs12Issuer01?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:17 GMT", + "date" : "Wed, 07 Mar 2018 22:20:09 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "fa1448cd-ed63-40a7-82d3-26b0818f94c3", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "67e5a6d8-2130-45ab-a503-a1d1e8eb5269", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPkcs12Issuer01?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPkcs12Issuer01?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:18 GMT", + "date" : "Wed, 07 Mar 2018 22:20:09 GMT", "content-length" : "376", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f1b248e8-f021-4ae9-942c-b615931345af", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPkcs12Issuer01\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account1\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1504827149,\"updated\":1511297778}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ebb9d0e4-3c68-41cf-932e-3cbb3d8af169", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPkcs12Issuer01\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account1\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1504827149,\"updated\":1520461210}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:21 GMT", + "date" : "Wed, 07 Mar 2018 22:20:10 GMT", "content-length" : "1343", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -71,22 +71,22 @@ "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", "content-type" : "application/json; charset=utf-8", - "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending?api-version=2016-10-01&request_id=ced3c09704454ed6a7d7648afad7f019", + "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending?api-version=7.0-preview&request_id=0259eb4a1d34474bb651ccb8faa527b3", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "64499093-5a9f-4591-970d-1a64d73f2f5d", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\",\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"csr\":\"MIICqTCCAZECAQAwGTEXMBUGA1UEAxMOVGVzdEphdmFQa2NzMTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCMvELe7h/9k49WqI0j0vqOakAh8iFATne+IURO+rO1zDorKeaanj7POqVfo8qHSbxWZ5/Requ5DhRaGz35rodDi42A8xBeDiSwlGxvMBuUPumI632mHyag0jsXY5epbxR6QbsXXexH9Wrh+1xoW4ZO+PsBYl4hBsoguBFwNuGhEwRfGLCpj283wJuARr4IMBsUTJdwqI4eidajoLob+ketXezsQGUFs7iSeyrStjtyh06ba1sGsVmcck1k/57+8RRv1pX0RvusBmP6IBVDDW767XveZ2oUAcO2T+UhA0QBVIxWHRVh5jOMFGi2N2a+SLh0gOxpAOzAO5ksALhE0EYvAgMBAAGgSzBJBgkqhkiG9w0BCQ4xPDA6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCQYDVR0TBAIwADANBgkqhkiG9w0BAQsFAAOCAQEAOWuLiM80XQNYAtEdRZPVeTcqWCPRXowvB20jaGfHEhxAungFMtdoOzDUS83DueDwn52zTxToYlzaePYzFKEOyitK1jfb7c7Pnv95UxWe+WNut+/whr5beJh2ady0sLx2ubxqOmsNVRAfAouLQwUn+IicMfVPMEFGSIt5sxf9n40my9on2/QyLcOOgrxRS/1lFXA/wt7Z+5WmHRg35wn1EQ4EBxxMLiKvBkGWF9wSGfnF2UYrpA3p3inQaQc95zsq4k7b5kgpIUVg2atxftg/fFhHvtJfUxn6AbgyI31NFu7rGzhB6xUa61tH+AGkpus1kkWQH2iyoWTPucx7BtYFXQ==\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ced3c09704454ed6a7d7648afad7f019\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b07c470a-38be-4250-8479-ff1e659559e0", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\",\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"0259eb4a1d34474bb651ccb8faa527b3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:21 GMT", + "date" : "Wed, 07 Mar 2018 22:20:12 GMT", "content-length" : "1343", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -100,71 +100,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "56da2fb7-7b43-491c-8ee5-20c6cdad7e7f", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\",\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ced3c09704454ed6a7d7648afad7f019\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "69802573-024b-4a9d-86c7-1341aaaf680b", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\",\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"csr\":\"MIICqTCCAZECAQAwGTEXMBUGA1UEAxMOVGVzdEphdmFQa2NzMTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDN5fBJjvGe8sYVcMmm8dleLYWqY7QBf/rDXZJiTusgIgcGnZdVMO/NZ/eRu1V4hb1toxsMvAuzrSpb7ncV3K+F56A7jF55GuVd5sy9ZRxHElljtXFN55ezCT4QGoHpSOev/9diRpmEbj91jHiiR409k6x6TVrMe+VBVolyGqmVsnteJQzUYpd4d/9Um2K7CsJjBpp6pt5dzbxjp63T5BGjfdJ862FJkrQA6JILr8YqAF/IdhU9nNxOPBaZeurxvLBpltZKGc/XJX62s487JQC9yRubM1kkEdohRkUopWqAU8S3kjX2kLr1OD0RUE4GjUEYBeBfbb1G5At+ARbfwdsnAgMBAAGgSzBJBgkqhkiG9w0BCQ4xPDA6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCQYDVR0TBAIwADANBgkqhkiG9w0BAQsFAAOCAQEAuNKfIuQf0odoOQI1GcSgDYDmv78yLcthv82Bmbmita+BYVKyJ85rUFZN9DhgyPSGPAgfhquE7tBkq53sLJA4rHqwez1upPGYHxp4Dmp1AbK6uldKsFD21fqMdpCkY5405NKesOrvLyu1/D1wiP4tHYt+tR9B3+a1AxWIeWjxB5m49KtZ7/2kgIxD1KRmr1se4YqXM4ektXAuDaAyqvkmZ22wUrpr5Brk3FdRyPR401o2fUSj+FA3v7N1ww7aYXOOjAyDzBNbXB0+d7SPnX8aOe2LEXCOI0lFbRD56kuClB40cPiBMM8biB6J1hmk8CtbPOSqr34CIv92MKjWCnD46g==\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"0259eb4a1d34474bb651ccb8faa527b3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:31 GMT", - "content-length" : "1343", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "200", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "416abae1-f3c4-45d1-bc4a-1fdde6e6948e", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\",\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ced3c09704454ed6a7d7648afad7f019\"}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:42 GMT", - "content-length" : "1343", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "200", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5bc0ea99-a069-443d-946b-58f9d7f68d0d", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\",\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"ced3c09704454ed6a7d7648afad7f019\"}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:52 GMT", + "date" : "Wed, 07 Mar 2018 22:20:21 GMT", "content-length" : "1270", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -178,19 +126,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "df229a14-542b-4fb1-8b5c-f95648040240", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\",\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"completed\",\"target\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12\",\"request_id\":\"ced3c09704454ed6a7d7648afad7f019\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c736aa92-1da2-44d8-abfd-b0455c9a8ac1", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\",\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"completed\",\"target\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12\",\"request_id\":\"0259eb4a1d34474bb651ccb8faa527b3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:52 GMT", + "date" : "Wed, 07 Mar 2018 22:20:21 GMT", "content-length" : "2418", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -204,19 +152,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "93c05129-8c02-4778-bf1f-7b7ade00caae", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"x5t\":\"KR9AsDKLMw2aSOSxF5N2E1Xk7dc\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297204,\"exp\":1542833804,\"created\":1511297805,\"updated\":1511297805,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=TestJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"attributes\":{\"enabled\":true,\"created\":1511297781,\"updated\":1511297781}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fea52a0a-04ad-4da5-9ec1-6e67e111849b", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"x5t\":\"OUibGbupAIEctCiKdsnhLFNsE4k\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520460614,\"exp\":1551997214,\"created\":1520461215,\"updated\":1520461215,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=TestJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"attributes\":{\"enabled\":true,\"created\":1520461211,\"updated\":1520461211}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:52 GMT", + "date" : "Wed, 07 Mar 2018 22:20:22 GMT", "content-length" : "3940", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -230,19 +178,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "51af25e4-e0a8-4cf9-b268-91963f2b0a14", - "Body" : "{\"value\":\"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\",\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1511297204,\"exp\":1542833804,\"created\":1511297805,\"updated\":1511297805,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "65b7140a-5fd9-4820-8b53-05efd3e0e0a4", + "Body" : "{\"value\":\"MIIKPAIBAzCCCfwGCSqGSIb3DQEHAaCCCe0EggnpMIIJ5TCCBg4GCSqGSIb3DQEHAaCCBf8EggX7MIIF9zCCBfMGCyqGSIb3DQEMCgECoIIE9jCCBPIwHAYKKoZIhvcNAQwBAzAOBAilr9LpmAaNEwICB9AEggTQiA1vjZgVCq3eXvLnDUePiPisuAnhcU/f43GwmfKIvp0xHH52BnBBK2CY3L4voHDsVoroY2Fhp4WKE49faP2p94bQZHBnkThI8/UlVW/zxNlBvARL0F0+k05YUq56UFfmSRhCxkV8dvlhc6XUE/J+s5YPqSrdz7GeRPFerPA1zOTO6vBEwowI8eb+kN254PKGAO5FMVol5vdjANjdu2nE49wq+FxXe89gQvVqBIJMxVeZAn+NGJSoc5cTokg96wKZyhqzN2j26Sos5jO2/MHA77yRSjOlWovmvIY+dF6R9E1SG0eF7hswwjwlZkUQP8gHI5g+UenrofDkoLuJRuhxqNYr7oIzuMQCbXmvRv1S6x13S4wIiyn6N5/PCtwuYWm1+Ku+qE0PkUftVWruzvB5VSZsJ9flHNPadwmkFFgHoI1klUrc4ttvKZEml4JyeqO37Vj2zEZZzpf/PthB8KC2H75KpFvQvbfvJM/+oF/PxmznMTke0ZGdFGYBDfRMg3ffcggaWlyG2GmlloGqydCrknyEJQ6QUHot+KdCyL3QizAccdad7mUnPM/3BXiVR3jAqGLNto7GJ2U048DJZI77FfhShXLT60VSrrhkPqMhurkA6nMMor4UBf/yikJknD1fj+AuogyXdP2bErIETf0MfgdbmTZfWdrcGx3F9q0CHaFlBYJRoQjBjD3G6P3b9deOATtknWGNEsJ0gcbO0WJObSlZC5bnfaOz2qppHr9Io9F41yjxU1sGxZjO+cEHzAIRHacJMJL2N25/2fKXNgA/gkwfz4hKJQZ0BTiQyLS8LYun6wFRMFSkxvNJ+Hng1mPf85V/HAzEUbAkrOtd5MhYbzsLEJPfGdoQSka0cWpiaS4mNpaGvpsLMMbS53f5Gr+HK7agMv3ik4pDHTV+Lnf9IzMoNZOOHI2Tugu95hcid0I8hgAqTuiwzxeLxjdz1IfM0GezyMTLxQ/cS6GCWfVJEP6er+ZXE4qBSuoKPxFOizKLVoz+FFDELXObWpW2KtDFCUfDA7A2Pa8aqRAaY+PEvaSsaqjkJ/f1Z1QYl2X0sM3gVZUB6GlMW4IU72dqVKwZM4Nt0bU8ufJSUxnwrhEKum/QtXR1f7r8pCC4BGh0gjWREFV/G89DUx5e6W9TSooSIHrzxz9DlkAgGqpUhf4ynINe/eIb2Xp/yLCzg/NlqdAvim5eqpY2eU1F+bl9Y+Hg5sQu608oNTwCvlBKwJL+gQT++Bk+qizPZVW0bpoBpaOu9KpWFWrBAaA9GuoVB9bp0Z/GgPTS+jhAUpZdu5AgKvPpKQZhwycHkLloEH2wWOqXuJMnJhumLnN/T8NoRG0c1H3219CTEG7RceFLLmZasubG+o0zwbuzWMAj8hNuDHMGk/pOr083XmItnWC/Dote80PO7AS/NG7fAXHq7BtDMSNOyL2RMQ1cYMofpHz5wnFxM1WbF68OGS5eYbSFUPzUbVxxoImhGrXsfsA77/REpPMR4U01x6LDnB9M/MDUaCdkulxUKKRJBaBt7HOU7SP8TLDwiLK/fuLLZYrqE99G4wevYecZUq15R91BLkVP5sSEmI0vCaie8PNq5eK4v3XNKzESlGtCiwAzpUqEGDeErRcOTIaO5UcLGt/JnqYyq6QxgekwEwYJKoZIhvcNAQkVMQYEBAEAAAAwVwYJKoZIhvcNAQkUMUoeSABmADcANQBmADYAYQAwAGIALQA2ADcAYwA5AC0ANABlAGIAOQAtADgAZgAzADgALQBhAGIANQA3ADcAZQA5AGMAZQAyADQANzB5BgkrBgEEAYI3EQExbB5qAE0AaQBjAHIAbwBzAG8AZgB0ACAARQBuAGgAYQBuAGMAZQBkACAAUgBTAEEAIABhAG4AZAAgAEEARQBTACAAQwByAHkAcAB0AG8AZwByAGEAcABoAGkAYwAgAFAAcgBvAHYAaQBkAGUAcjCCA88GCSqGSIb3DQEHBqCCA8AwggO8AgEAMIIDtQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQIdKnJ1aG8dR8CAgfQgIIDiPZQhlWevCQTT+8RStCSNHfSRMxkMoIo3o4wJRcGdLx7dSkQ0XHDSlfeztC/G0GgNJUphP9VK9XKCJyWeo0XSI9oqKMKGiQPlJb+uN5/CZogXJNDun03UDfRxPIqfWUD0ZXpamcNNfaFHU2lzg7AEHLy1sxvz5WoudxmY3ykjZBFY5nl/RS0b09BLWTVh3OBTc7w2izPRiRIq8803gE0HDvIY5zaQ9xYjOc5e7ssfsxNRKs4/yFqAumf2z7FB4HMARXZCAhIJhtKPcEEhVJ1ELK1J/hh1sQXfNN40y3NA1Q/YUerlIEbXfwoCn66fJn4mBrCgHR0brDX+fUAcEErNqpOMOdAStBdre4CitF+4Xm6kU3LM7m4zolRrlXHBKVZDWffXXz29zakcMrT8Jl8O6x4pXxiCfm5lbNAXu9U2bflZoh3bSaP52qlJML5DTAQmLFmauTE0rPqd0M+iDDYAw77nlKXC+5p4HDYNEBRLkJwC2Vc6LHIGirthpqba9j1OvZ4FXL6AOBGxZdCl4Bh2MWDOm0LqMlW0/Jun3kLxsRsuDwzvIiX8cnTvWgf/JjX09Y+9Dzlz7OxQcij02BZIS7BOl+DZ4UrK5Rzsxu7cMRnmdSzsdS4Y9sQTJrt0LmFpgqN+pRCwPehKGjVl+bNQsL8b3QS7mupIAvbM3WInDz4/Zuarmm9cgmWKL096j+4nCm6RnxhHCQRBeYbNq2ErQ9uJVw2oOmd2kKDiL5/f+zEkRFx/ijp0Q8phGfU/z6zkr039q4rNBJDOfDmvw1z/mtf2I3IyuSttfdXs1glfcfU+M2ArqXbe+gewMqZvnVlde0QQMwOyb7fn9mnMlng+FgVoZxU4TqWVniDdsj2VyeD4AMuD+lRAva9g+zvgoE6ROluJIvpK1eOzANk5TAjLgpjnlyatmhztsN+dsd0pQT/qj5JCzv2BZgopLKthcOtYw6ImlKHcFr4CU1d4ZhGhT0VuQXxy/poUKxOD7914MdMjjQxENNzwnCtm2r0anR9RUddbnjAWi6LvNAuP+Z63OVQKjHckCoapsHT+LQZndvF3xyh7DTSofvBHbIHx79Fj5hnPgr3l7z2Ywo+VDyXBEsIgBXBPBpVyQwG9S7kuxUSKGcnuMVHdwhcWc0JtKnP3BPO31RbsI/TqWOpxdQP4RNvm5BztFa4ZqkDhPvfwCQCcnShke7hahowNzAfMAcGBSsOAwIaBBSrsK2VJ2t613m2lQD67eNqt5YHEgQUXcKMgW8lHCLyxrNaxHf79lCrfgw=\",\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1520460614,\"exp\":1551997214,\"created\":1520461215,\"updated\":1520461215,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\"}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:53 GMT", + "date" : "Wed, 07 Mar 2018 22:20:22 GMT", "content-length" : "2578", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -256,19 +204,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4cdaac8c-f928-4084-b8ea-473a0eaceb6e", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12\",\"deletedDate\":1511297813,\"scheduledPurgeDate\":1519073813,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"x5t\":\"KR9AsDKLMw2aSOSxF5N2E1Xk7dc\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297204,\"exp\":1542833804,\"created\":1511297805,\"updated\":1511297805,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=TestJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"attributes\":{\"enabled\":true,\"created\":1511297781,\"updated\":1511297781}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7685455d-06fb-46a6-9afd-1cc316bd5db5", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12\",\"deletedDate\":1520461222,\"scheduledPurgeDate\":1528237222,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"x5t\":\"OUibGbupAIEctCiKdsnhLFNsE4k\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520460614,\"exp\":1551997214,\"created\":1520461215,\"updated\":1520461215,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=TestJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"attributes\":{\"enabled\":true,\"created\":1520461211,\"updated\":1520461211}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:53 GMT", + "date" : "Wed, 07 Mar 2018 22:20:22 GMT", "content-length" : "96", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -282,45 +230,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b34db6e3-3794-422d-aeef-60a4da368297", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "8f3a9ac3-98b7-4cf9-ab91-9a7a1a38661d", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: createTestJavaPkcs12\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:53 GMT", - "content-length" : "104", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4ce20530-d49d-40cd-ad36-ae8d127e788e", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createTestJavaPkcs12\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:04 GMT", + "date" : "Wed, 07 Mar 2018 22:20:22 GMT", "content-length" : "104", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -334,19 +256,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5709ca0f-c630-401a-a38f-3fd6bcba5f04", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5ed8757e-9ea7-435f-80bf-1a3c9aa181e3", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createTestJavaPkcs12\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:14 GMT", + "date" : "Wed, 07 Mar 2018 22:20:33 GMT", "content-length" : "2578", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -360,19 +282,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1e475ce6-a5eb-4175-941e-d44567e31a8a", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12\",\"deletedDate\":1511297813,\"scheduledPurgeDate\":1519073813,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/38afbb08f9b0485694079f4c72da132f\",\"x5t\":\"KR9AsDKLMw2aSOSxF5N2E1Xk7dc\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297204,\"exp\":1542833804,\"created\":1511297805,\"updated\":1511297805,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=TestJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"attributes\":{\"enabled\":true,\"created\":1511297781,\"updated\":1511297781}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "092b6c12-d6a3-4e5a-9f96-5b559f34d358", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12\",\"deletedDate\":1520461222,\"scheduledPurgeDate\":1528237222,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createTestJavaPkcs12/21781e6f28504472b39208ee62285591\",\"x5t\":\"OUibGbupAIEctCiKdsnhLFNsE4k\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520460614,\"exp\":1551997214,\"created\":1520461215,\"updated\":1520461215,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=TestJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"createCertificateJavaPkcs12Issuer01\"},\"attributes\":{\"enabled\":true,\"created\":1520461211,\"updated\":1520461211}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createTestJavaPkcs12/pending\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:14 GMT", + "date" : "Wed, 07 Mar 2018 22:20:33 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -384,36 +306,10 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5ac7e174-f4a3-49c5-96b3-095b7fc0567a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ba198f61-70ab-4f58-90a5-8e810649fb7e", "Body" : "" } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createTestJavaPkcs12?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:15 GMT", - "content-length" : "104", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5d71b7c4-6562-4ae9-81cb-940969b02617", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createTestJavaPkcs12\"}}" - } } ], "variables" : [ ] } \ No newline at end of file diff --git a/azure-keyvault/target/test-classes/session-records/createCsrForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/createCsrForCertificateOperationsTest.json index 613dcdf..bd19708 100644 --- a/azure-keyvault/target/test-classes/session-records/createCsrForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/createCsrForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:20 GMT", + "date" : "Wed, 07 Mar 2018 22:35:50 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bf72e94a-3cf7-429f-b6f7-d3ed6bfde548", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a6258245-32aa-4447-9a00-59545c0f1ab8", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:21 GMT", + "date" : "Wed, 07 Mar 2018 22:35:51 GMT", "content-length" : "1259", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -45,22 +45,22 @@ "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", "content-type" : "application/json; charset=utf-8", - "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending?api-version=2016-10-01&request_id=36ea56651b8146f0b79463663e1aa66f", + "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending?api-version=7.0-preview&request_id=79bf63aae03d4b81b52ddacb710cc1b3", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8ab4d08f-c9d3-401c-9d54-b63ddb7f2ae8", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending\",\"issuer\":{\"name\":\"Unknown\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Please Perform Merge to complete the request.\",\"request_id\":\"36ea56651b8146f0b79463663e1aa66f\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "86f6befc-41ce-426d-90eb-1d7fbea43844", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending\",\"issuer\":{\"name\":\"Unknown\"},\"csr\":\"MIICrzCCAZcCAQAwHzEdMBsGA1UEAxMUTWFudWFsRW5yb2xsbWVudEphdmEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDbCUT8i/xk58chy4Tlb2xS1iVt3tOCYnl2eNAYuMn7ZowH8t0q05mCz7hE0dfOrawmxKDuSYqQMYgeDE32fvrbDzDmH2FUUY95Z49UInDPIOxGplm4cAYuTSGEPA6M6F07qgxE4SulmriKW+Uo1ATIrtovSMpiZe5grysmTarV2lxhuK02zbKWlvWY6KrkVIaaS+XdS33XOjyVrD0NoAubNKZRoisuLOVvgeMIWQCqXvFqT04sOorR7HgENzavjzcemA6pz7loZq6CMDUp/7r5+nTLPhOBqs5wB7xI3CxR1a8oc6+2X2Ro4nNcvjA2F+oYfBf40Q2lmWkKrdYbKiGbAgMBAAGgSzBJBgkqhkiG9w0BCQ4xPDA6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCQYDVR0TBAIwADANBgkqhkiG9w0BAQsFAAOCAQEAS14na29jznt7n9Iu0P878Z7Or+jN0JGnFoIx7geN6NixYuTrUJMQ8hgwZvNxsdNicBt2DDK9n4NuW4p3crq9G2NQK/fcjwdBTZubfwpOufiZBmCfOl2cdKKrWJgbpoQSoEjJWxRh2c8JMKKsg6JlRwXsAatwrmg7O2IhNeI8f9qLOPIk7v1NSAwHQTwahIk4Y2RY8REChTA1vn7YOpDzbPnUeX8klFFdf5uSi51xvxes9GIeVhr3cwJi7gvweRX43Grotdgs9oJ8YCYvwB51wNGhsfhYbcQ1SDhig+Kq4oUUDmUIRX3jwCh4RfLcd6EuDUNqu6u+mLzd2Dc8xahH/g==\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Please Perform Merge to complete the request.\",\"request_id\":\"79bf63aae03d4b81b52ddacb710cc1b3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:22 GMT", + "date" : "Wed, 07 Mar 2018 22:35:51 GMT", "content-length" : "924", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -74,19 +74,19 @@ "content-type" : "application/pkcs10; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "63bb9df9-47a8-4ce0-9bb7-85232c7be1ef", - "Body" : "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" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "36b7d653-4623-4365-a045-3b4392053aa7", + "Body" : "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" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:22 GMT", + "date" : "Wed, 07 Mar 2018 22:35:52 GMT", "content-length" : "1205", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -100,45 +100,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c1824b76-b3e8-406e-8749-06bd6aa7562d", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava\",\"deletedDate\":1511298023,\"scheduledPurgeDate\":1519074023,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/bc1d9be13baf4c4dbc489ea2bf55d738\",\"attributes\":{\"enabled\":false,\"nbf\":1511297420,\"exp\":1542834020,\"created\":1511298021,\"updated\":1511298021,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=ManualEnrollmentJava\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298021,\"updated\":1511298021}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9bc92aa2-8d87-4fe2-b613-6088fd5eec10", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava\",\"deletedDate\":1520462152,\"scheduledPurgeDate\":1528238152,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/1ee592c676ed402485f8b955c50010b6\",\"attributes\":{\"enabled\":false,\"nbf\":1520461551,\"exp\":1551998151,\"created\":1520462151,\"updated\":1520462151,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=ManualEnrollmentJava\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520462151,\"updated\":1520462151}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:22 GMT", - "content-length" : "102", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b47593ee-95e4-414d-a52d-6b5d8f73f747", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: createManualEnrollmentJava\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:23 GMT", + "date" : "Wed, 07 Mar 2018 22:35:52 GMT", "content-length" : "110", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -152,25 +126,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "700567f3-d4cf-4242-ae5b-e9c1e7a85f69", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5cd5b444-1572-476b-9509-e3d95564bf04", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createManualEnrollmentJava\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:33 GMT", - "content-length" : "110", + "date" : "Wed, 07 Mar 2018 22:36:02 GMT", + "content-length" : "1205", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "404", + "StatusCode" : "200", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -178,20 +152,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "258d5228-e8b3-48e6-84eb-d9f0e035f04c", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createManualEnrollmentJava\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7f8f8cf2-02b7-4be8-8a49-21f51daa9713", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava\",\"deletedDate\":1520462152,\"scheduledPurgeDate\":1528238152,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/1ee592c676ed402485f8b955c50010b6\",\"attributes\":{\"enabled\":false,\"nbf\":1520461551,\"exp\":1551998151,\"created\":1520462151,\"updated\":1520462151,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=ManualEnrollmentJava\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520462151,\"updated\":1520462151}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:43 GMT", - "content-length" : "110", + "date" : "Wed, 07 Mar 2018 22:36:03 GMT", + "content-length" : "102", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -204,45 +178,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "61d70203-d5fe-4703-b5fa-e071a5f2a300", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createManualEnrollmentJava\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:54 GMT", - "content-length" : "1205", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "200", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f7d6597c-bc10-4860-80d3-b2b357a7207c", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava\",\"deletedDate\":1511298023,\"scheduledPurgeDate\":1519074023,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/bc1d9be13baf4c4dbc489ea2bf55d738\",\"attributes\":{\"enabled\":false,\"nbf\":1511297420,\"exp\":1542834020,\"created\":1511298021,\"updated\":1511298021,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=ManualEnrollmentJava\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298021,\"updated\":1511298021}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createManualEnrollmentJava/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "89136a4f-7577-4fd4-92d7-7b6b178c6e9a", + "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: createManualEnrollmentJava\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createManualEnrollmentJava?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:54 GMT", + "date" : "Wed, 07 Mar 2018 22:36:03 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -254,8 +202,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9e383abd-42ad-481a-ac9a-8925d4e71b78", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "af802ec9-60d4-4f4f-b7fe-368b9a906104", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/createSelfSignedCertificatePemForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/createSelfSignedCertificatePemForCertificateOperationsTest.json index 1cb8040..56293d1 100644 --- a/azure-keyvault/target/test-classes/session-records/createSelfSignedCertificatePemForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/createSelfSignedCertificatePemForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:33 GMT", + "date" : "Wed, 07 Mar 2018 22:51:46 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2a7d155b-5628-492b-9f31-98793c2a4f66", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "56814462-85ca-4a56-bb55-a00b2965e325", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:34 GMT", + "date" : "Wed, 07 Mar 2018 22:51:47 GMT", "content-length" : "1313", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -45,22 +45,22 @@ "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", "content-type" : "application/json; charset=utf-8", - "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending?api-version=2016-10-01&request_id=4e2c2ea2690345649e0c5b1db99b6096", + "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending?api-version=7.0-preview&request_id=6dfd5a8fd1554b39ab6e25acc90cbfd7", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "702e8609-0747-4205-9742-c324a2587240", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"4e2c2ea2690345649e0c5b1db99b6096\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f1cc24fe-ed43-48d2-bdaa-47091c5a9a73", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"6dfd5a8fd1554b39ab6e25acc90cbfd7\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:35 GMT", + "date" : "Wed, 07 Mar 2018 22:51:47 GMT", "content-length" : "1313", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -74,19 +74,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "48b03fcf-2674-4ba5-b575-a5678fb6505c", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"4e2c2ea2690345649e0c5b1db99b6096\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "478f8140-fdc5-403a-bb54-23dfa1507ac6", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"6dfd5a8fd1554b39ab6e25acc90cbfd7\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:44 GMT", + "date" : "Wed, 07 Mar 2018 22:51:57 GMT", "content-length" : "1313", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -100,19 +100,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b37ce73b-76e3-4baa-8cb0-649cac640ef9", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"4e2c2ea2690345649e0c5b1db99b6096\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0e080984-1a19-4b63-b25d-4083ebfc3499", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"MIICrDCCAZQCAQAwHDEaMBgGA1UEAxMRU2VsZlNpZ25lZEphdmFQZW0wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3smY4GTqcAD0gqdCNeUHn4zQGIJsR4hJx9I0AvUvYvLOtMfqJABOVbdrKVRx+8U2eP7eS5Tm7rbyBLbipcYS0d6Pk2C287Ns4fVUo+A0NRhgT9QNr7GVdCRmqor22fvnFgF3f1GbwCrUfoQj9ul4LgtZ/0QmiEqO0fPJnoplBvwiDQM1XMICTVxVoTD3hRBOfsFh/5kVUEuAmehmI7Wd+u7vaXGMmO66orxlX263yknxne530PJUvgRR5aV6BK/AFcUaINY19clxO9eNmc3e1atBtvmikaQ68ifUCwHYNpUGniRrpvxYcBRuNDKs3hGMHwOtXhwPVB0HhtvMdel91AgMBAAGgSzBJBgkqhkiG9w0BCQ4xPDA6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCQYDVR0TBAIwADANBgkqhkiG9w0BAQsFAAOCAQEAfKLSLeYfDqikrDnmt9v1vyCBggyGCYDbWH40pBqYh/fdFRHy8X7vN2TYEMN+x2jkHMYqzZczx7jflpV+Zv6ljJKKBCfBHgFhlX+L5FbWoG/wxn3HseKBIW1QlAurSAsMyOmPg+toRxRBeGzSyMu6kkClUaWrk5w9Z55xBcs/v+wodYFxtd/Bevjn2JEhqCaOoXGWqgpjNbGsWXlQNh2M3wRsrFY9eJSXglxPlt+gCINRv8rLXZheNO2UqDr+iDLVJMjeMHr7c136TWgYYAJEpMjRjSLbjMhqqOzxH/FkCfq1Xr6uX9pqIdDpbu4Dt+tOyEm566aJR6FbvgV/Y7EKwQ==\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"6dfd5a8fd1554b39ab6e25acc90cbfd7\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:55 GMT", + "date" : "Wed, 07 Mar 2018 22:52:07 GMT", "content-length" : "1237", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -126,19 +126,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "00da3395-e239-4a6f-94e6-49e69a25f0c8", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"completed\",\"target\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem\",\"request_id\":\"4e2c2ea2690345649e0c5b1db99b6096\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "33f1b293-913a-4f3a-8ce3-ab37cf009b96", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"completed\",\"target\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem\",\"request_id\":\"6dfd5a8fd1554b39ab6e25acc90cbfd7\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:55 GMT", + "date" : "Wed, 07 Mar 2018 22:52:08 GMT", "content-length" : "2385", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -152,19 +152,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c9eb4986-5e4c-4aa3-af1a-df256130e222", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"x5t\":\"cceEUftvY991TGksa6ZBYWr6Gg4\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297572,\"exp\":1542834172,\"created\":1511298172,\"updated\":1511298172,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298154,\"updated\":1511298154}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "372d2079-1068-4a90-9efe-e695e4035209", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"x5t\":\"4YElA9uuiGD1x6Zfiua-RIiC1uk\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520462519,\"exp\":1551999119,\"created\":1520463119,\"updated\":1520463119,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520463107,\"updated\":1520463107}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:55 GMT", + "date" : "Wed, 07 Mar 2018 22:52:08 GMT", "content-length" : "3372", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -178,19 +178,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "528dc886-8801-48e4-8090-57504fe89d4b", - "Body" : "{\"value\":\"-----BEGIN PRIVATE KEY-----\\nMIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC4UpC1UuEA6YEh\\n2O598YqJlma/B6lJsnloPQ4AIY5RPPQVTKgV5jOrK/8qyTlVsC/7G/ld4/fUGqZi\\nYGMYRSLoLhwGKqTEVcKf8rswzuzhF4KQphmrzzdlvcajymas1h5Nza+t61UpmRGJ\\nWWKTV9OJYhadBztNoSLgwi8MGJ8UWSQEeSHXalQ88ZGqUGPeCwNkMQdTEYwrAvZ2\\nQofBiY/+ki9uEk5RD9Zpp3ZggW8wvCgZjwWxnAxhhv8oftcB+O3Q+LfjvcD51W+R\\nesDopBFZe8ljSVjodBbmVgElYMozFpgod6RROG2gIs1IjMIEFpXBrpngGSq4L4Bt\\n+lKFU0qhAgMBAAECggEAFnXpME9DH8tUcv1uQmaWjSGIr6qNVG+tH6ig9h8gqoGU\\n9Kt8p/5/OVKJK3uNwwVPM3g7MNfAsVX2BHLeYGy8TjKgM5gqr8oLh1YavV3Zu6wT\\nuvCinC8J/xnbBMZ7MIB+/NgdmkHdBM6kNmpv+qhvHISZYNUqwtDp4R2Igh7V87Kc\\nEr4D41TJcq57H9/94kF0h7UFPXEJ614MF0Hccnd1AOQihWsJOdCwBunjyKSncHEn\\nv1HG1bdT8FM8lpZ6cpq2qcbZtz7/a1ko5gY+ZwZWJpsHzoGKN8HjOvgFY41pRgXx\\nLslo1JpyGTtGJGTf/B4ZoHEfTs6ZI7N8sdIqgvCVgQKBgQDj2BrOInG95Mgmb/wn\\nYFEyVPhdDS4O3E4dEqqnOpMY6xp/+HLTTmYJ79oNFqk77qxoPuUAzzRPyZIGdWRo\\nunQ6KHtRFnXh03d+BU8O7lugDnko7otizvcpUIj6/vS/D933pYxWKVxj569KsxPz\\nMJ1UClKTx3DWobDG+m1N1mfFeQKBgQDPGaUWLh8X/wxRcX5uCrrRNuvUDzEmW7jn\\n1inOTw9bj41fyEcc/qCB7RQrNfSp1JpamxSBJmxMupqbra8CeNj3/G2lb7fatwy0\\nml3yDJhquS5m9lVvbCAP25Q1iuygR9q6Y61zBRHepcAk7TV6W8YB19cgk7EdEexH\\ni9JghUasaQKBgQDVhGdaVZ0Rv5xxqPA8Vl7BNC+rw/Ytpvbs99lE7fd7mpcy5bl1\\nnDqzhTpqmZnuuDSJXKduor77JoLZ2plGK7VP6y/lRY8jGfEZABCehXEIBYg1e5bT\\n+fBVn0s/LD5f7pasxU9GT2xtk2kKL9e6Rwyo/SN1qals+gmX7ocQMqT8wQKBgAKR\\nsd+VkOMuUcvM2aGp1ml0AfbufVCZgLC3kmsxxeH/5OQUSvWMHxedhkuG7tMQhR2s\\noNN9U4icJADcZbhlIWPqKL4Npb072hd/drzi9R0V0QKL+cFZGQi5U5xabdcLLSZ0\\nyBkOLguSCNEsdCZhbxJkyBFqY58VstWsYV67KIZJAoGBAICVsUQPtj8A9ed/aWhI\\ng29afu7OlqvBsY5eaz2JlblZ8Q1SCf3KSY/OmZvSNfuXK9lLdcQLdwhxibiVQhB7\\nNoUtdIGn/+2yXuPxAnGRGmqKsyas9mIUJTKmQcKt3EjWXmmck+pXTsbaZ/txJqxg\\nyOwuqX+xjel3Yh0xfT6/ij7f\\n-----END PRIVATE KEY-----\\n-----BEGIN CERTIFICATE-----\\nMIIDPjCCAiagAwIBAgIQK+t2vxgkRU2oiiseTwNzsjANBgkqhkiG9w0BAQsFADAc\\nMRowGAYDVQQDExFTZWxmU2lnbmVkSmF2YVBlbTAeFw0xNzExMjEyMDUyNTJaFw0x\\nODExMjEyMTAyNTJaMBwxGjAYBgNVBAMTEVNlbGZTaWduZWRKYXZhUGVtMIIBIjAN\\nBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuFKQtVLhAOmBIdjuffGKiZZmvwep\\nSbJ5aD0OACGOUTz0FUyoFeYzqyv/Ksk5VbAv+xv5XeP31BqmYmBjGEUi6C4cBiqk\\nxFXCn/K7MM7s4ReCkKYZq883Zb3Go8pmrNYeTc2vretVKZkRiVlik1fTiWIWnQc7\\nTaEi4MIvDBifFFkkBHkh12pUPPGRqlBj3gsDZDEHUxGMKwL2dkKHwYmP/pIvbhJO\\nUQ/Waad2YIFvMLwoGY8FsZwMYYb/KH7XAfjt0Pi3473A+dVvkXrA6KQRWXvJY0lY\\n6HQW5lYBJWDKMxaYKHekUThtoCLNSIzCBBaVwa6Z4BkquC+AbfpShVNKoQIDAQAB\\no3wwejAOBgNVHQ8BAf8EBAMCBaAwCQYDVR0TBAIwADAdBgNVHSUEFjAUBggrBgEF\\nBQcDAQYIKwYBBQUHAwIwHwYDVR0jBBgwFoAUHiEsFHkaxaUS+7zp5f9gQTLyDbQw\\nHQYDVR0OBBYEFB4hLBR5GsWlEvu86eX/YEEy8g20MA0GCSqGSIb3DQEBCwUAA4IB\\nAQAOL4z4gvqdFtr7sNORj9Q1v5I8H7lz01+hDrlkS4UskUr8Fgj07uRxJKyKNcHp\\nX2FW8g9K4Hsyyavm20XOzJMhV9iq9RzI+b1Vj8blN4oDllAZACr/h+j/7rjO+FaS\\nPNBdnYtQBsxiFGZ/C5X2lzc+BJHIKZCURMTxeP06V8D6ggV8rjN5DcrufDVeuhnx\\nf8TXVR6TspMSxq9KqwpXK4oOV1dYJotf3J3R71z2jLTd/O+NJxJpIqBhxvYHYC+M\\nsImswBMdjrwvqrTeGBqx1vSXeYO4cCKNS6oUAMUi9Bkxav51eKDsfOHfweyNFLpe\\nhgkCg9WW1adVkLs25wMm/kCN\\n-----END CERTIFICATE-----\\n\",\"contentType\":\"application/x-pem-file\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1511297572,\"exp\":1542834172,\"created\":1511298172,\"updated\":1511298172,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "1d41b049-8b0e-472e-9f5f-bae775e514f9", + "Body" : "{\"value\":\"-----BEGIN PRIVATE KEY-----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\\nmFZuyfa9VcOX7WAmuwsjFMJo\\n-----END PRIVATE KEY-----\\n-----BEGIN CERTIFICATE-----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\\nKuqg+eRWHBu+Qqs/gc9ypk8i\\n-----END CERTIFICATE-----\\n\",\"contentType\":\"application/x-pem-file\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1520462519,\"exp\":1551999119,\"created\":1520463119,\"updated\":1520463119,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\"}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:56 GMT", + "date" : "Wed, 07 Mar 2018 22:52:08 GMT", "content-length" : "2542", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -204,19 +204,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e67936a5-b79c-4a72-8621-65071a00ee4c", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem\",\"deletedDate\":1511298176,\"scheduledPurgeDate\":1519074176,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"x5t\":\"cceEUftvY991TGksa6ZBYWr6Gg4\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297572,\"exp\":1542834172,\"created\":1511298172,\"updated\":1511298172,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298154,\"updated\":1511298154}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "485a9e17-d97b-49cf-a98f-2c80d9aca08f", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem\",\"deletedDate\":1520463129,\"scheduledPurgeDate\":1528239129,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"x5t\":\"4YElA9uuiGD1x6Zfiua-RIiC1uk\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520462519,\"exp\":1551999119,\"created\":1520463119,\"updated\":1520463119,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520463107,\"updated\":1520463107}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:56 GMT", + "date" : "Wed, 07 Mar 2018 22:52:09 GMT", "content-length" : "93", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -230,19 +230,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "67b700ac-443e-4740-911e-1715fd24179e", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "75baf217-eac9-4863-9a30-00b8f97a248c", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: SelfSignedJavaPem\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:56 GMT", + "date" : "Wed, 07 Mar 2018 22:52:09 GMT", "content-length" : "101", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -256,71 +256,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a1baf9bc-8429-4f61-8e18-650122de1be2", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0e4f833b-b87e-45cc-bb94-e6b23fa015de", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: SelfSignedJavaPem\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:03:07 GMT", - "content-length" : "101", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "7c9f620c-26e7-4e18-b954-27f11873e9dc", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: SelfSignedJavaPem\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 21:03:17 GMT", - "content-length" : "101", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ecbf2f78-3af4-4513-904f-31ed8aaa961a", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: SelfSignedJavaPem\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 21:03:27 GMT", + "date" : "Wed, 07 Mar 2018 22:52:20 GMT", "content-length" : "2542", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -334,19 +282,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1954dc17-efff-46f1-b089-ad2051971d32", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem\",\"deletedDate\":1511298176,\"scheduledPurgeDate\":1519074176,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/200798586fec45d0a4b791777d80497c\",\"x5t\":\"cceEUftvY991TGksa6ZBYWr6Gg4\",\"cer\":\"MIIDPjCCAiagAwIBAgIQK+t2vxgkRU2oiiseTwNzsjANBgkqhkiG9w0BAQsFADAcMRowGAYDVQQDExFTZWxmU2lnbmVkSmF2YVBlbTAeFw0xNzExMjEyMDUyNTJaFw0xODExMjEyMTAyNTJaMBwxGjAYBgNVBAMTEVNlbGZTaWduZWRKYXZhUGVtMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuFKQtVLhAOmBIdjuffGKiZZmvwepSbJ5aD0OACGOUTz0FUyoFeYzqyv/Ksk5VbAv+xv5XeP31BqmYmBjGEUi6C4cBiqkxFXCn/K7MM7s4ReCkKYZq883Zb3Go8pmrNYeTc2vretVKZkRiVlik1fTiWIWnQc7TaEi4MIvDBifFFkkBHkh12pUPPGRqlBj3gsDZDEHUxGMKwL2dkKHwYmP/pIvbhJOUQ/Waad2YIFvMLwoGY8FsZwMYYb/KH7XAfjt0Pi3473A+dVvkXrA6KQRWXvJY0lY6HQW5lYBJWDKMxaYKHekUThtoCLNSIzCBBaVwa6Z4BkquC+AbfpShVNKoQIDAQABo3wwejAOBgNVHQ8BAf8EBAMCBaAwCQYDVR0TBAIwADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwHwYDVR0jBBgwFoAUHiEsFHkaxaUS+7zp5f9gQTLyDbQwHQYDVR0OBBYEFB4hLBR5GsWlEvu86eX/YEEy8g20MA0GCSqGSIb3DQEBCwUAA4IBAQAOL4z4gvqdFtr7sNORj9Q1v5I8H7lz01+hDrlkS4UskUr8Fgj07uRxJKyKNcHpX2FW8g9K4Hsyyavm20XOzJMhV9iq9RzI+b1Vj8blN4oDllAZACr/h+j/7rjO+FaSPNBdnYtQBsxiFGZ/C5X2lzc+BJHIKZCURMTxeP06V8D6ggV8rjN5DcrufDVeuhnxf8TXVR6TspMSxq9KqwpXK4oOV1dYJotf3J3R71z2jLTd/O+NJxJpIqBhxvYHYC+MsImswBMdjrwvqrTeGBqx1vSXeYO4cCKNS6oUAMUi9Bkxav51eKDsfOHfweyNFLpehgkCg9WW1adVkLs25wMm/kCN\",\"attributes\":{\"enabled\":true,\"nbf\":1511297572,\"exp\":1542834172,\"created\":1511298172,\"updated\":1511298172,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298154,\"updated\":1511298154}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "11928303-6b21-4ff1-aa47-de26f651b24e", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem\",\"deletedDate\":1520463129,\"scheduledPurgeDate\":1528239129,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/SelfSignedJavaPem/733984ea37084ee49c1ddba8c3524319\",\"x5t\":\"4YElA9uuiGD1x6Zfiua-RIiC1uk\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520462519,\"exp\":1551999119,\"created\":1520463119,\"updated\":1520463119,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pem-file\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPem\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520463107,\"updated\":1520463107}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/SelfSignedJavaPem/pending\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:03:28 GMT", + "date" : "Wed, 07 Mar 2018 22:52:20 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -358,36 +306,10 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ea3ddb3b-9e18-4ce4-a9a6-83dacb328bda", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "bbb82004-7dc3-4d03-9f61-388591742b0d", "Body" : "" } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/SelfSignedJavaPem?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 21:03:28 GMT", - "content-length" : "101", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "77403c4e-25b6-4175-918e-de5e04c299e7", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: SelfSignedJavaPem\"}}" - } } ], "variables" : [ ] } \ No newline at end of file diff --git a/azure-keyvault/target/test-classes/session-records/createSelfSignedCertificatePkcs12ForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/createSelfSignedCertificatePkcs12ForCertificateOperationsTest.json index 352e729..b6eab0f 100644 --- a/azure-keyvault/target/test-classes/session-records/createSelfSignedCertificatePkcs12ForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/createSelfSignedCertificatePkcs12ForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:21 GMT", + "date" : "Wed, 07 Mar 2018 22:53:18 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ce9a37d2-645b-44a0-ab76-b834cf7d1475", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5c1612f4-df09-4351-b6ac-34ccd5ba1f04", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:23 GMT", + "date" : "Wed, 07 Mar 2018 22:53:19 GMT", "content-length" : "1326", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -45,22 +45,22 @@ "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", "content-type" : "application/json; charset=utf-8", - "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending?api-version=2016-10-01&request_id=7b4a1def2d074fdfb954bc241935c01c", + "location" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending?api-version=7.0-preview&request_id=30d34db386d044fd87310e19adb03171", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a57ba074-96eb-4fac-abad-477eeb6a08d3", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"7b4a1def2d074fdfb954bc241935c01c\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0c2c2325-8d07-4c2d-ae29-bd85472f5375", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"30d34db386d044fd87310e19adb03171\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:23 GMT", + "date" : "Wed, 07 Mar 2018 22:53:19 GMT", "content-length" : "1326", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -74,19 +74,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "dc59953c-2546-447f-a548-087b7c931f44", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"7b4a1def2d074fdfb954bc241935c01c\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fd1f47f3-c646-493b-bf80-0b654c50c2e1", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"30d34db386d044fd87310e19adb03171\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:33 GMT", + "date" : "Wed, 07 Mar 2018 22:53:29 GMT", "content-length" : "1326", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -100,19 +100,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "fed2b7d0-3a65-4c63-ac99-94d3373797ba", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"7b4a1def2d074fdfb954bc241935c01c\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e5d17ed7-dd53-47a8-a805-ec9f6c35340c", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"inProgress\",\"status_details\":\"Pending certificate created. Certificate request is in progress. This may take some time based on the issuer provider. Please check again later.\",\"request_id\":\"30d34db386d044fd87310e19adb03171\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:43 GMT", + "date" : "Wed, 07 Mar 2018 22:53:39 GMT", "content-length" : "1259", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -126,19 +126,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "321b6399-749c-4e93-9bd6-36df6ae7c574", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"MIICrzCCAZcCAQAwHzEdMBsGA1UEAxMUU2VsZlNpZ25lZEphdmFQa2NzMTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDbbRYMUTqnnJjTPIIumM/3rOUWrwysbXsgTG33lSe8q9ff2l6m56aYfl65aKgp8uOH0pXNmqXsnrFc1V8YEKMI49kmjJy+kyCXKjtiz012L5SS+mTTqXn6NdizDae1U2kQAN3Gi8qg/FLAlpjaQOdftuOljUkuIixIP1o7ME/kiW/ROlWgFCOs/fODEfi46YbFSofrK9gtPCA7Wb6uOTbyyUd1B5eJQK+LK4taPeHS3cAj6CWOQNlyVSf7cVRW3lKMAKoOYlOL7zzWJazJf13Xnp1FnSs86B8gALYb9jve+zoZICvMdyvOHAmfSOdurjklfkhdZoscPbm3BXxM6KO5AgMBAAGgSzBJBgkqhkiG9w0BCQ4xPDA6MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwCQYDVR0TBAIwADANBgkqhkiG9w0BAQsFAAOCAQEAwNKaNKuqwcaK5rIJH4FDJTFOzkLl/SYW/Op26RPCYT9DWN4kYR7fUdt0KNpAGRBL98NOiTE/NaV9miqI+lkLvyZ34WFTQb3R8yqHhyYzERc+wHgkWXLM3Y/8FbSmESQ0HS5EilEqj0W/jLyKz4ielhFjmzkMhYW5Zq4SR/8RL8mIqDrxM2qlq9V00wVhpiSHOW6ca0FFZQvXpqGSHWjj7DsNUirDfl97mYQnFFTB85KJ2ygwXhinJywqcordrJ1wDhVXGmdxH2OPlrN/PgjNiCxkuHovLyh51VE0CrFSLh5+b4IhB+PUQjxQ4el9+Q7cjJS08FbcdF+Vgx0WSWOZMg==\",\"cancellation_requested\":false,\"status\":\"completed\",\"target\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12\",\"request_id\":\"7b4a1def2d074fdfb954bc241935c01c\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0c4e9e62-f556-47ce-94ca-a80000be7ab4", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\",\"issuer\":{\"name\":\"Self\"},\"csr\":\"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\",\"cancellation_requested\":false,\"status\":\"completed\",\"target\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12\",\"request_id\":\"30d34db386d044fd87310e19adb03171\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:43 GMT", + "date" : "Wed, 07 Mar 2018 22:53:39 GMT", "content-length" : "2449", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -152,19 +152,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "612eabda-62ce-4317-b46b-8993e0e3bf5f", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"x5t\":\"WxBvZO79T-ke6O0Mm1APp_lrLyA\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297495,\"exp\":1542834095,\"created\":1511298096,\"updated\":1511298096,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298083,\"updated\":1511298083}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "499fa277-ea01-4f58-8b4a-6d2c73374688", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"x5t\":\"IKoebP20RgtgkQkdSeRqUws_yg8\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520462609,\"exp\":1551999209,\"created\":1520463209,\"updated\":1520463209,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520463199,\"updated\":1520463199}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:44 GMT", + "date" : "Wed, 07 Mar 2018 22:53:39 GMT", "content-length" : "3994", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -178,19 +178,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "174377e1-696d-47cb-a858-74e9a4436f4c", - "Body" : "{\"value\":\"MIIKVAIBAzCCChQGCSqGSIb3DQEHAaCCCgUEggoBMIIJ/TCCBhYGCSqGSIb3DQEHAaCCBgcEggYDMIIF/zCCBfsGCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj0fZ3e8RXmMQICB9AEggTYRXaKtpTw1CCPe7NGU8qYMf19eY2UQ8ARYPJzXsBHQoMRKRY3BVTFog+l2G9fXA0QGD6V69ZpG42PB34kabfNHU7qb4bvY2k3JcHJtHQRmXNQhGnZDmzjq2hE4iq2KUjcStDfl1WOaHs7GDmYqlDlpjIKb9ufRhJoF0Lj9BbnEZ4DDGNt/UytI7vGyILpcqCgvBKu/NZdS7WyqkEJ6lCcmdT+1CryxIMihVoFWcR0cXgGL1XPcrHlOsR34afWY6cobgI7Eeh8QOp8kIVXmMdU07IA9UzEK97Jv+QEwh9caMMlSYMfgDiVdmyn3uiIvhNdzvzPXTejHWC5+9IwFTHMRdsB1tuhC6XpE5YMSNSabaUFVeT6O4RWsM9DJZuY5BDaex11CX2wJjhNQDOT1MbIWn0ZAZ5wAA1I8NeeEwCZCPc8L8x6jCXhOVQ+helgn7zbxfroIw/9ugh3Sk0NhpAZI6ZNFb+Bcee6rG5i8j5C4Vzx1oUmqWrDTR0CLKlRAvb14OwcYGF/Zo6z1BMXlgKXUxTL/nt97dJaTBKnqurPB4ShPG+OK65ePaC4ueRKlJlRY1L6J2hAhqlkxUxSweB34Rd5gERiPDeK21Wt4VuipCrb5uwYUnZR0F3a/Uumv1v2+tabTopn+MqHV6tsScZpIf/ZmLtL35EZP8xzlycR+UlSh1IafvF4edtEOWTsPF/nheFXaNlGqnDn4t0YSL/EuoqwVVQD0piAtWwSDyrDwcX2f+4icaXwkeXPP907o9kk2+dvrka7FoPTgKrRcT5ohv26o9o8TX8FzKVcgaPLpiQtenm0PID4LGDMWZxrCv0apIGp7VyWok7EPseCoeSYB7iqYyRsPSLTtnOs90YTrc7ppbGe/8tmAM4IKvdVt0kSX6/dvXXw3x+mLRf9DnGeUo34pCie4lsRZCCPlhhKS71jXYVdVSrulJ3DcODlDotBiYXKOJ3u7iMtNL8R48ov1xIhReRq+J3KmBGhUPvH9tAGYoiMxHPy9CS4+4+ehOCR7JPjKoMXwVYWF/dnICSZ/SbxsxpS3ktadtKqI3VjN0DkGEzCv7gM5B/PDIkNM/rxwefqbbmTJDbypE0g39g0/TTebCnoJ17pgnWRNM+fXZrvA+QFbCLWYe98Qzdib0ChO4mlpuZwt19tU4ffkpIvt+3Uy/JZLrTHSV0PiSkRTxX8svdzlmj/b/Fu996/62FUPU1tXNW2/oG3AoJQVSsp8nbdzvu0Et/oQGz1PXtsFdChDJZ/LlHJ+lf7m4aiXn6LUMc9Tz3hz2mrbCFP0nk9a7ixuYsyD48N4QQoYdDhMoTwGhEKY11Juy6G88wghDYv13bvr2XWi04NFKGGY/pa8CUGmgRomRqOBrOGfeQjf60UelHKhsELOTsukJYeEqVuIqQvW+Y42eNchV9Nu3i6UICpwwhN9X0lz4NE0eOwSh05kd5AQJ8ELGYMj107Sp0CykjpknEYk7wX9qRTyxnpY6h+fCSanJ8P+IV4ILzfXHditbP7SqZeDeePLim45vKyMqvMJpRLWqgm5Oas0+LFX6qlwGwu4kTQkPpY1LPVPoxyIrcu6fdpqH5VuB5fTnIOLfGb01OGnlDsDgohnQvOJqig5baee69Yy8i7SSHHHuOBcKbHwNsy5DGB6TATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IADEAYQAxADQAOQBmADEAZgAtAGIAYQAzADYALQA0ADEAZQA3AC0AYQA1ADkAYQAtAGEAOQA1ADcAYgAxAGEAMwBhADMAZAA0MHkGCSsGAQQBgjcRATFsHmoATQBpAGMAcgBvAHMAbwBmAHQAIABFAG4AaABhAG4AYwBlAGQAIABSAFMAQQAgAGEAbgBkACAAQQBFAFMAIABDAHIAeQBwAHQAbwBnAHIAYQBwAGgAaQBjACAAUAByAG8AdgBpAGQAZQByMIID3wYJKoZIhvcNAQcGoIID0DCCA8wCAQAwggPFBgkqhkiG9w0BBwEwHAYKKoZIhvcNAQwBBjAOBAhi4AN0tXfZSwICB9CAggOYBpzuLEvCGYXKmuWSG5K+44AhPKgaywNrIzVDHBdLDmTW9KbS2r5H1ck4HkRzXPCgoIhix1IJvcyriRjNUpsaAxZCNEMsDuDycJlS6JGDg+cQM1KOFUKLkvmXoru/sol8j4KwyYZYueyT99s6LXCZSodLcHK8REZDH+XjIkZwTSd4lPW7kGQUXUs9uqqRVzZZd6PJ+SZtzRxV9onm5o/G1uKzYHAVcpENGTbp39GWoumCTKyPrKMRJ8qtYJ5hovlCPGKt+tbIFVaDpOF1VBoVeo6pqGmf9V7A2Evr87vHstPQ6slXaJdLJl0DbZ8n+SmZnDWCbBhjuCyvCyKBuimQq5WZ8WMAAtZasg17VDFrDTGLqGOVbre+PAzpXL9KtRfiQ+ZvE7Eq5svaCcHQCgAbfNoIufDYLxYmN9EQXkhcqNIo/nu/MVjPtCgjHFRDxkKByQH1Wq2OwwquplFhiFtNFrvkKXBYd6CTpRAsB3GBpUJP+wbbH+6ALhBFrjFMMvoO5zZQeVZ+E93F7BsBQrhm1M2RJefoY32zYk7LlL7fy7cBs3WFs9TqQqNGZg2kdUFuoKLvnjaa7/CjwSkjJt61KIn90rkZh1yoVjWLv5fsQ5De2oAaN9z93YLFh8nCm1YQZqo+SnA5PqRBsThNSYHFiuJEzrQTBYpnialjqe8aUKy5gSvk9y5EaSm0QN+XO7Jlzs1Wnc2szht8UFYaULHDhuutY2551SCC2Hsnyl6kweUnYvKa9h4453npVXY+Cu0TGNTJDdXI/VuEZEivqe9HSmldLBMFR2x2xq/B5Z1b3y0c08TrW6ZAScwpQvQlJKfJttoAFsXtldZo+W2Lhza4p0y6YxKRjmmGNPHlNPhFFH1gkvFsMhuGiLu3juJSYThp1hvEC1qBoKD4rZEnxkpufVbRzmKOqFtt/QqjfiWg/fbWeCh1Ok3O8Y0qbFIzc4YI9amhcHorDovAR1ta7nBkKdTh47lWeYxYQ6za+2H23dzR4RSt9DvXFCYeNankM+gH/YtNpF98Ydwj3jP4kXaMdx/XqJgm8VO/l1rq4Hfa6BvAP/Uw72k+xCsTYVCDuym/Zdss57t1LL7aYlr7MBEaetR1vsPDVg9TZyi1mrz1oCzVtViiWvXvGtzoIJqjTjpVrRBgm53RJsKZDfiSChqRNYwcVuMpxQdCd+KlAiIHYrQkb7ipyhgK94q6p2HxFsPDX63RbxCboqwwNzAfMAcGBSsOAwIaBBTBNPg22REb1sUXRUiW8PM7mpL2fwQU2r9anijGVfz2VciAYQssn0iH8+Q=\",\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1511297495,\"exp\":1542834095,\"created\":1511298096,\"updated\":1511298096,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "eab05d3b-871d-4a8a-96cf-7387050be83e", + "Body" : "{\"value\":\"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\",\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1520462609,\"exp\":1551999209,\"created\":1520463209,\"updated\":1520463209,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:44 GMT", + "date" : "Wed, 07 Mar 2018 22:53:39 GMT", "content-length" : "722", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -204,19 +204,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "115225b9-10fc-488f-90af-bb4b163c3ae1", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"kty\":\"RSA\",\"key_ops\":[\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"220WDFE6p5yY0zyCLpjP96zlFq8MrG17IExt95UnvKvX39pepuemmH5euWioKfLjh9KVzZql7J6xXNVfGBCjCOPZJoycvpMglyo7Ys9Ndi-Ukvpk06l5-jXYsw2ntVNpEADdxovKoPxSwJaY2kDnX7bjpY1JLiIsSD9aOzBP5Ilv0TpVoBQjrP3zgxH4uOmGxUqH6yvYLTwgO1m-rjk28slHdQeXiUCviyuLWj3h0t3AI-gljkDZclUn-3FUVt5SjACqDmJTi-881iWsyX9d156dRZ0rPOgfIAC2G_Y73vs6GSArzHcrzhwJn0jnbq45JX5IXWaLHD25twV8TOijuQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":1511297495,\"exp\":1542834095,\"created\":1511298096,\"updated\":1511298096,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"managed\":true}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "af443c56-a6e0-4e96-be70-9c90de914d20", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"kty\":\"RSA\",\"key_ops\":[\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"vjkAw0glZCcH89SvCFI0FynyoPncAR4U7DUutIO0Lbe-oFTUYoxwln42WMKm-1Odiz04wyeUDi8qi9QZ7Fy2vLPD3BYwFVFLB3uUREOmaBX2QgKj_1hzNPrnYzkWA-V0o1wZSKwQtqpCUr4vtH_OWOgflKiLehWeRCtjW0Key4fmaazBjfIBRpbZR7dSi6ScoKjAlEXSqt78Ys83vpqmk7rtx7_QJ-SPB0jlKe-ssJHgNsg3Alrbs-i7u_Ie9I058jiBJno9BFSmpDP8qxC36enPOsmuXZUPQNXblUz_c_e1i_cqPiJUdZbz6IroppoJ22PMqheM7k2gUjUBzquTrw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":1520462609,\"exp\":1551999209,\"created\":1520463209,\"updated\":1520463209,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"managed\":true}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:44 GMT", + "date" : "Wed, 07 Mar 2018 22:53:41 GMT", "content-length" : "2615", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -230,45 +230,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9acb25e1-316d-438e-b722-00e3c443d377", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12\",\"deletedDate\":1511298105,\"scheduledPurgeDate\":1519074105,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"x5t\":\"WxBvZO79T-ke6O0Mm1APp_lrLyA\",\"cer\":\"MIIDRDCCAiygAwIBAgIQLCJnENUEQ1KxTs0QAdospjANBgkqhkiG9w0BAQsFADAfMR0wGwYDVQQDExRTZWxmU2lnbmVkSmF2YVBrY3MxMjAeFw0xNzExMjEyMDUxMzVaFw0xODExMjEyMTAxMzVaMB8xHTAbBgNVBAMTFFNlbGZTaWduZWRKYXZhUGtjczEyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA220WDFE6p5yY0zyCLpjP96zlFq8MrG17IExt95UnvKvX39pepuemmH5euWioKfLjh9KVzZql7J6xXNVfGBCjCOPZJoycvpMglyo7Ys9Ndi+Ukvpk06l5+jXYsw2ntVNpEADdxovKoPxSwJaY2kDnX7bjpY1JLiIsSD9aOzBP5Ilv0TpVoBQjrP3zgxH4uOmGxUqH6yvYLTwgO1m+rjk28slHdQeXiUCviyuLWj3h0t3AI+gljkDZclUn+3FUVt5SjACqDmJTi+881iWsyX9d156dRZ0rPOgfIAC2G/Y73vs6GSArzHcrzhwJn0jnbq45JX5IXWaLHD25twV8TOijuQIDAQABo3wwejAOBgNVHQ8BAf8EBAMCBaAwCQYDVR0TBAIwADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwHwYDVR0jBBgwFoAUCavGY77RGo91EsdHxeLRKvKaCI8wHQYDVR0OBBYEFAmrxmO+0RqPdRLHR8Xi0SrymgiPMA0GCSqGSIb3DQEBCwUAA4IBAQAnGT5WUSc/KcuEihGqmOan54oRwp2BnlJCkbxy3grFmQYN6w8JsyrFiR64qI40MedcIbWm13IHiPC3O8ChyUFfBQNRr0061w6wtsyUxrHv9KgKWGCICJhoUulezpexmqVwVpTwAj8IG1FH/LPBvvVRAvyPr+TmkvHdIeq6lPsxm3X5fwahHs7DN71hklyL+hhVmgK31DnOreODMY1n2zSxjzmCM5N6WywN+QtAvJXrsJLdmbS+7RlYJ72mhP9e+00mkFCYj2C5+oJyovBLT/iiNb1bUPGkOcoVnCIMxgtyZpSdL8dpvQrPQCTikzyo4rs0iO0nckcHXukpLKcEF/7b\",\"attributes\":{\"enabled\":true,\"nbf\":1511297495,\"exp\":1542834095,\"created\":1511298096,\"updated\":1511298096,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298083,\"updated\":1511298083}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "17198dae-d811-4e9a-b035-9e7d2a3b65ba", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12\",\"deletedDate\":1520463221,\"scheduledPurgeDate\":1528239221,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"x5t\":\"IKoebP20RgtgkQkdSeRqUws_yg8\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520462609,\"exp\":1551999209,\"created\":1520463209,\"updated\":1520463209,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520463199,\"updated\":1520463199}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:45 GMT", - "content-length" : "102", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "66766c52-34af-431c-8918-7073b677420e", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: createSelfSignedJavaPkcs12\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:45 GMT", + "date" : "Wed, 07 Mar 2018 22:53:41 GMT", "content-length" : "110", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -282,25 +256,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "97037227-b2bc-4d30-9a2b-f6a88e53419a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "77358ee0-6657-42b3-9e7f-14c9586c3a93", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createSelfSignedJavaPkcs12\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:56 GMT", - "content-length" : "110", + "date" : "Wed, 07 Mar 2018 22:53:51 GMT", + "content-length" : "2615", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "404", + "StatusCode" : "200", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -308,25 +282,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "7b733729-c870-4c79-86fa-fa16f6b4e29e", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createSelfSignedJavaPkcs12\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "6f864ffb-63d5-4d61-8824-7e960b5485c8", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12\",\"deletedDate\":1520463221,\"scheduledPurgeDate\":1528239221,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/1c6588c661d24e3d848ba93319a6f6fe\",\"x5t\":\"IKoebP20RgtgkQkdSeRqUws_yg8\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1520462609,\"exp\":1551999209,\"created\":1520463209,\"updated\":1520463209,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1520463199,\"updated\":1520463199}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:06 GMT", - "content-length" : "2615", + "date" : "Wed, 07 Mar 2018 22:53:51 GMT", + "content-length" : "102", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "200", + "StatusCode" : "404", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -334,19 +308,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e8a53c8b-d14c-46ae-a7da-8fe51ca5a8c9", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12\",\"deletedDate\":1511298105,\"scheduledPurgeDate\":1519074105,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createSelfSignedJavaPkcs12/72bb2d5c79bd4adb8670db34a094076b\",\"x5t\":\"WxBvZO79T-ke6O0Mm1APp_lrLyA\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1511297495,\"exp\":1542834095,\"created\":1511298096,\"updated\":1511298096,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=SelfSignedJavaPkcs12\",\"ekus\":[\"1.3.6.1.5.5.7.3.1\",\"1.3.6.1.5.5.7.3.2\"],\"key_usage\":[\"digitalSignature\",\"keyEncipherment\"],\"validity_months\":12,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"AutoRenew\"}}],\"issuer\":{\"name\":\"Self\"},\"attributes\":{\"enabled\":true,\"created\":1511298083,\"updated\":1511298083}},\"pending\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/createSelfSignedJavaPkcs12/pending\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "71f89de7-baf5-49d5-b31f-317bedd4c8f9", + "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: createSelfSignedJavaPkcs12\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:06 GMT", + "date" : "Wed, 07 Mar 2018 22:53:51 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -358,36 +332,10 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "91e05c0a-b534-4b1f-be97-e3d1339ef687", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "6835acd2-bd73-45d9-a2f7-e6bc54c07510", "Body" : "" } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/createSelfSignedJavaPkcs12?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 21:02:06 GMT", - "content-length" : "110", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b8f5f588-8863-4ae8-b87c-8cf3abeff850", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: createSelfSignedJavaPkcs12\"}}" - } } ], "variables" : [ ] } \ No newline at end of file diff --git a/azure-keyvault/target/test-classes/session-records/crudOperationsForKeyOperationsTest.json b/azure-keyvault/target/test-classes/session-records/crudOperationsForKeyOperationsTest.json index fc9c6b5..fb9e3f3 100644 --- a/azure-keyvault/target/test-classes/session-records/crudOperationsForKeyOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/crudOperationsForKeyOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:53 GMT", + "date" : "Thu, 08 Mar 2018 20:09:29 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b90fc476-265f-4dad-ab99-9d7a5a98cc24", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7f475ed9-61e2-4a53-bb8d-7c48fab44317", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:53 GMT", + "date" : "Thu, 08 Mar 2018 20:09:30 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e73aa7e8-6f37-4c1e-9ae1-74402fe35714", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230614,\"updated\":1511230614,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "67e855cf-4a5f-40e1-8fcb-599a8a351687", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539770,\"updated\":1520539770,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:53 GMT", + "date" : "Thu, 08 Mar 2018 20:09:30 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "d8e74341-bc73-4da7-a5f0-db11be221b37", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230614,\"updated\":1511230614,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e2eb5fdf-8f79-4999-b8f3-e06f5a259db9", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539770,\"updated\":1520539770,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:54 GMT", + "date" : "Thu, 08 Mar 2018 20:09:30 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "94c489bf-0eae-4ccd-a87d-f71b84a492f6", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230614,\"updated\":1511230614,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "471ddf04-ce1d-40dc-82d6-0363eccf8e14", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539770,\"updated\":1520539770,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:54 GMT", + "date" : "Thu, 08 Mar 2018 20:09:30 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,19 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c03e648f-c5a7-4e86-89d8-512d7ca6da57", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230614,\"updated\":1511230614,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "4fb560bd-a85e-41eb-b8dd-539619371f94", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539770,\"updated\":1520539770,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:54 GMT", + "date" : "Thu, 08 Mar 2018 20:09:30 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5496566b-6826-47cf-9dd7-1fad05ea8d94", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230614,\"updated\":1511230614,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "33727007-65b0-4375-85ba-394d88d5dbef", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539770,\"updated\":1520539770,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:54 GMT", + "date" : "Thu, 08 Mar 2018 20:09:31 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -177,19 +177,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "aaf1c596-fa09-4fa4-9d57-c92e849731fc", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230614,\"updated\":1511230614,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ddec24c1-c68c-4d37-ab15-852dd43aebf4", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539770,\"updated\":1520539770,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:54 GMT", + "date" : "Thu, 08 Mar 2018 20:09:31 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -203,19 +203,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5222faf7-1762-4424-9749-a6e3b3199f83", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"exp\":2527381016,\"created\":1511230614,\"updated\":1511230615,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "698eb24f-675b-4863-bb78-956195d0f79a", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"exp\":2527358971,\"created\":1520539770,\"updated\":1520539771,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:55 GMT", + "date" : "Thu, 08 Mar 2018 20:09:31 GMT", "content-length" : "676", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -229,19 +229,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a443e7d0-f90e-417c-b703-4851b3326fec", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"sign\",\"verify\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":949457816,\"exp\":2527381016,\"created\":1511230614,\"updated\":1511230615,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "93282bb5-9116-4dfc-a810-eb6d823ad5e4", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"sign\",\"verify\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":949435772,\"exp\":2527358971,\"created\":1520539770,\"updated\":1520539772,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:55 GMT", + "date" : "Thu, 08 Mar 2018 20:09:31 GMT", "content-length" : "815", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -255,19 +255,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "fadb7fe8-0fa2-4b94-b227-ac60b2215933", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1511230615,\"scheduledPurgeDate\":1519006615,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"sign\",\"verify\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":949457816,\"exp\":2527381016,\"created\":1511230614,\"updated\":1511230615,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "29a65ff7-aade-4def-aaa6-3624b6c1c5f9", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1520539772,\"scheduledPurgeDate\":1528315772,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"sign\",\"verify\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":949435772,\"exp\":2527358971,\"created\":1520539770,\"updated\":1520539772,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:55 GMT", + "date" : "Thu, 08 Mar 2018 20:09:32 GMT", "content-length" : "75", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -281,19 +281,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "eaa66ce4-2b20-40b1-9acd-28ec85a2da82", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c2a2df8e-33dd-42eb-ad64-411b922154a6", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:06 GMT", + "date" : "Thu, 08 Mar 2018 20:09:42 GMT", "content-length" : "75", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -307,19 +307,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "65f9dcbe-70ec-4dc7-ae63-4e41f85fb50e", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "2e1d7b49-cf90-43d3-9f93-7e0ebf3a0b92", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:16 GMT", + "date" : "Thu, 08 Mar 2018 20:09:53 GMT", "content-length" : "815", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -333,19 +333,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "6282aca6-4d69-48a4-b507-e8c8dd59333e", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1511230615,\"scheduledPurgeDate\":1519006615,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/561dd40d57f74514a9e8056f555d8ff9\",\"kty\":\"RSA\",\"key_ops\":[\"sign\",\"verify\"],\"n\":\"uhoj-bYC958ov7H_PZpkZLFerYKWSXqROmn6f1uralA-W8vFJILu4RXoOaNzLvZ7j3ar_gqCJtmjNVNj0_hqUcMSb-dQVWgDSYXdUQkVNeikQURDqVOTE15vy9oUC9CULUoralIUF0w66_TawnNOvVUsdBjMaM2nt2zQyYN11Rfm_JeD4cvWogfy1n1VIvRhBd7S8BGvR3S3sSSnTuIwZEmocfBa7upJqOxMHZU5TswBkliqXCXYvwYB7aEKxxigf-Xg0k8oqdJI_YlGF7pKeJnLvdqxofVZO_lMQRq7q7F8YVIq6y2-U6iY0azX88pmqF6yNKuuy52Po_8L5zuTUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":949457816,\"exp\":2527381016,\"created\":1511230614,\"updated\":1511230615,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ab1520a7-97c9-4c8f-ba14-dea6d50653b6", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1520539772,\"scheduledPurgeDate\":1528315772,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/df32e26870ae4407922553db2b130813\",\"kty\":\"RSA\",\"key_ops\":[\"sign\",\"verify\"],\"n\":\"wq0pvT-OhseCosXJMJIY2ti6OtRw-vX-p3GAxeTISC4Mnj8uuI7xoxsbdZgObBa3HaSHXgCZFB8KBOVXFfL92vYXpYccCsMTEl4_oZYnChdrvIEQ1YjY6xL6b2c0zYbQ9c5pLipBrex8F7omtIKm77m5DKVCxtnriX2wqkeRJtjiqgGDj6U6raNrNCBn8pL62koDtWBH7qxCA5y6V4zemkHcnH-tAD-I6rqhhale_cYxoSuxp0esp9-h3Q4mE8l65TfRquIqOnk2hY-rqlMDCQypb60AkBNHET21aQ8gNtC_ZqA8h_5Stwvyu8bZ1qtWG-E0hCJ2cDhfBT2nFPJ4Nw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":949435772,\"exp\":2527358971,\"created\":1520539770,\"updated\":1520539772,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:16 GMT", + "date" : "Thu, 08 Mar 2018 20:09:53 GMT", "content-length" : "67", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -359,19 +359,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f7198d4d-6dcd-4722-8c21-c60ed535eaa6", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9326b8fd-009e-4270-a330-493e93a63be2", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Key not found: javaKey\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:16 GMT", + "date" : "Thu, 08 Mar 2018 20:09:53 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -383,8 +383,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "d07835d1-40df-441b-8821-c6961e4bb04a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "094c067b-2af4-494c-9db1-b1f9af633792", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/crudOperationsForSecretOperationsTest.json b/azure-keyvault/target/test-classes/session-records/crudOperationsForSecretOperationsTest.json index 9e3a26e..8f957f4 100644 --- a/azure-keyvault/target/test-classes/session-records/crudOperationsForSecretOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/crudOperationsForSecretOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:38 GMT", + "date" : "Thu, 08 Mar 2018 20:17:57 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e9faf249-fd07-4d41-a990-fb3dd65d424c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "6709ea71-0f7c-484c-ab7b-2745ab443695", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:38 GMT", + "date" : "Thu, 08 Mar 2018 20:17:57 GMT", "content-length" : "275", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3f9cd15e-bc5f-4699-9945-f7850c90d5e2", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87\",\"attributes\":{\"enabled\":true,\"created\":1511287119,\"updated\":1511287119,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7239c5f1-7383-44f9-92c4-2c58280e6197", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd\",\"attributes\":{\"enabled\":true,\"created\":1520540277,\"updated\":1520540277,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:38 GMT", + "date" : "Thu, 08 Mar 2018 20:17:57 GMT", "content-length" : "275", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "dfc4f13b-549c-4cb2-bb61-50b0a2f7b6d6", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87\",\"attributes\":{\"enabled\":true,\"created\":1511287119,\"updated\":1511287119,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5596eb6c-fa98-40a3-98e0-c9936a8dcbd9", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd\",\"attributes\":{\"enabled\":true,\"created\":1520540277,\"updated\":1520540277,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:38 GMT", + "date" : "Thu, 08 Mar 2018 20:17:58 GMT", "content-length" : "275", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "aa892fce-f237-40f5-917e-558d743a7121", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87\",\"attributes\":{\"enabled\":true,\"created\":1511287119,\"updated\":1511287119,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f70e46d7-6da7-4b58-bbaa-4cf78d142c30", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd\",\"attributes\":{\"enabled\":true,\"created\":1520540277,\"updated\":1520540277,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:39 GMT", + "date" : "Thu, 08 Mar 2018 20:17:58 GMT", "content-length" : "275", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,19 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e588b702-77f8-47b0-bb01-24777602d825", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87\",\"attributes\":{\"enabled\":true,\"created\":1511287119,\"updated\":1511287119,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f02a99c3-03aa-4237-a76f-2bb0786a8bef", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd\",\"attributes\":{\"enabled\":true,\"created\":1520540277,\"updated\":1520540277,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:39 GMT", + "date" : "Thu, 08 Mar 2018 20:17:58 GMT", "content-length" : "275", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5e661a64-447a-4720-9875-e60000cde679", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87\",\"attributes\":{\"enabled\":true,\"created\":1511287119,\"updated\":1511287119,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "67de804d-808f-488e-aac6-560e9c4ee444", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd\",\"attributes\":{\"enabled\":true,\"created\":1520540277,\"updated\":1520540277,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:39 GMT", + "date" : "Thu, 08 Mar 2018 20:17:58 GMT", "content-length" : "290", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -177,19 +177,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1efb5d89-3766-4c82-917d-1f944328e91d", - "Body" : "{\"contentType\":\"application/html\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87\",\"attributes\":{\"enabled\":true,\"exp\":2527351121,\"created\":1511287119,\"updated\":1511287120,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d74ec00b-b07d-476a-a4c2-3ff2faf5106f", + "Body" : "{\"contentType\":\"application/html\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd\",\"attributes\":{\"enabled\":true,\"exp\":2527359478,\"created\":1520540277,\"updated\":1520540278,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:39 GMT", + "date" : "Thu, 08 Mar 2018 20:17:58 GMT", "content-length" : "307", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -203,19 +203,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "0bae7715-21a0-4f7b-8c66-86bc851abf69", - "Body" : "{\"contentType\":\"application/html\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87\",\"attributes\":{\"enabled\":true,\"nbf\":949427921,\"exp\":2527351121,\"created\":1511287119,\"updated\":1511287120,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"rex\":\"woof\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "aa993a21-fe29-455d-9cc7-bc0875881c03", + "Body" : "{\"contentType\":\"application/html\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd\",\"attributes\":{\"enabled\":true,\"nbf\":949436278,\"exp\":2527359478,\"created\":1520540277,\"updated\":1520540279,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"rex\":\"woof\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:40 GMT", + "date" : "Thu, 08 Mar 2018 20:17:59 GMT", "content-length" : "452", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -229,19 +229,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e5161238-3c7e-4bea-bd32-beac4492ec7c", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret\",\"deletedDate\":1511287120,\"scheduledPurgeDate\":1519063120,\"contentType\":\"application/html\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87\",\"attributes\":{\"enabled\":true,\"nbf\":949427921,\"exp\":2527351121,\"created\":1511287119,\"updated\":1511287120,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"rex\":\"woof\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "cbbe409e-b798-4d31-ae41-c09b20e3a9c5", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret\",\"deletedDate\":1520540279,\"scheduledPurgeDate\":1528316279,\"contentType\":\"application/html\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd\",\"attributes\":{\"enabled\":true,\"nbf\":949436278,\"exp\":2527359478,\"created\":1520540277,\"updated\":1520540279,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"rex\":\"woof\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:40 GMT", + "date" : "Thu, 08 Mar 2018 20:17:59 GMT", "content-length" : "84", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -255,71 +255,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "30ca062d-1868-4ddc-b284-f694c221b145", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c801888e-a91c-4e10-a37d-bc1a7b649a68", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: crudSecret\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:50 GMT", - "content-length" : "84", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "91c01591-eb5f-4a38-b6fd-561bea60e181", - "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: crudSecret\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:01 GMT", - "content-length" : "84", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "6c6ccaeb-777b-4fe0-a85b-9006e96ae37a", - "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: crudSecret\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:11 GMT", + "date" : "Thu, 08 Mar 2018 20:18:09 GMT", "content-length" : "452", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -333,19 +281,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b09818e3-7cb3-4253-a893-ed757be96f81", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret\",\"deletedDate\":1511287120,\"scheduledPurgeDate\":1519063120,\"contentType\":\"application/html\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/220e95ec0cd844499d276f64035dce87\",\"attributes\":{\"enabled\":true,\"nbf\":949427921,\"exp\":2527351121,\"created\":1511287119,\"updated\":1511287120,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"rex\":\"woof\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "93957226-6b81-46cb-afbd-83964a94415e", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret\",\"deletedDate\":1520540279,\"scheduledPurgeDate\":1528316279,\"contentType\":\"application/html\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/f2a2ab29780f4b79a1cd7553d6493acd\",\"attributes\":{\"enabled\":true,\"nbf\":949436278,\"exp\":2527359478,\"created\":1520540277,\"updated\":1520540279,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"rex\":\"woof\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/crudSecret/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:12 GMT", + "date" : "Thu, 08 Mar 2018 20:18:09 GMT", "content-length" : "76", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -359,19 +307,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f2cbe854-9b21-4706-ad6b-e56ca65b81dc", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "06454a65-b4a4-4a2f-a178-6693967ed89b", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Secret not found: crudSecret\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/crudSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:12 GMT", + "date" : "Thu, 08 Mar 2018 20:18:10 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -383,8 +331,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "d14a4983-dfee-409b-99a3-6c863117b606", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d9f2ee3c-5950-4c73-a713-ff557a35db30", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/disabledSecretGetForSecretOperationsTest.json b/azure-keyvault/target/test-classes/session-records/disabledSecretGetForSecretOperationsTest.json index d5298e3..3dc5778 100644 --- a/azure-keyvault/target/test-classes/session-records/disabledSecretGetForSecretOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/disabledSecretGetForSecretOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:13 GMT", + "date" : "Thu, 08 Mar 2018 20:18:11 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4c1816d6-c2ab-4094-99b7-0869385bb7e4", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "761d48df-ee97-44cd-9ff5-56998e3d7acc", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:13 GMT", + "date" : "Thu, 08 Mar 2018 20:18:11 GMT", "content-length" : "280", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "13617bf0-c387-43e9-826f-23ece9092854", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret/8334d21d2ab846b3bd50076cc77e1f97\",\"attributes\":{\"enabled\":false,\"created\":1511287154,\"updated\":1511287154,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "3bfc735c-8072-4c3b-82f2-dc3f57a26312", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret/367b7ed4894a4f51b8cc8631a187ab8e\",\"attributes\":{\"enabled\":false,\"created\":1520540292,\"updated\":1520540292,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret/8334d21d2ab846b3bd50076cc77e1f97?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret/367b7ed4894a4f51b8cc8631a187ab8e?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:14 GMT", + "date" : "Thu, 08 Mar 2018 20:18:11 GMT", "content-length" : "132", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "02bbd848-c6be-40f6-97e5-a0957dd1138f", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "177b2a1b-974b-4a85-9456-f63e7dd6c702", "Body" : "{\"error\":{\"code\":\"Forbidden\",\"message\":\"Operation get is not allowed on a disabled secret.\",\"innererror\":{\"code\":\"SecretDisabled\"}}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:14 GMT", + "date" : "Thu, 08 Mar 2018 20:18:12 GMT", "content-length" : "373", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8cf17a47-aced-466e-96d7-315e6fbf2411", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/disabledsecret\",\"deletedDate\":1511287155,\"scheduledPurgeDate\":1519063155,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret/8334d21d2ab846b3bd50076cc77e1f97\",\"attributes\":{\"enabled\":false,\"created\":1511287154,\"updated\":1511287154,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a387b1e8-e50c-46f7-814a-1feca67ddc75", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/disabledsecret\",\"deletedDate\":1520540292,\"scheduledPurgeDate\":1528316292,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/disabledsecret/367b7ed4894a4f51b8cc8631a187ab8e\",\"attributes\":{\"enabled\":false,\"created\":1520540292,\"updated\":1520540292,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/disabledsecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/disabledsecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:55 GMT", + "date" : "Thu, 08 Mar 2018 20:18:53 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -123,8 +123,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bfff7534-5ff2-436b-a8f5-4b3a168427d2", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d5cbe73f-b02a-4ccd-b993-e281abf0d04d", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/encryptDecryptOperationsForKeyOperationsTest.json b/azure-keyvault/target/test-classes/session-records/encryptDecryptOperationsForKeyOperationsTest.json index 6ec9461..97fac51 100644 --- a/azure-keyvault/target/test-classes/session-records/encryptDecryptOperationsForKeyOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/encryptDecryptOperationsForKeyOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:07 GMT", + "date" : "Thu, 08 Mar 2018 20:03:28 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2172a6a7-b6cb-4483-b052-ca4ab808d0e0", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e1d6bcb4-b35e-4bde-a7af-13f14bb075a6", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:08 GMT", + "date" : "Thu, 08 Mar 2018 20:03:28 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b65a9c14-a914-47bb-95fd-733d22b4d3d0", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/4293735168034fcc99591effa93b082b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230208,\"updated\":1511230208,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b8bf854d-6c7c-4a64-9331-c04b3060ff53", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/ca70659367d84f4d8f62c4281869a54b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539409,\"updated\":1520539409,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//encrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//encrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:08 GMT", + "date" : "Thu, 08 Mar 2018 20:03:29 GMT", "content-length" : "455", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "dacd550a-0503-4c2b-a55a-dfdb1bd9437c", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/4293735168034fcc99591effa93b082b\",\"value\":\"BHFz5Fn17oLqEaBPWM2FiUa2ESl1xEpKBzsEhAPOob3Q1lCRW50KB4VLu-njY4oE3zdP_K_4CHoT-Bsn2wr4_Z9XOEWhZfD5THWDu6fGN0L4AqWA-7KZR21McVyFbgF2uYQDKludiC5x9qtFzPH54BOwrPtwZOWjDW-ONp4q6d3lrcRlpPURDMqdFv6Y7U7cvMTo_H3mj7mr8o0W-65WTlqKx7b9E8s-SoXkMDW10Cma-JpeJcz8aNJt_YtmSVlZ-m6h-e96a8tqoLzc6qG-8RqJZtT3o7Ljye980YRIU6ApkvqXCE-U6M_qNC-5En002Cfi_rC4S48_bNEcMYhZ8g\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "910bca76-68f2-4b71-8902-0a415ec3a7df", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/ca70659367d84f4d8f62c4281869a54b\",\"value\":\"xIonIVHUEETNSRds2NmYbGovGfJ1JImkkEGCyBFWTyBR7HT98Nulpv3g-ffRqfL2z2WCWYrsI2Akr4-nLyehZanKjykxYoQIecElSAmu213pSvjfBr98Gb9YnM4whFD4UHBroJv2hIohfy7JDq6dUi-NyK8aUpEcw7AaMGwit2ER3zB4rCF2dpg51K0scLLB_VIB2KTNn80XyYpnMAYTPF8ZSnEY5xciujEvD77Ns-Ke0wb2ZcPv9nyu2chcrXqvsuCcaGJ1-RSDHp6jvy3KIdsGh52KmPuRwnEVMLG9XjvklV3v2iCWkJrzY31ClCq3_RMLqnFSvwkAULkB3d3XlQ\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//decrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//decrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:08 GMT", + "date" : "Thu, 08 Mar 2018 20:03:29 GMT", "content-length" : "247", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "7474030e-f963-4972-a6dc-0c4a693be53b", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/4293735168034fcc99591effa93b082b\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c7cd050c-7e6e-4be6-8c34-ac492c7d1002", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/ca70659367d84f4d8f62c4281869a54b\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/4293735168034fcc99591effa93b082b/encrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/ca70659367d84f4d8f62c4281869a54b/encrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:08 GMT", + "date" : "Thu, 08 Mar 2018 20:03:29 GMT", "content-length" : "455", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,19 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c8e95226-005b-4f84-8f0f-1f2757fa8303", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/4293735168034fcc99591effa93b082b\",\"value\":\"G84fymYH4mhkARstZgEJBRACI8-C-ymIO4IQ_ojgjZBvlQHrM9PCVTNA-AJ-fZbaHxe25ce4bWEgY84jar0WmCD4NSeB3DmRNCUq9g1nSZumylb6QyFezHszsoTT07lGDF1I9IGYO13hKgOrOmFCS8aWma9JJUUAuLEVuBlc5jukEET1qzaDCUgXOP3R-KiDOn35vfVLve59mSSg5Wwmai9KOn0imu3jsCmCHG9z4BcfskjSHxgk3NxhsxE9SBG8jBspvgijSPCrMmT3BBytu0XwgsH5fGuOoY_Uogm9nz8I7Ai-gBwohOmcStjK1KdsO0k5P7nhfGxGJon5qdYLdw\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "693a7ad8-60ba-4650-927e-eaa6e31c87f4", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/ca70659367d84f4d8f62c4281869a54b\",\"value\":\"OxYv-YsosXl5iOQ_qE1Zn-JKwEFAPBDR7gDhFusLmCDYdJmgQ0Ziik5A3YJIE9Dkm5LU2WdpZHf4ANFuKkyxMcUoAlK_9OVzq8wchwRdlVkbRFWjkypbslmbCYclzQevaoqcd8P8bP7kQa7vVMJLZMfcr4r0Kj2SFUoMGjqtpj53eT2jug04UHRyxZm5lTPEaf9r1tt1hspP7iun_kfagyBCToD0xdOLF3uYQRgQGJXdz4q5gzqlJt7OiynEcy4HFf7CDsGzJBZKXHJo7IUTjgKH5U70d9Yv8tLfhunlps0CjGvyurvVbq6LW1-pcFxlVSw_NdAMTiX2x5pjmf-MZw\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/4293735168034fcc99591effa93b082b/decrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/ca70659367d84f4d8f62c4281869a54b/decrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:09 GMT", + "date" : "Thu, 08 Mar 2018 20:03:29 GMT", "content-length" : "247", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,9 +151,9 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "64b92561-e6c4-4074-86c4-ac37d57755bc", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/4293735168034fcc99591effa93b082b\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f9cc3ba4-21ee-4919-a4b1-27f8b5621e45", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/ca70659367d84f4d8f62c4281869a54b\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" } } ], "variables" : [ ] diff --git a/azure-keyvault/target/test-classes/session-records/importCertificatePkcs12ForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/importCertificatePkcs12ForCertificateOperationsTest.json index 4aa42ac..d910e78 100644 --- a/azure-keyvault/target/test-classes/session-records/importCertificatePkcs12ForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/importCertificatePkcs12ForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:53 GMT", + "date" : "Wed, 07 Mar 2018 22:54:25 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "66c52e89-9a55-4b6a-926b-d9e38370336a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "30982546-8bc4-4d72-8632-e539bf768db3", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:54 GMT", + "date" : "Wed, 07 Mar 2018 22:54:27 GMT", "content-length" : "1856", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4e6ee172-149b-4459-ab62-d653c658f426", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297754,\"updated\":1511297754,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297754,\"updated\":1511297754}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fd083d6c-a51e-4dc3-bead-9f1720d475f2", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520463267,\"updated\":1520463267,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520463267,\"updated\":1520463267}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:54 GMT", + "date" : "Wed, 07 Mar 2018 22:54:27 GMT", "content-length" : "3570", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "338664f9-6e10-4aac-8b56-68c831a9cdb2", - "Body" : "{\"value\":\"MIIJKAIBAzCCCOgGCSqGSIb3DQEHAaCCCNkEggjVMIII0TCCBfoGCSqGSIb3DQEHAaCCBesEggXnMIIF4zCCBd8GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAgNAH0j6zii5gICB9AEggTY2p9oItVDqSqFCLy9rY7XD1asRJi8IKYOI6PWuX7MTF1cDj8dWFCl+4hZ5oMAHeMP9vjDtoITxZRLyVk5x05JgLZ7XBWhGymY9WeZPQQddW4yvQssCv4Ps8rBsQjLQ/xuhKgJHYYSpA5goY8eLDLScpGM0eNfjM61Vm4hJDP6LDbRRpNBvsK3ut5pKzvOj4Jsuos/4OEGneiN3ho+aBGlFHXGStYR4jrfFKX53voSnEYz7q/3erFwX+L+bY+0n1RZ+BalCx11QZvz2IGuvQQMSc5Fif+9mRBGIhQiiEEH3R7cirlLaCOPnMTX4odpY/cyv3cVi9CMVGIK0xNuBTs8hrmKfJRit2BHaA4KXiCqHAXQauE7oz23S9DEaeRLLNXhF+43TaosWjmbHBDy51A9NSX1pKp0uDv5BvbQlpEZ1AXkpysGyvUZA8jpFWWnyGAj21PanvS2Bk5XSHwWVTF7LKQVCInUmhJeEObipRb6wUob+ByOskmdEMoITP22yP2sSAKLX0yGYOq9bxP4B3AmYE9jbaI436TdGD/NJEahQlKhjsoKWnuoWKopgTV1cIJTTvsaE7/EMwJ/8NHJZSng27F+gJSbt4KsPKZZ5nrX51P46v+rzUd2KksYHgVrRyvZSNHB1mS09m2jtdRkc4oYPNJMQJutuxF4JwwGml6ITYts71Js40M/RcgRN+rKdO9k3vu4LIg4wPM//E67HVG8klLo+fJkJ5Jkb02f9mJDI6BZW69zW2F/MOC1bnrrpW3CBPV1WmQOg7ZKXDUZufJ5soaAQhFsERbTA6DDqlyYsnTuFYNndamlA25HJqokiBcYSuquGuG1rNQb7RJMLi0Wl4/KSSJL3Mb88LbIDU7ipkzwaVvIzy+qgPU6qbMg7vaAtqxlet0gDnAHVmYJeL36Mkke468DV/D9lb/01Z3o0mxj280VN92mXMZSButDwdUNtf+WO2fVlgKXFDflCBab/MrsPnIaO0YEw6+HZYOBbtAPiscnUZjAi1Z4dNi5XZi3lEFcecqCRGyrF+TPBA79PmG4PZHQMgeQM+HIJ1LbgfGpAGcSf6HBeidk9UG9HQu9GiZWb4WLVbCZSq1rAse+0XSwT7j5AL7JS7q45gocb8PjLg8t6RemS50ZxRqmIUBF8HtefnV+B++gWd1tlmTpQox3dtX++NEwmFL7SGbuQY3RzhxJBLTe80+H1Pp0ZuujYHxuLx7uYZZ4lFXjmAYb+HpvVZIYG+ubppu+9lFuCLsQrlzCpsYVZl7YAhnD8SLuKXLPCIJTAVyLdP+dMxvweQ3CdA84z0DW+U8faAdL4DXnPf10w6OF3ahycJNigTWqkqhs67e8HMoWaRvsYdfqnHT5sa/Hk1kQzLik6o51guhhOcG7G0HVoZI/8myIwKWejM1FyF/NeH8YKd34KglTTkIRMlnkEW+KCu4Gl1WeG3zBaaOZmTcXfT86n4KtbX/PIEvNlhLPlLHNTB5aL7xVGS8D+heAOdK3NdmboExqBEpYUPtYo5uznAPHxx+nCngCFAR5ShBKacJa6rJJcz2p0gWxxlhQWTKpdHeV7XtMQ/SjxzeQaxlAgzdOcyCF0Hz0JJ1G4iGyC0qgPXzUU/j/QF/ziHycpVva8J3zVZCfu8MGmoMcuBAbODGBzTATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECJDnuweikraqAgIH0ICCAojW0R8eWcW52ChRWumF2lCaqi7Ko8n3VV7WPs0EY5fWEEXF9U1iGfWXrlJ+XC6Q6OEZXy8ZzemltwiIbE6BDIPZ3q8SzQ9082kpB1/NbAr0OeivkqBnTAO7cem4ylwE9q6qJliucrIVr0DrN7JUSSeJnBUU/Pmn6GeQEdTrjCWhw9YazoFAFsQJuT5GuUbphgQgO/kW090/LVGDaDGdtXROJ3d3jMxuK/gI3QxrMvnDp6QxCFtmvlFSgQjLJ9zyqeTjd4zKJYT/G2BEC97ljJ1a8hln4GHme9nsAMjniloFgN2RXZ7haLAtlmbiwvhTwfvv0uOUaZQtYBlDRZ5QbRGir9QzlchsMnKxJizS1ST5eIaDCIKINNBifOqVC3ToniZaO0yG6s0bNQSXg3XwmupO9E2YRUPKz+wz3B/kETPels+p5A7GtIBztVRZWqggWZ60YU07NdUPbUQUl+x524lTUnm1ej+b/O1gDfAgW5oAwYob3YaitlrmR97HEPg606OhNpyVhA9UIKMWkplhBIndBja2aEKGNzp2f7hkiq3/cbokrfjCqJZYwlhbYE2gkgnVa4RQjU9VhaNvG4IGnuIDD+ba+WM8oY1ltWBSNB5g21fVC1MXRc5ihsSa/FqeO0XcQbcLpPToElDMjtT7HAWQbUmP+qFJFeQLp6iKIOFdn7dl7iu7EgLz4fi9qlJxOfAjpc9F7w2ciUdb0YAA8nxDE1RYgzY6bAqfykNasj844nxrlwx5U80MvYks4fF73ve0Yg+7qEyqYukyPJ/tp0PdYCDklyE8wM6gysVoEtIuHOUx+QGRZY5adnBMte/nK+WesYrLevnzHkef23K/+eXMQfqM1LpcW60wNzAfMAcGBSsOAwIaBBRVpM3oLB0vL3zfPAl224ArrJ/KKQQUW04DUI8XTsfbwbHNEk5bE0zKOws=\",\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297754,\"updated\":1511297754,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a648ade9-1400-435e-878f-b7da8b0adf8e", + "Body" : "{\"value\":\"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\",\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520463267,\"updated\":1520463267,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\"}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:55 GMT", + "date" : "Wed, 07 Mar 2018 22:54:28 GMT", "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,45 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ee3538fb-7949-4f3a-83bd-3f124def83ea", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs\",\"deletedDate\":1511297755,\"scheduledPurgeDate\":1519073755,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297754,\"updated\":1511297754,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297754,\"updated\":1511297754}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "93a9620e-b22f-4018-aed9-7fdeb7fce58c", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs\",\"deletedDate\":1520463268,\"scheduledPurgeDate\":1528239268,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520463267,\"updated\":1520463267,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520463267,\"updated\":1520463267}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:55 GMT", - "content-length" : "90", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "20d279cc-86df-48b4-90ef-69779de189f7", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: importCertPkcs\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:55 GMT", + "date" : "Wed, 07 Mar 2018 22:54:28 GMT", "content-length" : "98", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,25 +125,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "377d5b37-5cbd-4bfb-98c3-97937bfff8bc", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "58b2568f-ee55-454d-91e0-82a4b61054e6", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: importCertPkcs\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:06 GMT", - "content-length" : "98", + "date" : "Wed, 07 Mar 2018 22:54:38 GMT", + "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "404", + "StatusCode" : "200", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -177,25 +151,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "64f41ec5-3ca9-444e-963b-472167663082", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: importCertPkcs\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f702d952-abd2-4375-a9fe-ee678b874f10", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs\",\"deletedDate\":1520463268,\"scheduledPurgeDate\":1528239268,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/d071ce1af07f487bb5fda2c12b1d5c8e\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520463267,\"updated\":1520463267,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520463267,\"updated\":1520463267}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:16 GMT", - "content-length" : "2010", + "date" : "Wed, 07 Mar 2018 22:54:38 GMT", + "content-length" : "90", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "200", + "StatusCode" : "404", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -203,19 +177,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "6e8d6395-f430-4ea9-bc23-7b4104d5f189", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs\",\"deletedDate\":1511297755,\"scheduledPurgeDate\":1519073755,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/importCertPkcs/7c9160a30fb548acabf4a7cc8fb93119\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297754,\"updated\":1511297754,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/importCertPkcs/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297754,\"updated\":1511297754}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0d37c65d-a597-4063-b9f7-9fe58dc20d12", + "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Certificate not found: importCertPkcs\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:16 GMT", + "date" : "Wed, 07 Mar 2018 22:54:39 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -227,36 +201,10 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "73dbd1e2-dbae-40a3-a690-c6588346b1d9", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "1a9a81a4-ab2e-41c4-8960-01350b5af78b", "Body" : "" } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/importCertPkcs?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:56:17 GMT", - "content-length" : "98", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b2d9194f-9bd2-40cf-a7b7-e8a56ebb1f89", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: importCertPkcs\"}}" - } } ], "variables" : [ ] } \ No newline at end of file diff --git a/azure-keyvault/target/test-classes/session-records/importKeyOperationForKeyOperationsTest.json b/azure-keyvault/target/test-classes/session-records/importKeyOperationForKeyOperationsTest.json index a4453f0..ede63a3 100644 --- a/azure-keyvault/target/test-classes/session-records/importKeyOperationForKeyOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/importKeyOperationForKeyOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:50 GMT", + "date" : "Thu, 08 Mar 2018 20:09:27 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "18be9922-5635-4670-8999-c6c4b2fdde66", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "730efcf5-e970-434d-ab8c-dafa4b6eb95f", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:51 GMT", + "date" : "Thu, 08 Mar 2018 20:09:27 GMT", "content-length" : "680", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c2d59e2a-6ab0-4952-a916-3258ebeed520", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b09d14c6ff6841bc8454f15c399ab138\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":948421012,\"exp\":2526344212,\"created\":1511230611,\"updated\":1511230611,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "03e97be0-30f9-49dc-9c39-2225d776e082", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/aab66593a3f540a4b8bf24d9d8371274\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":947362167,\"exp\":2525285367,\"created\":1520539767,\"updated\":1520539767,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b09d14c6ff6841bc8454f15c399ab138/encrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/aab66593a3f540a4b8bf24d9d8371274/encrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:51 GMT", + "date" : "Thu, 08 Mar 2018 20:09:27 GMT", "content-length" : "455", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bdd552c6-48ed-4f78-a40d-ae84bce3dc7b", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b09d14c6ff6841bc8454f15c399ab138\",\"value\":\"eGjmhCIkvcshhoW6PKyCc56sQnfRx38REUYjRP63egoXCxF4M31-IJNtOPo_9RfzJaRhH_k8-USmGN8uzjbm_lIqNqMcMLlQm3zsfVftT2EiXbWleC3pcCEeFx0VXLo5L45O7QXjBmv0JN0PcfFgAutH8IGGDnytkw_2NdqiJSy4_ZZJVFs0uN1ZuCE4Isb0gQLtTYTjhGgn_hrk2B5HTjG3Rk8qYB14ElgVZsJwaonA1fODo0twcKPBNZispaSO8yABi0x9uFZ_LWGnAzMpU_F-xAPS1C5Bon6gH0h5wvyAXf7iZPBLI_SCGs0nJ6YrPzts5Aq5K7oI9YfUNTzbQg\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "15e83633-a896-4972-9ec5-791c1dfa2f74", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/aab66593a3f540a4b8bf24d9d8371274\",\"value\":\"FBBgJ3luJYUY9xhNvB9xvux_4BITDXXbkERaDS18C2CnAW2dIJu2vu5lAuc2vq0c6_Q-qgldKQaXW0rjET0il4mW0aIzQX8YU8zy5mUuo3U0ed6V5QGlQB3WmDf7oBS2g0MZhKsZj6RlH-iBWz5_-QY25AgDItbpNks5JvAtQ8SStzbAfJuH1sLvglTug8As5RzPDOBQKkY2HLOZU9JdfNbWOet7p8Pi4de0D-Jndn7T3uJuIAaOxOfbFiAhpRMx0lJpdQQG7BRIpO92Dyv5OVPSF6oqZCGDyKFLUL24Do3prknXd9SgQihGFL-b0V7q_NeP6wlcI3cOvN4u-oSP9A\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b09d14c6ff6841bc8454f15c399ab138/decrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/aab66593a3f540a4b8bf24d9d8371274/decrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:51 GMT", + "date" : "Thu, 08 Mar 2018 20:09:27 GMT", "content-length" : "247", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c23606c6-2345-46c9-82da-88199b605519", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b09d14c6ff6841bc8454f15c399ab138\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a975b345-a998-4375-8c42-cb8c04419e87", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/aab66593a3f540a4b8bf24d9d8371274\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:52 GMT", + "date" : "Thu, 08 Mar 2018 20:09:28 GMT", "content-length" : "684", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,19 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "46e5e0f9-9c5c-4284-82dd-be431e609699", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/71137496c6b14fa9a253eb5b2b1cc8c2\",\"kty\":\"RSA-HSM\",\"key_ops\":[\"encrypt\",\"decrypt\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":948421013,\"exp\":2526344213,\"created\":1511230612,\"updated\":1511230612,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "1167e637-9a65-4830-b0e8-8badcdfcd12b", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/a6d5c37812c244419b08c848368e5d8e\",\"kty\":\"RSA-HSM\",\"key_ops\":[\"encrypt\",\"decrypt\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":947362168,\"exp\":2525285368,\"created\":1520539768,\"updated\":1520539768,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/71137496c6b14fa9a253eb5b2b1cc8c2/encrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/a6d5c37812c244419b08c848368e5d8e/encrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:52 GMT", + "date" : "Thu, 08 Mar 2018 20:09:29 GMT", "content-length" : "455", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "11340d92-1e71-4083-ab2e-49f2d2586fc6", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/71137496c6b14fa9a253eb5b2b1cc8c2\",\"value\":\"HO7pwfERBth0b3zkrbG1_KUueItAU1ZYN0ZjKaTcPdHp4EuVoxRghFbZShu0QZOBQdZoF8afW_kUoWV6kvhvGJturN3z-goD4YbOoKXoTLEyBcsrJu7oPrsGVnt0q_X-7XJeESNZUMl-giLqxhN8WRV4EGAOc2i_5M0KvaAEaDGPGoqDmZs0RclJj-CI61symHESuekBDBDd_UV4ROcapCXDpgLRwriHKwvncUD1RgC-ObvV42c6dr1Vb9lMcHEGDqnpiMWjDG1gwfVo1BxSdSF0UZUSbQSHtbO_HhE6R5aJPDc_O-yjCMej8psbJi_LJ29GJwJXRTtvWE_Oo0mhMw\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e4c2e3e2-c856-40fe-a604-cb726e24c5c2", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/a6d5c37812c244419b08c848368e5d8e\",\"value\":\"qi2JsIhCsLPdygejiVEVuORSGYtq-eanbDZiVztwYMqUVE_rGRzHyAh94wyiJpCfRqMs3r4OAq2txsYCxC8FQXAaf5QoiwEjsCXvFqONa1XhUpsWsZbotKgCLPndLOzjGHLTHVfUTD_BHXZ-whi9HYB9grwhWtSmgsUplK6cJUr7oYd0_HX_8z99zCAsMrh7f-Z1OPwCAdjPu6XwzuC1PrEKGaOOXsC2TStcaXsFmV1a7Ptdy6Fkz-RL7G5_JbxPt4DrDxahKTZp4YeO8glqZr8_h1zq4Jm6KbQb9ndOU3BTWi1X-KpHigl2iF97S8hPwPMgxi7_9l2j39a6gnQ6rg\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/71137496c6b14fa9a253eb5b2b1cc8c2/decrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/a6d5c37812c244419b08c848368e5d8e/decrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:52 GMT", + "date" : "Thu, 08 Mar 2018 20:09:29 GMT", "content-length" : "247", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -177,9 +177,9 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a23641e2-4b68-40fa-9626-a7fee9dead4f", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/71137496c6b14fa9a253eb5b2b1cc8c2\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "987d57e4-bc74-4899-9f45-46fd2b5c771f", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/a6d5c37812c244419b08c848368e5d8e\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" } } ], "variables" : [ ] diff --git a/azure-keyvault/target/test-classes/session-records/issuerAsyncForAsyncOperationsTest.json b/azure-keyvault/target/test-classes/session-records/issuerAsyncForAsyncOperationsTest.json index cf4aa61..c250b5d 100644 --- a/azure-keyvault/target/test-classes/session-records/issuerAsyncForAsyncOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/issuerAsyncForAsyncOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:22 GMT", + "date" : "Wed, 07 Mar 2018 19:05:52 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1f5f69b9-4207-4470-b948-dc6b549951b1", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a921d942-981e-4ebf-925b-5e6180a0f9bc", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:22 GMT", + "date" : "Wed, 07 Mar 2018 19:05:52 GMT", "content-length" : "175", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e57d46cc-6254-463a-ba5e-ac949d0d88d0", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer\",\"provider\":\"Test\",\"attributes\":{\"enabled\":true,\"created\":1511294783,\"updated\":1511294783}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "655da94d-def4-460c-85b4-15cf7b59caef", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer\",\"provider\":\"Test\",\"attributes\":{\"enabled\":true,\"created\":1520449553,\"updated\":1520449553}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:22 GMT", + "date" : "Wed, 07 Mar 2018 19:05:54 GMT", "content-length" : "179", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2ac1d65a-21c3-4824-b050-331eab87e69b", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer\",\"provider\":\"SslAdmin\",\"attributes\":{\"enabled\":true,\"created\":1511294783,\"updated\":1511294783}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "85bf7772-2b6f-4961-9146-972331c3d3e7", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer\",\"provider\":\"SslAdmin\",\"attributes\":{\"enabled\":true,\"created\":1520449553,\"updated\":1520449554}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:22 GMT", + "date" : "Wed, 07 Mar 2018 19:05:54 GMT", "content-length" : "179", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "d0c7fe3b-5fe4-4ecb-ac24-fef259a62787", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer\",\"provider\":\"SslAdmin\",\"attributes\":{\"enabled\":true,\"created\":1511294783,\"updated\":1511294783}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "1b33fca6-a5c1-4948-8d36-5aa4037b13ba", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer\",\"provider\":\"SslAdmin\",\"attributes\":{\"enabled\":true,\"created\":1520449553,\"updated\":1520449554}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:23 GMT", + "date" : "Wed, 07 Mar 2018 19:05:54 GMT", "content-length" : "394", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,19 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "05ad2d2a-063b-4727-9cfc-b12e9788bfde", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "425b2317-e3e4-4c2a-be40-6429f25f81ac", "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPemIssuer01\",\"provider\":\"Test\"},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/createCertificateJavaPkcs12Issuer01\",\"provider\":\"Test\"},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer\",\"provider\":\"SslAdmin\"}],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:23 GMT", + "date" : "Wed, 07 Mar 2018 19:05:54 GMT", "content-length" : "179", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,9 +151,9 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8aa4aad5-22f9-4fdc-a043-9f1a1a6938fc", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer\",\"provider\":\"SslAdmin\",\"attributes\":{\"enabled\":true,\"created\":1511294783,\"updated\":1511294783}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e1fe61fb-034b-4732-989f-07086b768944", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/myIssuer\",\"provider\":\"SslAdmin\",\"attributes\":{\"enabled\":true,\"created\":1520449553,\"updated\":1520449554}}" } } ], "variables" : [ ] diff --git a/azure-keyvault/target/test-classes/session-records/issuerCrudOperationsForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/issuerCrudOperationsForCertificateOperationsTest.json index 85514dc..ace1871 100644 --- a/azure-keyvault/target/test-classes/session-records/issuerCrudOperationsForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/issuerCrudOperationsForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:51 GMT", + "date" : "Wed, 07 Mar 2018 23:05:19 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "aa079b1a-5500-483a-b55d-b83515aa912c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "39284b7c-b53c-47c0-a479-eb314f759487", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:51 GMT", + "date" : "Wed, 07 Mar 2018 23:05:20 GMT", "content-length" : "348", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3f6dd38d-1d76-4248-bf5a-6dd2c997aa40", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account1\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1511297752,\"updated\":1511297752}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "06f8dda0-95ab-4c77-988b-13ea8c7ec6c5", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account1\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1520463920,\"updated\":1520463920}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:52 GMT", + "date" : "Wed, 07 Mar 2018 23:05:20 GMT", "content-length" : "348", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3cbe1485-1a52-46ba-9d48-b3932cd8acbe", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account1\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1511297752,\"updated\":1511297752}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "caa1981e-1d9e-40f6-80c9-e32baf55070c", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account1\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1520463920,\"updated\":1520463920}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:52 GMT", + "date" : "Wed, 07 Mar 2018 23:05:21 GMT", "content-length" : "348", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "15d6c125-6429-41be-95f4-4b73342a4ea9", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account2\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1511297752,\"updated\":1511297753}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "716e9a97-8317-4f58-913b-1ef4b918f7c6", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account2\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1520463920,\"updated\":1520463921}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:52 GMT", + "date" : "Wed, 07 Mar 2018 23:05:21 GMT", "content-length" : "348", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,19 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "d29bbd19-e1bf-482b-9d27-3d02da4760c1", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account2\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1511297752,\"updated\":1511297753}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "3a355ae4-9ced-46c4-a95b-55af32789b89", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1\",\"provider\":\"Test\",\"credentials\":{\"account_id\":\"account2\"},\"org_details\":{\"zip\":0,\"admin_details\":[{\"first_name\":\"John\",\"last_name\":\"Doe\",\"email\":\"john.doe@contoso.com\",\"phone\":\"1234567890\"}]},\"attributes\":{\"enabled\":true,\"created\":1520463920,\"updated\":1520463921}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/issuers/issuer1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:55:54 GMT", + "date" : "Wed, 07 Mar 2018 23:05:21 GMT", "content-length" : "75", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,8 +151,8 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "dc4336e2-d658-42d7-8cef-a1c64a727de5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "1191bdcd-6716-4b56-bf27-a72123a7d610", "Body" : "{\"error\":{\"code\":\"CertificateIssuerNotFound\",\"message\":\"Issuer not found\"}}" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/keyAsyncForAsyncOperationsTest.json b/azure-keyvault/target/test-classes/session-records/keyAsyncForAsyncOperationsTest.json index e77bab2..df08631 100644 --- a/azure-keyvault/target/test-classes/session-records/keyAsyncForAsyncOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/keyAsyncForAsyncOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:50 GMT", + "date" : "Wed, 07 Mar 2018 19:06:39 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "fbd3cfbe-d0d7-4594-9adc-49b054f0e3ce", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c7940b87-451f-4537-910d-8a084c700ab3", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:50 GMT", + "date" : "Wed, 07 Mar 2018 19:06:40 GMT", "content-length" : "662", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8be8e305-02ad-4bb5-aaa8-f597e9354a01", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pZCeKQztPbeIOGaeMrEGTy2k-NIY3nYMiDEFR6MdVy0bKVbK35cosEIRBExe8N-jH9z4xZFiXfaKIldTYM9_L8RWDLqFvvX9KBWoBPMJNLv3Id3rvxuUNFW52HYgndmrCOjNcaIm8TF4bdrTv9z5to3ddEjLwQBDpjwE-wx_r7gFb4rVI8lFwzLpLf5Cn5V6NLpTo43dEZpNsDih2twmUvUgGGOEEUj3oSNkwU_J6NaohakWyCLSdBlh5aBh91oooJyQFWiUqx4gejzuv4JiSYofddd57oXSLsvjwN7KvDKVlgsPSM1-ePzp42Ui5vk-TElFagxVDjc29XpKxhTB5Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "cf6dafe6-e79d-424e-822e-63b901230297", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"yKkzBxDzT9UeQzdF-Ch4_5psycuVYPANvrojtauBhycaRQM3lsfpKVfP8v9DwHZDxmOqMWrnrBRd6PYjmAlx1KJXxcFPwLWo2G_pRiu5I2rrd0P0SbJv5tawaCyWX761s282m_acujecWzzCG1tsjJ7iNvexs5s6tcow3JACUtp6tJ8w1KhA70UovQQFjXAGjcJk8gharSvOGP0k_6MlhctZuiqOEjkFN-I7reZImmAytJ9uIZutAFV1uWS6OfJ6VaookIyKimFz6Ll3sS4Vr8GNex075rW6PsY1x1nc2Xx3HHLBSyVBxVQEWZK98fu93qBBV0eXdIaf_PjJ-KFgAw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449600,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:51 GMT", + "date" : "Wed, 07 Mar 2018 19:06:40 GMT", "content-length" : "662", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b3e1d29e-a441-4496-a081-c6aa58d4dcd1", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pZCeKQztPbeIOGaeMrEGTy2k-NIY3nYMiDEFR6MdVy0bKVbK35cosEIRBExe8N-jH9z4xZFiXfaKIldTYM9_L8RWDLqFvvX9KBWoBPMJNLv3Id3rvxuUNFW52HYgndmrCOjNcaIm8TF4bdrTv9z5to3ddEjLwQBDpjwE-wx_r7gFb4rVI8lFwzLpLf5Cn5V6NLpTo43dEZpNsDih2twmUvUgGGOEEUj3oSNkwU_J6NaohakWyCLSdBlh5aBh91oooJyQFWiUqx4gejzuv4JiSYofddd57oXSLsvjwN7KvDKVlgsPSM1-ePzp42Ui5vk-TElFagxVDjc29XpKxhTB5Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "69107563-872d-47f7-b7cf-3fd1de9eb1b0", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"yKkzBxDzT9UeQzdF-Ch4_5psycuVYPANvrojtauBhycaRQM3lsfpKVfP8v9DwHZDxmOqMWrnrBRd6PYjmAlx1KJXxcFPwLWo2G_pRiu5I2rrd0P0SbJv5tawaCyWX761s282m_acujecWzzCG1tsjJ7iNvexs5s6tcow3JACUtp6tJ8w1KhA70UovQQFjXAGjcJk8gharSvOGP0k_6MlhctZuiqOEjkFN-I7reZImmAytJ9uIZutAFV1uWS6OfJ6VaookIyKimFz6Ll3sS4Vr8GNex075rW6PsY1x1nc2Xx3HHLBSyVBxVQEWZK98fu93qBBV0eXdIaf_PjJ-KFgAw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449601,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:51 GMT", + "date" : "Wed, 07 Mar 2018 19:06:40 GMT", "content-length" : "662", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,20 +99,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c16f412e-21c9-4162-a67b-b48039448335", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pZCeKQztPbeIOGaeMrEGTy2k-NIY3nYMiDEFR6MdVy0bKVbK35cosEIRBExe8N-jH9z4xZFiXfaKIldTYM9_L8RWDLqFvvX9KBWoBPMJNLv3Id3rvxuUNFW52HYgndmrCOjNcaIm8TF4bdrTv9z5to3ddEjLwQBDpjwE-wx_r7gFb4rVI8lFwzLpLf5Cn5V6NLpTo43dEZpNsDih2twmUvUgGGOEEUj3oSNkwU_J6NaohakWyCLSdBlh5aBh91oooJyQFWiUqx4gejzuv4JiSYofddd57oXSLsvjwN7KvDKVlgsPSM1-ePzp42Ui5vk-TElFagxVDjc29XpKxhTB5Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fb0470dc-430a-44a4-9606-3b99497c3149", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"yKkzBxDzT9UeQzdF-Ch4_5psycuVYPANvrojtauBhycaRQM3lsfpKVfP8v9DwHZDxmOqMWrnrBRd6PYjmAlx1KJXxcFPwLWo2G_pRiu5I2rrd0P0SbJv5tawaCyWX761s282m_acujecWzzCG1tsjJ7iNvexs5s6tcow3JACUtp6tJ8w1KhA70UovQQFjXAGjcJk8gharSvOGP0k_6MlhctZuiqOEjkFN-I7reZImmAytJ9uIZutAFV1uWS6OfJ6VaookIyKimFz6Ll3sS4Vr8GNex075rW6PsY1x1nc2Xx3HHLBSyVBxVQEWZK98fu93qBBV0eXdIaf_PjJ-KFgAw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449601,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?maxresults=2&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?maxresults=2&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:51 GMT", - "content-length" : "319", + "date" : "Wed, 07 Mar 2018 19:06:41 GMT", + "content-length" : "824", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -125,20 +125,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "0d4e26cd-555c-4990-8a57-f5107f34b115", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDAhTURBd01ETXdJV3RsZVM5RFVrVkJWRVZUUlV4R1UwbEhUa1ZFU2tGV1FWQkxRMU14TWlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e836b1db-6489-47ae-addd-ac6a84988258", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/cancellationRequestedCertJava\",\"attributes\":{\"enabled\":false,\"nbf\":1519842497,\"exp\":1551379097,\"created\":1519843097,\"updated\":1519843097,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"managed\":true},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/createManualEnrollmentJava\",\"attributes\":{\"enabled\":false,\"nbf\":1519842513,\"exp\":1551379113,\"created\":1519843113,\"updated\":1519843113,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"managed\":true}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDAhTURBd01ETXdJV3RsZVM5RFVrVkJWRVZUUlV4R1UwbEhUa1ZFU2tGV1FWQkxRMU14TWlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDAhTURBd01ETXdJV3RsZVM5RFVrVkJWRVZUUlV4R1UwbEhUa1ZFU2tGV1FWQkxRMU14TWlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDAhTURBd01ETXdJV3RsZVM5RFVrVkJWRVZUUlV4R1UwbEhUa1ZFU2tGV1FWQkxRMU14TWlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:51 GMT", - "content-length" : "307", + "date" : "Wed, 07 Mar 2018 19:06:41 GMT", + "content-length" : "308", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -151,20 +151,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1bf0e1c8-d6ae-414e-b32f-5516228e1e49", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElXdGxlUzlEVWtWQlZFVlVSVk5VU2tGV1FWQkxRMU14TWlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "de6fcd5e-d66a-408b-9b72-1265e91c4f6f", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElXdGxlUzlEVWtWQlZFVlVSVk5VU2tGV1FWQkxRMU14TWlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElXdGxlUzlEVWtWQlZFVlVSVk5VU2tGV1FWQkxRMU14TWlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElXdGxlUzlEVWtWQlZFVlVSVk5VU2tGV1FWQkxRMU14TWlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:52 GMT", - "content-length" : "285", + "date" : "Wed, 07 Mar 2018 19:06:41 GMT", + "content-length" : "281", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -177,20 +177,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "28ec56f5-bcaf-46d3-937b-662a9df57d20", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeElXdGxlUzlLUVZaQlMwVlpJVEF3TURBeU9DRXlNREUzTFRFeExURTBWREl6T2pFd09qVXpMalExTlRJNE5UQmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "4ef62d7c-8422-44a1-aec8-b71d730e383e", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3MiFNREF3TURFd0lXdGxlUzlMUlZsTFJWa2hNREF3TURJNElUazVPVGt0TVRJdE16RlVNak02TlRrNk5Ua3VPVGs1T1RrNU9Wb2giLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeElXdGxlUzlLUVZaQlMwVlpJVEF3TURBeU9DRXlNREUzTFRFeExURTBWREl6T2pFd09qVXpMalExTlRJNE5UQmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3MiFNREF3TURFd0lXdGxlUzlMUlZsTFJWa2hNREF3TURJNElUazVPVGt0TVRJdE16RlVNak02TlRrNk5Ua3VPVGs1T1RrNU9Wb2giLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:52 GMT", - "content-length" : "482", + "date" : "Wed, 07 Mar 2018 19:06:41 GMT", + "content-length" : "722", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -203,20 +203,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "20b9f0d8-55ad-4b89-8944-1b514e97fe43", - "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey\",\"attributes\":{\"enabled\":true,\"created\":1511230677,\"updated\":1511230677,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXhJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "59dd8484-4e59-407e-80b3-75296ecdb5a8", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/keykey\",\"attributes\":{\"enabled\":true,\"created\":1515701809,\"updated\":1515701809,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate0\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036639,\"updated\":1520036639,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"managed\":true}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXhJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXhJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXhJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:53 GMT", - "content-length" : "301", + "date" : "Wed, 07 Mar 2018 19:06:42 GMT", + "content-length" : "781", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -229,20 +229,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "208c69b6-c011-4bba-a695-5ffd74864bb4", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXpJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0ec0acd2-1f72-4046-b826-7a75f928864f", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate1\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036640,\"updated\":1520036640,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"managed\":true},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate2\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036641,\"updated\":1520036641,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"managed\":true}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXpJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXpJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXpJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:53 GMT", - "content-length" : "296", + "date" : "Wed, 07 Mar 2018 19:06:42 GMT", + "content-length" : "536", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -255,20 +255,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b3abf111-3d3a-4708-a9f6-62efda3c262c", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lXdGxlUzlOV1VORlVsUkpSa2xEUVZSRklUQXdNREF5T0NFNU9UazVMVEV5TFRNeFZESXpPalU1T2pVNUxqazVPVGs1T1RsYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "04d5d694-c292-499b-a5e7-ffcd53be0462", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate3\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036641,\"updated\":1520036641,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"managed\":true}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lXdGxlUzlOV1VORlVsUkpSa2xEUVZSRklUQXdNREF5T0NFNU9UazVMVEV5TFRNeFZESXpPalU1T2pVNUxqazVPVGs1T1RsYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lXdGxlUzlOV1VORlVsUkpSa2xEUVZSRklUQXdNREF5T0NFNU9UazVMVEV5TFRNeFZESXpPalU1T2pVNUxqazVPVGs1T1RsYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lXdGxlUzlOV1VORlVsUkpSa2xEUVZSRklUQXdNREF5T0NFNU9UazVMVEV5TFRNeFZESXpPalU1T2pVNUxqazVPVGs1T1RsYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:53 GMT", - "content-length" : "480", + "date" : "Wed, 07 Mar 2018 19:06:42 GMT", + "content-length" : "481", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -281,19 +281,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "52f781b5-2b48-44d0-89e8-5c7b6f8d1271", - "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey\",\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElXdGxlUzlUUlV4R1UwbEhUa1ZFU2tGV1FWQkZUU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a9abbef7-24a9-4dfe-a655-bfa1535a73f3", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey\",\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449601,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElXdGxlUzlUUlV4R1UwbEhUa1ZFU2tGV1FWQkZUU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElXdGxlUzlUUlV4R1UwbEhUa1ZFU2tGV1FWQkZUU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElXdGxlUzlUUlV4R1UwbEhUa1ZFU2tGV1FWQkZUU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:53 GMT", + "date" : "Wed, 07 Mar 2018 19:06:42 GMT", "content-length" : "28", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -307,19 +307,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4577da36-69d5-4c68-961d-00ab89d01606", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "bb50478d-24ab-431c-8667-df61ca7dbabf", "Body" : "{\"value\":[],\"nextLink\":null}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/versions?maxresults=2&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/versions?maxresults=2&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:55 GMT", + "date" : "Wed, 07 Mar 2018 19:06:43 GMT", "content-length" : "240", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -333,20 +333,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "d0807a7d-c3a2-416b-9a09-b0f7a1b8d82d", - "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "891548fc-685e-40f5-8d93-eb7b2488e6c6", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449601,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/backup?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/backup?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:55 GMT", - "content-length" : "12512", + "date" : "Wed, 07 Mar 2018 19:06:43 GMT", + "content-length" : "13139", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -359,19 +359,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8f107476-fcd3-480a-a254-45853c73a26f", - "Body" : "{\"value\":\"&AzureKeyVaultKeyBackupV1.microsoft.comeyJraWQiOiI0Mzg1YjA3Yi1kNTQ3LTQyZTUtYWU5ZS02MTBkYzM5ZGZhZjgiLCJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.YkY1i1wQo2zhmvKE6Ta-oAIgsupDd49yC-SnGZBXabJdpQsy_7mr1wLOXw3TN19ZgAS2DXIEfVxmFdDasEWACjH6xPTLvzA_zVILR-V1J2g-Tb-8TiSmPA6AE0YkthvWeyHKuQXSde3kE64uMDxPVl7hzNH0WqUJsfE4dkcLFUKsBXyarvFCNpkcDGAZ_YP-H18p_sZtOJt3aIBQq8b6XaV5mfJ5fHo6pscNVQ7Za8X28Rpc92HQgvKbL6yhsuF8reO1skuJImUZ9BJQAr7naEIcFNieswWKSfluUrUgHvIAMB-Zmo7E_VSuz7dXImguT_AFoVVZKzNkE7HAB5PnTg.WaYzGO-5RzmWpOJjyH2BTw.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.Ot-YKxq64uLHT--lcnm_RA\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e71ad60b-724c-4be9-bd0d-b206b45ccab0", + "Body" : "{\"value\":\"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\"}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:55 GMT", + "date" : "Wed, 07 Mar 2018 19:06:43 GMT", "content-length" : "799", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -385,19 +385,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "93583c4f-bb07-4f8f-8176-9b344f598109", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey\",\"deletedDate\":1511294815,\"scheduledPurgeDate\":1519070815,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pZCeKQztPbeIOGaeMrEGTy2k-NIY3nYMiDEFR6MdVy0bKVbK35cosEIRBExe8N-jH9z4xZFiXfaKIldTYM9_L8RWDLqFvvX9KBWoBPMJNLv3Id3rvxuUNFW52HYgndmrCOjNcaIm8TF4bdrTv9z5to3ddEjLwQBDpjwE-wx_r7gFb4rVI8lFwzLpLf5Cn5V6NLpTo43dEZpNsDih2twmUvUgGGOEEUj3oSNkwU_J6NaohakWyCLSdBlh5aBh91oooJyQFWiUqx4gejzuv4JiSYofddd57oXSLsvjwN7KvDKVlgsPSM1-ePzp42Ui5vk-TElFagxVDjc29XpKxhTB5Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "76f703a2-b008-42c6-968e-963e6d63e484", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey\",\"deletedDate\":1520449604,\"scheduledPurgeDate\":1528225604,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"yKkzBxDzT9UeQzdF-Ch4_5psycuVYPANvrojtauBhycaRQM3lsfpKVfP8v9DwHZDxmOqMWrnrBRd6PYjmAlx1KJXxcFPwLWo2G_pRiu5I2rrd0P0SbJv5tawaCyWX761s282m_acujecWzzCG1tsjJ7iNvexs5s6tcow3JACUtp6tJ8w1KhA70UovQQFjXAGjcJk8gharSvOGP0k_6MlhctZuiqOEjkFN-I7reZImmAytJ9uIZutAFV1uWS6OfJ6VaookIyKimFz6Ll3sS4Vr8GNex075rW6PsY1x1nc2Xx3HHLBSyVBxVQEWZK98fu93qBBV0eXdIaf_PjJ-KFgAw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449601,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:56 GMT", + "date" : "Wed, 07 Mar 2018 19:06:43 GMT", "content-length" : "73", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -411,19 +411,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5ce632ba-4988-4140-b752-8f2af2164a3b", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d24d526b-ef5d-436e-acba-7de1af48ac2c", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: mykey\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:05 GMT", + "date" : "Wed, 07 Mar 2018 19:06:54 GMT", "content-length" : "73", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -437,19 +437,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f31f97ce-8580-40bf-96be-a246b6fac2fd", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0aa11c1b-2745-4e2f-91df-f76b2812f1cb", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: mykey\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:15 GMT", + "date" : "Wed, 07 Mar 2018 19:07:05 GMT", "content-length" : "799", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -463,19 +463,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3576d47b-8e9a-4464-8687-7cc9cb97d58d", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey\",\"deletedDate\":1511294815,\"scheduledPurgeDate\":1519070815,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pZCeKQztPbeIOGaeMrEGTy2k-NIY3nYMiDEFR6MdVy0bKVbK35cosEIRBExe8N-jH9z4xZFiXfaKIldTYM9_L8RWDLqFvvX9KBWoBPMJNLv3Id3rvxuUNFW52HYgndmrCOjNcaIm8TF4bdrTv9z5to3ddEjLwQBDpjwE-wx_r7gFb4rVI8lFwzLpLf5Cn5V6NLpTo43dEZpNsDih2twmUvUgGGOEEUj3oSNkwU_J6NaohakWyCLSdBlh5aBh91oooJyQFWiUqx4gejzuv4JiSYofddd57oXSLsvjwN7KvDKVlgsPSM1-ePzp42Ui5vk-TElFagxVDjc29XpKxhTB5Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "db7b72c1-f76c-4647-afb9-967e3e19b951", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey\",\"deletedDate\":1520449604,\"scheduledPurgeDate\":1528225604,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"yKkzBxDzT9UeQzdF-Ch4_5psycuVYPANvrojtauBhycaRQM3lsfpKVfP8v9DwHZDxmOqMWrnrBRd6PYjmAlx1KJXxcFPwLWo2G_pRiu5I2rrd0P0SbJv5tawaCyWX761s282m_acujecWzzCG1tsjJ7iNvexs5s6tcow3JACUtp6tJ8w1KhA70UovQQFjXAGjcJk8gharSvOGP0k_6MlhctZuiqOEjkFN-I7reZImmAytJ9uIZutAFV1uWS6OfJ6VaookIyKimFz6Ll3sS4Vr8GNex075rW6PsY1x1nc2Xx3HHLBSyVBxVQEWZK98fu93qBBV0eXdIaf_PjJ-KFgAw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449601,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:16 GMT", + "date" : "Wed, 07 Mar 2018 19:07:05 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -487,19 +487,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "7c7162b2-37fa-4c37-ad21-5095d139c05e", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "88eb325a-94b1-4d9e-95d9-2599aa7a3653", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/restore?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/restore?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:37 GMT", + "date" : "Wed, 07 Mar 2018 19:07:24 GMT", "content-length" : "662", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -513,19 +513,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "04e7b227-c978-4e2b-aac1-e53cba948e70", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pZCeKQztPbeIOGaeMrEGTy2k-NIY3nYMiDEFR6MdVy0bKVbK35cosEIRBExe8N-jH9z4xZFiXfaKIldTYM9_L8RWDLqFvvX9KBWoBPMJNLv3Id3rvxuUNFW52HYgndmrCOjNcaIm8TF4bdrTv9z5to3ddEjLwQBDpjwE-wx_r7gFb4rVI8lFwzLpLf5Cn5V6NLpTo43dEZpNsDih2twmUvUgGGOEEUj3oSNkwU_J6NaohakWyCLSdBlh5aBh91oooJyQFWiUqx4gejzuv4JiSYofddd57oXSLsvjwN7KvDKVlgsPSM1-ePzp42Ui5vk-TElFagxVDjc29XpKxhTB5Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "2c3ccfa8-384e-49c0-abcf-d3444868a6e1", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"yKkzBxDzT9UeQzdF-Ch4_5psycuVYPANvrojtauBhycaRQM3lsfpKVfP8v9DwHZDxmOqMWrnrBRd6PYjmAlx1KJXxcFPwLWo2G_pRiu5I2rrd0P0SbJv5tawaCyWX761s282m_acujecWzzCG1tsjJ7iNvexs5s6tcow3JACUtp6tJ8w1KhA70UovQQFjXAGjcJk8gharSvOGP0k_6MlhctZuiqOEjkFN-I7reZImmAytJ9uIZutAFV1uWS6OfJ6VaookIyKimFz6Ll3sS4Vr8GNex075rW6PsY1x1nc2Xx3HHLBSyVBxVQEWZK98fu93qBBV0eXdIaf_PjJ-KFgAw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449601,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87/encrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be/encrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:37 GMT", + "date" : "Wed, 07 Mar 2018 19:07:25 GMT", "content-length" : "453", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -539,19 +539,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "18335079-b38f-41b9-9322-a674f139acc7", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"value\":\"ejtEnm72hQY5Bo5JkTGKa_RpDpY6tUxb3zNoQrE8OENI0UGIyUS3H-UQ8upNmELhmQFXKvs0I7LV94IMWsD8HDgthol4Aa9mGNeJGXIbwayJOtGPFdQKRdyahNM9nTxxlA55YdC9Uuh_6A_ML05asYNPlgYi4daPmHthCX_acUIWyLAzqe729Jj0svj2kaHIxcb1kQSayFTmPuH965lsYjosl7p-s1kE9jX7LqOLAWk1TUCandBWTx5BG4zhKB04kjvgIZBN3L699IPCGRy6xP2BefzXdsxsUwcVg4LkCUPi3eVbrDe37Fn93hhUnRkbTfPMNkrTTQ5bcsN6hXTFtg\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "4113a28e-a123-4669-8f79-cd4574279884", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"value\":\"Twlll3I2fkJZbcQNamhTC_8mIDEh_HEQIWrIWS7KXZ00IjMmRVJ1ELrApv6TGcX8UCsgktXy3reH0ts8Eh851UfEA_0UXRbcKFS__kMlwpPzFMDyo018qeyR-39VFn-CrnOpc5Z5xGYVRLU6tdgB5-UxOVzLC-kiCnYGYVlY4tbL-xNDQj-j73bsbA9hQDcjrH6KaaKgdHbXDBIoZt8pNUs9Yg2rNpx5nUGS-Jdr5EXnTNq6D2o7CHfNu8wbuw_PMutlUITKFs7nguxrYVXknDvHYB1T7pnKBk-u8WiY5v_M96IejhSpFBY7F0DWh2KqSvPkDe0QItRPgVWBwTpmXQ\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87/decrypt?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be/decrypt?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:37 GMT", + "date" : "Wed, 07 Mar 2018 19:07:25 GMT", "content-length" : "245", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -565,19 +565,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e50450d7-6b8c-4091-b637-94187eb8bc20", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"value\":\"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e413d3e8-7c72-4514-a385-3a96d75d57d2", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"value\":\"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87/wrapkey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be/wrapkey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:37 GMT", + "date" : "Wed, 07 Mar 2018 19:07:25 GMT", "content-length" : "453", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -591,19 +591,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "442024ff-57d6-4704-8fcf-99da254445be", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"value\":\"fN2Uc3ipkASCaSd3ca_S3cuzdczKjaojCIUa2DnHbWlhUxeUwVADSG4QeSMpL6MX4PfbGY78xLgKu9O9n48IaNPMb08Zh2HUNqX1xKF1VYl3fcvrznLgZmTzPRRueaZzY39cvxVl6lokooRXpIt8Fouew12et3nxbGT-VMacVz1vX37nZ4C7BXKaQYIpGwYzaZk8hNCeji0o3eGs--cA48aa01u6iNhFTKj88EobPyYbegXmWfw3bHfQdVlZaRTHgMeRNLwC2mzS45m-KrFdjykf4MwSa7ZHelaq6jqjAD4IxsIrhCSdcy0qJ_gae8y6WCq5eHDqi5H9-79QwwlLJg\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "52576e33-1c84-4cdc-b336-0b9203805438", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"value\":\"xQydnnkm0jcuNSX1l34w7gHg0TCZT71YgGTyVAeh8_1iF05rELCNyUymW2p0ig3_5z1w3En6r2-K6BKSB0MYL2TCAtl3ngpEIGf2cCBIIJY6oKC8dgja72ad27fJTSGwvFzaUPV4dnwzquX1G8_bHo_AhOKzllY1NNXPfr4E_GO57V6oekZUn76Yv2AX3ve26T1Dnlur6F_chXIcSQdUmWt88GInyhvzzV8PJf7P56cLQvtOhwqnQQ34qMoPpeQtAMDBftBkX2Wx_8YlpzylBglqOdyaoXxtG7DPaXbFqugalO_atc2hSBWyHpEgjCatGl39ZJPpinknfGxXadM9BA\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87/unwrapkey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be/unwrapkey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:38 GMT", + "date" : "Wed, 07 Mar 2018 19:07:25 GMT", "content-length" : "245", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -617,19 +617,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bb9a8516-ec11-47a3-813e-e6043dd4e39b", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"value\":\"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "50386dea-e863-45a5-9869-cf112778e6e9", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"value\":\"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87/sign?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be/sign?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:38 GMT", + "date" : "Wed, 07 Mar 2018 19:07:25 GMT", "content-length" : "453", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -643,19 +643,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "42bd011c-385b-4676-a25c-1ff63e8168e9", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"value\":\"HooUEC3_uxcY489raW9QZDX65VZI813By5ZnRyN9dDCJdJnNDwp1_2bEJ7gRYav1HrCqabzBh_4fGGWKyi9a4HKNCjXRRcJdRI4Q1VXGzF5oQMTj-G2Hefh_OOdFh1vbMacgSYqudasbbDraAvyntxMcqNmfz7a4VYpzKF14zJwzJE5hgcdVXYueUKfhmKgWcUsK8iKn3tD4T-67ERjV1RrBmrdcdBdzPui86ZAHX8GeYyHcdcl7cL4gp04vXoIM7C_WDNf4DAZ01WvJLPc4wZxKmh8OE-SdGIKNbf6RyC6fRLf3s2WR4hsP6LMhvnTqBTQZFny-s7JkQLEUQgG5EQ\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "07aad031-48e9-40fd-a48c-c237389240a8", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"value\":\"KKmRl1ImTu-DAhl2UkFWkVFkmV7bNWVqJhLjwQvtJGLy-8GcgqJqnXZJRXtPcWru84VZjo07lwQMPBXE-T1Ptzy21Q-D0wcqxND2IiX5XfMkZgNswwKo9tyhSfgI95MKzCj71-GYWeDNJbwdohOroru0Q6Ecm4Gtmb6cVWDfuqTY0pi4nkaiy24BseHqXNMtoll93TcLhkD6sy5DyQKMEjxHqE5AMP48jQM5wurla6cxCD_qcGTeHhJ26rVrzzu-dhJKGfbhlTLQTCoLZSeJLr6cB5nmhbLxVKo4nTnFH_St9Cmv8yZHlj87qvode7Gf6a2QzIAISyQOW7JcWPYaqw\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87/verify?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be/verify?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:38 GMT", + "date" : "Wed, 07 Mar 2018 19:07:26 GMT", "content-length" : "14", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -669,19 +669,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c1d2ab62-7c6a-494f-9d77-369874feee93", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ac9d3254-99b5-4cd8-8e62-1207798d93a9", "Body" : "{\"value\":true}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:38 GMT", + "date" : "Wed, 07 Mar 2018 19:07:26 GMT", "content-length" : "799", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -695,19 +695,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "13440955-0d6c-4e35-975d-cf837cfbcd6f", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey\",\"deletedDate\":1511294859,\"scheduledPurgeDate\":1519070859,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pZCeKQztPbeIOGaeMrEGTy2k-NIY3nYMiDEFR6MdVy0bKVbK35cosEIRBExe8N-jH9z4xZFiXfaKIldTYM9_L8RWDLqFvvX9KBWoBPMJNLv3Id3rvxuUNFW52HYgndmrCOjNcaIm8TF4bdrTv9z5to3ddEjLwQBDpjwE-wx_r7gFb4rVI8lFwzLpLf5Cn5V6NLpTo43dEZpNsDih2twmUvUgGGOEEUj3oSNkwU_J6NaohakWyCLSdBlh5aBh91oooJyQFWiUqx4gejzuv4JiSYofddd57oXSLsvjwN7KvDKVlgsPSM1-ePzp42Ui5vk-TElFagxVDjc29XpKxhTB5Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "96d2af50-6562-4460-950f-f4a3a71cfa47", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey\",\"deletedDate\":1520449647,\"scheduledPurgeDate\":1528225647,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"yKkzBxDzT9UeQzdF-Ch4_5psycuVYPANvrojtauBhycaRQM3lsfpKVfP8v9DwHZDxmOqMWrnrBRd6PYjmAlx1KJXxcFPwLWo2G_pRiu5I2rrd0P0SbJv5tawaCyWX761s282m_acujecWzzCG1tsjJ7iNvexs5s6tcow3JACUtp6tJ8w1KhA70UovQQFjXAGjcJk8gharSvOGP0k_6MlhctZuiqOEjkFN-I7reZImmAytJ9uIZutAFV1uWS6OfJ6VaookIyKimFz6Ll3sS4Vr8GNex075rW6PsY1x1nc2Xx3HHLBSyVBxVQEWZK98fu93qBBV0eXdIaf_PjJ-KFgAw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449601,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:39 GMT", + "date" : "Wed, 07 Mar 2018 19:07:26 GMT", "content-length" : "73", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -721,19 +721,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f8bc2329-fae4-4bb8-a4b9-ca7ec0685ea5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "32655fa2-ebca-4437-bf8c-f78260f0d5ca", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: mykey\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:07:49 GMT", + "date" : "Wed, 07 Mar 2018 19:07:37 GMT", "content-length" : "73", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -747,19 +747,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "6e957b70-1b2f-490e-a82d-27b12bdbfcff", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e9e55006-19f3-45aa-b28e-073438a281f9", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: mykey\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:08:00 GMT", + "date" : "Wed, 07 Mar 2018 19:07:47 GMT", "content-length" : "799", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -773,19 +773,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2a2ce27a-9daa-4a91-8a9a-201b3b721c78", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey\",\"deletedDate\":1511294859,\"scheduledPurgeDate\":1519070859,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/187fd72a773143348a084b1e5a227a87\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pZCeKQztPbeIOGaeMrEGTy2k-NIY3nYMiDEFR6MdVy0bKVbK35cosEIRBExe8N-jH9z4xZFiXfaKIldTYM9_L8RWDLqFvvX9KBWoBPMJNLv3Id3rvxuUNFW52HYgndmrCOjNcaIm8TF4bdrTv9z5to3ddEjLwQBDpjwE-wx_r7gFb4rVI8lFwzLpLf5Cn5V6NLpTo43dEZpNsDih2twmUvUgGGOEEUj3oSNkwU_J6NaohakWyCLSdBlh5aBh91oooJyQFWiUqx4gejzuv4JiSYofddd57oXSLsvjwN7KvDKVlgsPSM1-ePzp42Ui5vk-TElFagxVDjc29XpKxhTB5Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511294811,\"updated\":1511294811,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "4d00b4ca-21a5-456d-9c32-3666117c55f5", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey\",\"deletedDate\":1520449647,\"scheduledPurgeDate\":1528225647,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey/f72593537115418582c1026e3725d7be\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"yKkzBxDzT9UeQzdF-Ch4_5psycuVYPANvrojtauBhycaRQM3lsfpKVfP8v9DwHZDxmOqMWrnrBRd6PYjmAlx1KJXxcFPwLWo2G_pRiu5I2rrd0P0SbJv5tawaCyWX761s282m_acujecWzzCG1tsjJ7iNvexs5s6tcow3JACUtp6tJ8w1KhA70UovQQFjXAGjcJk8gharSvOGP0k_6MlhctZuiqOEjkFN-I7reZImmAytJ9uIZutAFV1uWS6OfJ6VaookIyKimFz6Ll3sS4Vr8GNex075rW6PsY1x1nc2Xx3HHLBSyVBxVQEWZK98fu93qBBV0eXdIaf_PjJ-KFgAw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520449600,\"updated\":1520449601,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:08:00 GMT", + "date" : "Wed, 07 Mar 2018 19:07:47 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -797,19 +797,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "54f15aea-8c5c-4ef0-87ad-2b81048e3099", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a77effc4-d8a0-42a5-9a10-58fb5f907e43", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/mykey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:08:20 GMT", + "date" : "Wed, 07 Mar 2018 19:08:07 GMT", "content-length" : "65", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -823,8 +823,8 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "d37a7179-316a-48c9-bab3-b7d97ad54ef5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9e7796f9-2bb3-4693-b390-65fbcb5fb15c", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Key not found: mykey\"}}" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/listCertificateVersionsForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/listCertificateVersionsForCertificateOperationsTest.json index c0880d8..0baee6d 100644 --- a/azure-keyvault/target/test-classes/session-records/listCertificateVersionsForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/listCertificateVersionsForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:54 GMT", + "date" : "Wed, 07 Mar 2018 23:20:33 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cabd592e-9e07-4748-bd7b-34599e9355bf", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0684fd80-5798-4737-9767-e5e26501e5c3", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:56 GMT", + "date" : "Wed, 07 Mar 2018 23:20:34 GMT", "content-length" : "1882", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b1d6f0f4-e49b-426f-aa6b-30c74a107811", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/006721e449a34a05b7f1bdb6abe255cf\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/006721e449a34a05b7f1bdb6abe255cf\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/006721e449a34a05b7f1bdb6abe255cf\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298056,\"updated\":1511298056,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298056,\"updated\":1511298056}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f1e91a09-73da-4ac3-933c-4b968b3f8109", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/5059dca100164d02ae2d4b8ee4394a13\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/5059dca100164d02ae2d4b8ee4394a13\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/5059dca100164d02ae2d4b8ee4394a13\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464833,\"updated\":1520464833,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464833,\"updated\":1520464833}}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:57 GMT", + "date" : "Wed, 07 Mar 2018 23:20:34 GMT", "content-length" : "1882", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "28a07141-f7cc-413e-b241-c48f49fe31cc", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/4a8c4670574a48e0bb0c587b1ffad4f6\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/4a8c4670574a48e0bb0c587b1ffad4f6\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/4a8c4670574a48e0bb0c587b1ffad4f6\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298056,\"updated\":1511298056,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298056,\"updated\":1511298056}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d261cbbb-2630-4168-ad7c-7bede6039c2e", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/09e5ac0c44394d71a6f6ab4a5b990bdc\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/09e5ac0c44394d71a6f6ab4a5b990bdc\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/09e5ac0c44394d71a6f6ab4a5b990bdc\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464834,\"updated\":1520464834,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464833,\"updated\":1520464834}}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:57 GMT", + "date" : "Wed, 07 Mar 2018 23:20:35 GMT", "content-length" : "1882", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "da1c3166-b8dc-4f08-aa7f-50584caccbf0", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/6276ed5c3cc846869de2f171c8bdb7e8\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/6276ed5c3cc846869de2f171c8bdb7e8\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/6276ed5c3cc846869de2f171c8bdb7e8\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298057,\"updated\":1511298057,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298056,\"updated\":1511298057}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9c26d7a8-19e0-4f36-baf4-c11707b1f40e", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/fdf31f92f41c4194b615b6d924dbaa6a\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/fdf31f92f41c4194b615b6d924dbaa6a\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/fdf31f92f41c4194b615b6d924dbaa6a\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464835,\"updated\":1520464835,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464833,\"updated\":1520464835}}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:58 GMT", + "date" : "Wed, 07 Mar 2018 23:20:36 GMT", "content-length" : "1882", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,20 +125,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "90a16257-1fa7-4181-86fe-5e7ac68f6163", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298058,\"updated\":1511298058,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298056,\"updated\":1511298058}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9c43ee9c-f79a-4170-a95f-3009d9fdb4c5", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464836,\"updated\":1520464836,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464833,\"updated\":1520464836}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/versions?maxresults=3&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/versions?maxresults=3&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:58 GMT", - "content-length" : "1248", + "date" : "Wed, 07 Mar 2018 23:20:36 GMT", + "content-length" : "1249", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ea99d727-164b-48dd-9d5d-d99483aca922", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/006721e449a34a05b7f1bdb6abe255cf\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298056,\"updated\":1511298056}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298058,\"updated\":1511298058}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/4a8c4670574a48e0bb0c587b1ffad4f6\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298056,\"updated\":1511298056}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/certificates/listCertificateVersions/versions?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExNjQhTURBd01EYzNJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVlpGVWxOSlQwNVRMMVpGVWxOSlQwNVRMell5TnpaRlJEVkRNME5ET0RRMk9EWTVSRVV5UmpFM01VTTRRa1JDTjBVNElUQXdNREF5T0NFNU9UazVMVEV5TFRNeFZESXpPalU1T2pVNUxqazVPVGs1T1RsYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "4184e483-de77-4ce0-a9e2-6a566980510c", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464836,\"updated\":1520464836}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/09e5ac0c44394d71a6f6ab4a5b990bdc\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464834,\"updated\":1520464834}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/5059dca100164d02ae2d4b8ee4394a13\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464833,\"updated\":1520464833}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/certificates/listCertificateVersions/versions?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExNjQhTURBd01EYzNJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVlpGVWxOSlQwNVRMMVpGVWxOSlQwNVRMelkwTkVNeU1qZzNRa1F3TURRMVFUazROa0ZDUlRkRU5qaEJRMFEyTXpSQklUQXdNREF5T0NFeU1ERTRMVEF6TFRBM1ZESXhPakkxT2pJNExqUTVNekl5TlROYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/versions?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExNjQhTURBd01EYzNJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVlpGVWxOSlQwNVRMMVpGVWxOSlQwNVRMell5TnpaRlJEVkRNME5ET0RRMk9EWTVSRVV5UmpFM01VTTRRa1JDTjBVNElUQXdNREF5T0NFNU9UazVMVEV5TFRNeFZESXpPalU1T2pVNUxqazVPVGs1T1RsYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/versions?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExNjQhTURBd01EYzNJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVlpGVWxOSlQwNVRMMVpGVWxOSlQwNVRMelkwTkVNeU1qZzNRa1F3TURRMVFUazROa0ZDUlRkRU5qaEJRMFEyTXpSQklUQXdNREF5T0NFeU1ERTRMVEF6TFRBM1ZESXhPakkxT2pJNExqUTVNekl5TlROYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:59 GMT", + "date" : "Wed, 07 Mar 2018 23:20:36 GMT", "content-length" : "295", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -177,19 +177,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5c32fc10-e7cd-4179-84e4-5d7d38ecdbc0", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/6276ed5c3cc846869de2f171c8bdb7e8\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298057,\"updated\":1511298057}}],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "8a3d3e66-78dc-415a-a01b-3a90556d9fbd", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/fdf31f92f41c4194b615b6d924dbaa6a\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464835,\"updated\":1520464835}}],\"nextLink\":null}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/versions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/versions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:59 GMT", + "date" : "Wed, 07 Mar 2018 23:20:36 GMT", "content-length" : "1099", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -203,19 +203,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "0a84f3dd-c92f-49ef-97b8-d4ada32f1e0b", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/006721e449a34a05b7f1bdb6abe255cf\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298056,\"updated\":1511298056}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298058,\"updated\":1511298058}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/4a8c4670574a48e0bb0c587b1ffad4f6\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298056,\"updated\":1511298056}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/6276ed5c3cc846869de2f171c8bdb7e8\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298057,\"updated\":1511298057}}],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "392043be-140b-4e8d-ac9b-5bad803041c7", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464836,\"updated\":1520464836}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/09e5ac0c44394d71a6f6ab4a5b990bdc\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464834,\"updated\":1520464834}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/5059dca100164d02ae2d4b8ee4394a13\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464833,\"updated\":1520464833}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/fdf31f92f41c4194b615b6d924dbaa6a\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464835,\"updated\":1520464835}}],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:00:59 GMT", + "date" : "Wed, 07 Mar 2018 23:20:37 GMT", "content-length" : "2045", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -229,19 +229,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4850e422-6e7e-4f40-a98b-170c19ba7748", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions\",\"deletedDate\":1511298060,\"scheduledPurgeDate\":1519074060,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298058,\"updated\":1511298058,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298056,\"updated\":1511298058}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7b08714a-4383-416a-8224-1addbd20384e", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions\",\"deletedDate\":1520464837,\"scheduledPurgeDate\":1528240837,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464836,\"updated\":1520464836,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464833,\"updated\":1520464836}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:00 GMT", + "date" : "Wed, 07 Mar 2018 23:20:37 GMT", "content-length" : "107", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -255,19 +255,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b7cce3a5-c5a3-450c-a18d-10ac238a8391", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "59ab87fc-31a6-4a21-a8d1-7216b428d3b3", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificateVersions\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:10 GMT", + "date" : "Wed, 07 Mar 2018 23:20:47 GMT", "content-length" : "107", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -281,19 +281,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "932108f2-aaeb-4490-8f87-aaa80a669d84", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "79756e21-1694-490e-891b-7dfca4660cd9", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificateVersions\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:20 GMT", + "date" : "Wed, 07 Mar 2018 23:20:58 GMT", "content-length" : "2045", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -307,19 +307,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a6332956-18ab-4155-bf23-1c21268925c4", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions\",\"deletedDate\":1511298060,\"scheduledPurgeDate\":1519074060,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/1c4d6b9a86d44ccabac15ee8d3b52703\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511298058,\"updated\":1511298058,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511298056,\"updated\":1511298058}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "eeb58111-639e-49cf-ba07-005ff02d4691", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions\",\"deletedDate\":1520464837,\"scheduledPurgeDate\":1528240837,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificateVersions/0909c2c83f884b8cac0837e6ca921808\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464836,\"updated\":1520464836,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificateVersions/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464833,\"updated\":1520464836}}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificateVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 21:01:21 GMT", + "date" : "Wed, 07 Mar 2018 23:20:58 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -331,8 +331,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cea59750-9c4c-4d80-b8bb-7a5052ee07b5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "54480394-a396-49ca-bf49-400561560270", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/listCertificatesForCertificateOperationsTest.json b/azure-keyvault/target/test-classes/session-records/listCertificatesForCertificateOperationsTest.json index c8ad82f..85fdc18 100644 --- a/azure-keyvault/target/test-classes/session-records/listCertificatesForCertificateOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/listCertificatesForCertificateOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:17 GMT", + "date" : "Wed, 07 Mar 2018 23:16:45 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "7078c45e-a5cd-48ff-9135-4a3729b72a05", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "4cabdb6a-c44a-4f98-aff9-ec8d12265a8e", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:17 GMT", + "date" : "Wed, 07 Mar 2018 23:16:46 GMT", "content-length" : "1854", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4cde86c3-e65d-486d-9b93-13d6194580a4", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/beff730065f146199ac33bf9b05b41a3\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate0/beff730065f146199ac33bf9b05b41a3\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate0/beff730065f146199ac33bf9b05b41a3\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297837,\"updated\":1511297837,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297837,\"updated\":1511297837}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ec85578d-c7ea-4dca-9456-ea1a5f2219fd", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/9e2fafb1295441b38486d6dc31bba606\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate0/9e2fafb1295441b38486d6dc31bba606\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate0/9e2fafb1295441b38486d6dc31bba606\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464606,\"updated\":1520464606,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464606,\"updated\":1520464606}}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:18 GMT", + "date" : "Wed, 07 Mar 2018 23:16:46 GMT", "content-length" : "1854", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3a805204-6aa5-4b3d-a2b2-99a27116df0c", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/59ca891fb645422bbc2e9e4ccbb68677\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate1/59ca891fb645422bbc2e9e4ccbb68677\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate1/59ca891fb645422bbc2e9e4ccbb68677\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297838,\"updated\":1511297838,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297838,\"updated\":1511297838}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7fe35baa-9d0c-45c1-9d52-4ab295e6e477", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/658b1f2427b5423dbc0ecc33a9d15ee7\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate1/658b1f2427b5423dbc0ecc33a9d15ee7\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate1/658b1f2427b5423dbc0ecc33a9d15ee7\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464607,\"updated\":1520464607,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464607,\"updated\":1520464607}}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:19 GMT", + "date" : "Wed, 07 Mar 2018 23:16:47 GMT", "content-length" : "1854", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "329d91ac-f3d8-4332-a650-5380e42eecad", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/0ed4dc71642a404a9cfa6ef2e8fe69eb\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate2/0ed4dc71642a404a9cfa6ef2e8fe69eb\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate2/0ed4dc71642a404a9cfa6ef2e8fe69eb\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297839,\"updated\":1511297839}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9042dacd-6a16-49e3-9aae-6d204bda51f8", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/519666e02949457fb4321be4e7081882\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate2/519666e02949457fb4321be4e7081882\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate2/519666e02949457fb4321be4e7081882\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464607,\"updated\":1520464607,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464607,\"updated\":1520464607}}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/import?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/import?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:19 GMT", + "date" : "Wed, 07 Mar 2018 23:16:47 GMT", "content-length" : "1854", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,20 +125,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "35511bae-5000-418e-81cb-d1271ca2528b", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/2cccd859768f49d49b9662ab4745d051\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate3/2cccd859768f49d49b9662ab4745d051\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate3/2cccd859768f49d49b9662ab4745d051\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297839,\"updated\":1511297839}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c049c095-d539-4a44-9c04-bf4efc974cfb", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/54d2d142780f41e8bb786fe148fe7a8e\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate3/54d2d142780f41e8bb786fe148fe7a8e\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate3/54d2d142780f41e8bb786fe148fe7a8e\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464608,\"updated\":1520464608,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464608,\"updated\":1520464608}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates?maxresults=3&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates?maxresults=3&includePending=false&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:20 GMT", - "content-length" : "792", + "date" : "Wed, 07 Mar 2018 23:16:49 GMT", + "content-length" : "1021", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -151,20 +151,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "83247aa1-5fe6-4414-9222-b23b7dceb00c", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297837,\"updated\":1511297837}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297838,\"updated\":1511297838}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/certificates?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDghTURBd01ETTFJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVEV2VUU5TVNVTlpJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "bafd24c4-1e1e-4e62-9360-f15c646daf39", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464606,\"updated\":1520464606}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464607,\"updated\":1520464607}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464607,\"updated\":1520464607}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/certificates?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDghTURBd01ETTFJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVEl2VUU5TVNVTlpJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDghTURBd01ETTFJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVEV2VUU5TVNVTlpJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDghTURBd01ETTFJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVEl2VUU5TVNVTlpJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:20 GMT", - "content-length" : "483", + "date" : "Wed, 07 Mar 2018 23:16:49 GMT", + "content-length" : "255", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -177,19 +177,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ded3fab1-6a40-45c7-a434-b3c0926b7ea4", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839}}],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "299bcf5e-1bf2-4bbd-8825-9d26c910ff22", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464608,\"updated\":1520464608}}],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:20 GMT", + "date" : "Wed, 07 Mar 2018 23:16:49 GMT", "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -203,19 +203,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a3ac8d28-184e-4b4b-9ca7-bdd8610d0914", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1\",\"deletedDate\":1511297841,\"scheduledPurgeDate\":1519073841,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/59ca891fb645422bbc2e9e4ccbb68677\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate1/59ca891fb645422bbc2e9e4ccbb68677\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate1/59ca891fb645422bbc2e9e4ccbb68677\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297838,\"updated\":1511297838,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297838,\"updated\":1511297838}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "77fd49b4-a144-472a-8e3d-ec5f1d6003dd", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1\",\"deletedDate\":1520464609,\"scheduledPurgeDate\":1528240609,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/658b1f2427b5423dbc0ecc33a9d15ee7\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate1/658b1f2427b5423dbc0ecc33a9d15ee7\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate1/658b1f2427b5423dbc0ecc33a9d15ee7\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464607,\"updated\":1520464607,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464607,\"updated\":1520464607}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:20 GMT", + "date" : "Wed, 07 Mar 2018 23:16:49 GMT", "content-length" : "100", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -229,19 +229,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "82a4f20f-6048-4489-971e-16026fdb43e8", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f73a1198-bfde-4b76-a09f-3a3dbf9c58da", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate1\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:30 GMT", + "date" : "Wed, 07 Mar 2018 23:16:59 GMT", "content-length" : "100", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -255,25 +255,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ccc16747-1f12-4a24-9ebe-711854551020", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a95ba466-8b0e-4c66-86e3-215c90152ae0", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate1\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:42 GMT", - "content-length" : "100", + "date" : "Wed, 07 Mar 2018 23:17:09 GMT", + "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "404", + "StatusCode" : "200", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -281,45 +281,43 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5e3e8341-2e24-4ca7-ab41-0b85da687b0c", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate1\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "da14cb55-c613-44a8-b632-12da7060aae1", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1\",\"deletedDate\":1520464609,\"scheduledPurgeDate\":1528240609,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/658b1f2427b5423dbc0ecc33a9d15ee7\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate1/658b1f2427b5423dbc0ecc33a9d15ee7\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate1/658b1f2427b5423dbc0ecc33a9d15ee7\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464607,\"updated\":1520464607,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464607,\"updated\":1520464607}}}" } }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1?api-version=2016-10-01", + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:52 GMT", - "content-length" : "2010", + "date" : "Wed, 07 Mar 2018 23:17:09 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "200", + "StatusCode" : "204", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e7f32e3c-b504-4a57-8448-162b35b7644c", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1\",\"deletedDate\":1511297841,\"scheduledPurgeDate\":1519073841,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/59ca891fb645422bbc2e9e4ccbb68677\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate1/59ca891fb645422bbc2e9e4ccbb68677\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate1/59ca891fb645422bbc2e9e4ccbb68677\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297838,\"updated\":1511297838,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297838,\"updated\":1511297838}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fd17aab1-c629-4c9f-b513-5783175ccf23", + "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:52 GMT", + "date" : "Wed, 07 Mar 2018 23:17:20 GMT", "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -333,19 +331,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e90f9a1d-aca0-46f7-806a-98e26bbb8cd7", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2\",\"deletedDate\":1511297872,\"scheduledPurgeDate\":1519073872,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/0ed4dc71642a404a9cfa6ef2e8fe69eb\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate2/0ed4dc71642a404a9cfa6ef2e8fe69eb\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate2/0ed4dc71642a404a9cfa6ef2e8fe69eb\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297839,\"updated\":1511297839}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7b9207f5-93ae-401d-9e8f-3fb85d12d0bd", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2\",\"deletedDate\":1520464640,\"scheduledPurgeDate\":1528240640,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/519666e02949457fb4321be4e7081882\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate2/519666e02949457fb4321be4e7081882\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate2/519666e02949457fb4321be4e7081882\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464607,\"updated\":1520464607,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464607,\"updated\":1520464607}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:57:52 GMT", + "date" : "Wed, 07 Mar 2018 23:17:20 GMT", "content-length" : "100", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -359,19 +357,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f1fde742-59c9-4008-ac53-20e812081573", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fd099c38-3454-4809-9c1d-19852884ffcd", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate2\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:02 GMT", + "date" : "Wed, 07 Mar 2018 23:17:31 GMT", "content-length" : "100", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -385,25 +383,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "91f6c6f0-f95f-4ac0-ac21-02848488e41e", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9d2ed2ad-f24f-486e-9fed-3858c681b029", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate2\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:12 GMT", - "content-length" : "100", + "date" : "Wed, 07 Mar 2018 23:17:41 GMT", + "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "404", + "StatusCode" : "200", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -411,45 +409,43 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8cd4c48f-7f25-407e-ae14-965c0625de93", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate2\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "66c36d96-a23e-4a20-863b-99dcb18518d3", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2\",\"deletedDate\":1520464640,\"scheduledPurgeDate\":1528240640,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/519666e02949457fb4321be4e7081882\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate2/519666e02949457fb4321be4e7081882\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate2/519666e02949457fb4321be4e7081882\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464607,\"updated\":1520464607,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464607,\"updated\":1520464607}}}" } }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2?api-version=2016-10-01", + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:24 GMT", - "content-length" : "2010", + "date" : "Wed, 07 Mar 2018 23:17:41 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "200", + "StatusCode" : "204", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "aa48256c-5f20-459f-a727-c94dd6f199df", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2\",\"deletedDate\":1511297872,\"scheduledPurgeDate\":1519073872,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/0ed4dc71642a404a9cfa6ef2e8fe69eb\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate2/0ed4dc71642a404a9cfa6ef2e8fe69eb\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate2/0ed4dc71642a404a9cfa6ef2e8fe69eb\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297839,\"updated\":1511297839}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "edd2be92-69bf-4c39-b0f5-739cdf4be230", + "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:24 GMT", + "date" : "Wed, 07 Mar 2018 23:17:52 GMT", "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -463,19 +459,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "59df92d3-93a5-48cd-949c-edbc3e0f40a5", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3\",\"deletedDate\":1511297904,\"scheduledPurgeDate\":1519073904,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/2cccd859768f49d49b9662ab4745d051\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate3/2cccd859768f49d49b9662ab4745d051\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate3/2cccd859768f49d49b9662ab4745d051\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297839,\"updated\":1511297839}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ae5d8b4b-ed7c-469b-abff-4e3df4667d69", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3\",\"deletedDate\":1520464672,\"scheduledPurgeDate\":1528240672,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/54d2d142780f41e8bb786fe148fe7a8e\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate3/54d2d142780f41e8bb786fe148fe7a8e\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate3/54d2d142780f41e8bb786fe148fe7a8e\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464608,\"updated\":1520464608,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464608,\"updated\":1520464608}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:24 GMT", + "date" : "Wed, 07 Mar 2018 23:17:52 GMT", "content-length" : "100", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -489,19 +485,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e3d80ee7-779e-4a66-a33a-f3b63b61c073", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "51c33df7-211d-4afd-a95c-fc06a68b8c46", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate3\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:34 GMT", + "date" : "Wed, 07 Mar 2018 23:18:03 GMT", "content-length" : "100", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -515,19 +511,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a821f6d5-8a4e-42e6-954c-9beb7c843f8f", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ea0a0947-9698-47ef-bb56-9e74cd3f6953", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate3\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:45 GMT", + "date" : "Wed, 07 Mar 2018 23:18:13 GMT", "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -541,51 +537,49 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5086aec9-fc51-43ea-821f-cf564e42c7bf", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3\",\"deletedDate\":1511297904,\"scheduledPurgeDate\":1519073904,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/2cccd859768f49d49b9662ab4745d051\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate3/2cccd859768f49d49b9662ab4745d051\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate3/2cccd859768f49d49b9662ab4745d051\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297839,\"updated\":1511297839}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "059173b4-2d95-4b2d-9352-bab81fc505f9", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3\",\"deletedDate\":1520464672,\"scheduledPurgeDate\":1528240672,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/54d2d142780f41e8bb786fe148fe7a8e\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate3/54d2d142780f41e8bb786fe148fe7a8e\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate3/54d2d142780f41e8bb786fe148fe7a8e\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464608,\"updated\":1520464608,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464608,\"updated\":1520464608}}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:45 GMT", - "content-length" : "2010", + "date" : "Wed, 07 Mar 2018 23:18:13 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "200", + "StatusCode" : "204", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "681d05be-682b-43f8-b075-770f24b1abf5", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0\",\"deletedDate\":1511297925,\"scheduledPurgeDate\":1519073925,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/beff730065f146199ac33bf9b05b41a3\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate0/beff730065f146199ac33bf9b05b41a3\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate0/beff730065f146199ac33bf9b05b41a3\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297837,\"updated\":1511297837,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297837,\"updated\":1511297837}}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ab7fe65b-2081-4601-9407-6f940608b35e", + "Body" : "" } }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0?api-version=2016-10-01", + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:45 GMT", - "content-length" : "100", + "date" : "Wed, 07 Mar 2018 23:18:24 GMT", + "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "404", + "StatusCode" : "200", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -593,19 +587,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9cf79d33-62cd-4ff5-b749-2211a32d89fb", - "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate0\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "67ad6b85-14cb-468c-b09c-dbde22efaa2d", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0\",\"deletedDate\":1520464704,\"scheduledPurgeDate\":1528240704,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/9e2fafb1295441b38486d6dc31bba606\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate0/9e2fafb1295441b38486d6dc31bba606\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate0/9e2fafb1295441b38486d6dc31bba606\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464606,\"updated\":1520464606,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464606,\"updated\":1520464606}}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:58:56 GMT", + "date" : "Wed, 07 Mar 2018 23:18:24 GMT", "content-length" : "100", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -619,51 +613,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "081f6a74-2ea7-4aa6-876c-6dd4a078a8db", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "75b789d5-6aaf-49ea-91b4-f9b6f44280c2", "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate0\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:06 GMT", - "content-length" : "2010", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "200", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b03a34ac-78fb-4a2a-a68f-c8182c94d057", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0\",\"deletedDate\":1511297925,\"scheduledPurgeDate\":1519073925,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/beff730065f146199ac33bf9b05b41a3\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate0/beff730065f146199ac33bf9b05b41a3\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate0/beff730065f146199ac33bf9b05b41a3\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"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\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297837,\"updated\":1511297837,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1511297837,\"updated\":1511297837}}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates?maxresults=3&api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:07 GMT", - "content-length" : "1615", + "date" : "Wed, 07 Mar 2018 23:18:34 GMT", + "content-length" : "100", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "200", + "StatusCode" : "404", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -671,20 +639,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cdd7f2c5-873f-45ee-93ce-ea1e2daa1f8f", - "Body" : "{\"value\":[{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0\",\"deletedDate\":1511297925,\"scheduledPurgeDate\":1519073925,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297837,\"updated\":1511297837,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1\",\"deletedDate\":1511297841,\"scheduledPurgeDate\":1519073841,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate1\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297838,\"updated\":1511297838,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2\",\"deletedDate\":1511297872,\"scheduledPurgeDate\":1519073872,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate2\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/deletedcertificates?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDghTURBd01ETTFJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVEl2VUU5TVNVTlpJVEF3TURBeU9DRXlNREUzTFRFeExURXdWREl3T2pFek9qTTFMak0yTWpRM01EUmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "cb5ac298-c32c-47d9-8107-793f33fa8673", + "Body" : "{\"error\":{\"code\":\"CertificateNotFound\",\"message\":\"Deleted Certificate not found: listCertificate0\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDghTURBd01ETTFJV05sY25ScFptbGpZWFJsTDB4SlUxUkRSVkpVU1VaSlEwRlVSVEl2VUU5TVNVTlpJVEF3TURBeU9DRXlNREUzTFRFeExURXdWREl3T2pFek9qTTFMak0yTWpRM01EUmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:07 GMT", - "content-length" : "451", + "date" : "Wed, 07 Mar 2018 23:18:45 GMT", + "content-length" : "2010", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -697,91 +665,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9eb43d4b-9d32-4f62-a398-864d4059ffc1", - "Body" : "{\"value\":[{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3\",\"deletedDate\":1511297904,\"scheduledPurgeDate\":1519073904,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate3\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1511297839,\"updated\":1511297839,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" - } - }, { - "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate1?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:07 GMT", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "204", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ebce6f3a-540a-4f9e-9176-1d8f530dd521", - "Body" : "" - } - }, { - "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate2?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:08 GMT", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "204", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b46c6df7-6a70-4bd2-947b-79e025e7a292", - "Body" : "" - } - }, { - "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate3?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:08 GMT", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "204", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "27f9dad8-7390-4874-a9b6-5b83e2ceb8a3", - "Body" : "" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0861c73c-95e1-4a04-b13a-346750d8add8", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0\",\"deletedDate\":1520464704,\"scheduledPurgeDate\":1528240704,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/9e2fafb1295441b38486d6dc31bba606\",\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/listCertificate0/9e2fafb1295441b38486d6dc31bba606\",\"sid\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate0/9e2fafb1295441b38486d6dc31bba606\",\"x5t\":\"fLi3U52HunIVNXubkEnf8tP6Wbo\",\"cer\":\"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=\",\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520464606,\"updated\":1520464606,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"policy\":{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/certificates/listCertificate0/policy\",\"key_props\":{\"exportable\":true,\"kty\":\"RSA\",\"key_size\":2048,\"reuse_key\":false},\"secret_props\":{\"contentType\":\"application/x-pkcs12\"},\"x509_props\":{\"subject\":\"CN=KeyVaultTest\",\"ekus\":[],\"key_usage\":[],\"validity_months\":297,\"basic_constraints\":{\"ca\":false}},\"lifetime_actions\":[{\"trigger\":{\"lifetime_percentage\":80},\"action\":{\"action_type\":\"EmailContacts\"}}],\"issuer\":{\"name\":\"Unknown\"},\"attributes\":{\"enabled\":true,\"created\":1520464606,\"updated\":1520464606}}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedcertificates/listCertificate0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:59:08 GMT", + "date" : "Wed, 07 Mar 2018 23:18:46 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -793,8 +689,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9e5fc4cb-c218-42ba-a36b-1fc984af960a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "74ead0e1-8e48-42aa-9208-d08c086abd78", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/listKeyVersionsForKeyOperationsTest.json b/azure-keyvault/target/test-classes/session-records/listKeyVersionsForKeyOperationsTest.json index ab7a872..27a3e8c 100644 --- a/azure-keyvault/target/test-classes/session-records/listKeyVersionsForKeyOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/listKeyVersionsForKeyOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:45 GMT", + "date" : "Thu, 08 Mar 2018 20:08:33 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8a16b4ee-96fb-4da9-8fdb-fb0d37d87203", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fe463c99-c912-4c97-a37e-a287c2eec220", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:46 GMT", + "date" : "Thu, 08 Mar 2018 20:08:33 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "61fd2132-cfa3-4b7d-bb11-ba27c5bb81b6", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/c6b65254feb64d65842a4a0665c089b1\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"xJ6Xpr1R3UnyA7vAYcoSMzV6CEGdMfXXCdmG1TOmw43gccwENcEzKcnGvP6jshYkkXeECAkYNu5m-taFOGVTBaTQWm1uQukKPYBI6ecH8PSRj3dvFxiJnJ9zBpRRH4m5IrbswcesO4Zaql_SjDY7wgJIBSftrBoIczeGuvCSw0T8jz14lK2Jf9J6CZsYe-uGnIE8rXREErS2s9V3aHiSGNvkdseca1SjkHj_2_vDs0WqbLacpfswNo6RhY3QgQtoXSARPr3BUGGwkJsrLDkeJ687rSs3TDHys4qSisMi0w6IVM-2hONNDahRQWfVv7aYnqo7LRSZ6x5UOEBA0KW7qQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230546,\"updated\":1511230546,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "eb7634f7-eed1-4f5f-aade-af6d2a025ba5", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/5bf4a43fd7d94d2a8a97d2c11695dcae\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"wjQJbULVokLcKG7vC7rgvbYIrlTmwThO4srMf7Y5s5f5Qwo6ICXL7JJyFYY_FkCG81F01yZixoOH58OLTn_BIwVwPUmO2d9OP_YEVqu7zbfMiJJrAVMOU0NOAzSoiiyioVPe7Zvc--sD45Wye-TGHRRe6Ns7Sxg4ySv1d3rhfLT0Uue5-HZzX8f91noqADcXcK7symK0lu0_N5T-Tz2qm0jxyuZajNOQmqGnSFSjXP0pv2oobbe9MOsn4YTDUiT18N16Am4JTp7wtuGPcyIyr3vDCpajm6pymZ3ZT3DnR9EnnMYe77RW5TOwLgxTXmLkdJXhIh1L_QLQ8XfcVxWBUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539714,\"updated\":1520539714,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:46 GMT", + "date" : "Thu, 08 Mar 2018 20:08:34 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b5e1b880-702e-47e7-bab0-7df55159e902", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/6b7abc15b3c44bf3bff34d68e960e7da\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1mymGaoOIoubM9oC4i3-uZbNwiPdkbEae_8IpMuGRsvn2FQ1rUMZh3QAQp56JcMvOL3JeqBLHIRtNQh0sFyp2FZY7zo5O0iw4RB4mkqazUk58xj0A7--uqLsreaCZW1WatsYKv8t90j0LyQISDwkJg6Cj9_i1uNYM9ogwHMYoJMonzW27y1TMAj9qSEJjx6OGDNRZXsEaMINCIClxocezx2BGMhmZdnTm6LcFjOXNR_KQRLfnTAkXDGCEPIDveAqXp1aNblS-sjBuoORNOkkmf646oPfqcFedybjRzHOhok2RdTkV-JqNQTZarXGpnq3zE0MQgTldsTmf9yGT-NLpQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "cfc01d4c-5c7f-42e6-89f4-1c4b3bbb19d8", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/1df63c4693704233a6d0e1010ca3cea8\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"zNW4_zdHmXyUfJSGHmhJ0zWc_bL22S3Ek2P4ybJ5DpYtSJ-pC_3rtq-QCsQV1EuxeTk-ltHG-qJWYXP3NYIBXYgoGI6sh4uDFvTvCJ8k66Xbbm00UmkpAsagvqpKQ_YCIVQYskxZcr8HxKO5WKm2ReJ-c4tIt8F5P2kBqQZ21MSkoMAQ9HmF5BlYgJrMXspjxo-8ALvIm_jJkX4liZBBmTdTumpEenwPgxNCgkUaNH4lFjTGqvcE1ETuFQsVlW84P_aBn7DQ8npyE1MWfdZ7t-IjnnN7uGk2jj0iiYhvQLnIby0reWMzsf6wAxKRZaSZ495iO_aHQqMcGCV2mt3FJQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539714,\"updated\":1520539714,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:47 GMT", + "date" : "Thu, 08 Mar 2018 20:08:34 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "850a1b73-f3cd-44cf-96df-8d027cbf048e", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/573c29c1320946d7b2a5a34918b2d64b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tV20bbN5c3PtXTtC2U436oD_riyNguCdcHToOhsXUPO4hJd_XI6tIM860Vv5V2kH9AMdAGHCycYZaPgpCYw7p1klekP1uVWWQX8X0PKTo3a0ZmBCu2aU4xTvilgoUWY3TbVjL5F6XXqwrRz3868t1uPiFHmqg3ckTlT_gtoCg9PhbsUbWQPIDevHxiGS_qdoyuzmFxOcL-Zw37ozZZCESpZlHNsprzxjzZPJ7Ym7VzSPueeZOkshnkPjY4o9ZpJfrmFbnN7heYcCSrBcqo-kfX1EQyForaswMaZK8wReBhRLKhI1TVfykAC7t_8DtVHZd0V-bjmwhqwTAOZZ6OavfQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "3aefab4d-b011-4fcc-80ba-08f8507dbec9", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/6938d1b4ac364ff59aee999b643bcc03\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tyhFBa1mtcsiB1b9j4KypYsQ5pLuxm3k6aSxT4SB3pSbv-BGdGXZDi1DawSs6Uhp5NaJ4adcSg536tyE8oIgH2qOsD9XPEY1f9Wo2bytT5NwZE6LX_r66ZcrPJC07fXRYTPi55rFkFHsbrfATwItFtVBC2cmo8wN1-aTj0N9vHYR__FqSRVbSI_9YrnhHSpw08ulOZrx0lRH9wgEc5ZOhpWi3EXMHq7U_jqPiWzuZVFXbD_N5hjIkbYjshNiIr9qRevsYPI9PCa6lP_9NUUvT_iywsCD4PFaPAGCF19kIvrwSfsPAdpyM9GW3X2YrQy2D3UtWV_G9P6zSLifFLvG_w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539715,\"updated\":1520539715,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:47 GMT", + "date" : "Thu, 08 Mar 2018 20:08:34 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,20 +125,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cf636828-bc8c-445b-89bd-30d1252149ee", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/7ca15108523243aaab76a194d7b15371\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pMlrJ0ZRO4K7K22zZwiihcV1c8wexl5tuXwpyGuBShrHoAc5-erUt_Y6BARm4OfGycBuguXfMeGZAC5r0tpbKFks1pmSbOweOYwyNL25AzfXmz185kVuZCiFkVk_csLxlqS5spoljQeln05oR1UlWl4s3IGh8SdnvHBR92G1uJ_D9ZVUTEKZ5Qjsr7ttEcY4mjMteoCrkITVvUwyy9wCpp17dkQ27xAhHM0L_Pi46RGDp4R0DQSgwDBcVRG50IqT0Utk09W88cVgdwUXYw6zLLIzzkgbaiY5e4dkR8KLQOUZNFT2openGa3ZFl6cGSFCGqLLXNL5OYs_X0xc1vZKFw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "48a0754e-84a7-42cc-988c-a8a9c9539ded", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/615d8b7870ed4557951dc5436092fc53\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"xyXiGP_KuZiLfDxcM-jJ_DJ2jhLWYRhn7qVAQ96jk_MV8bWKAUrLMOve25Y81oStiCExSJZTuV8HZ3sgIt-6_rHyZEvDA_mTGaBDQ19NvFvcSqicejUx6UTdPQwkmcfaddWc8_N0wW6zygMYvtce6a9T8_dVfFnFZWq-5dRW39YO301Y4P3J1NKULDegTH3E-OUfXxaASSS0FCTG4-kRKDF2lNEGhgaIOVsuuhdJV8KtVUIim4yyabEEeEuZZXTjQsejgttmn1YfSsfC_nQCtsFB5jUnHGGYVjMwE1ig7ihpAMCkr8Wnfg4r9HfNvVFMhDJ4wqzH2aCpyAE5THNOGQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539715,\"updated\":1520539715,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/versions?maxresults=4&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/versions?maxresults=4&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:47 GMT", - "content-length" : "1221", + "date" : "Thu, 08 Mar 2018 20:08:35 GMT", + "content-length" : "1222", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "75819cfa-a10d-4c95-8501-23a7b2e5e093", - "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/573c29c1320946d7b2a5a34918b2d64b\",\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/6b7abc15b3c44bf3bff34d68e960e7da\",\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/7ca15108523243aaab76a194d7b15371\",\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/c6b65254feb64d65842a4a0665c089b1\",\"attributes\":{\"enabled\":true,\"created\":1511230546,\"updated\":1511230546,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys/javaKey/versions?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMjAhTURBd01EUTBJV3RsZVM5S1FWWkJTMFZaTDBReE1qSkNNMFJFTmtReE5qUTNSa1pDUTBORlJFRXpRVGswTUVFNFFUQTJJVEF3TURBeU9DRXlNREUzTFRFeExURTFWREF3T2pNMU9qUXdMakEyTlRjNU1EUmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=4\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "23379f6b-4cb2-470e-9ab7-e4045620f28d", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/1df63c4693704233a6d0e1010ca3cea8\",\"attributes\":{\"enabled\":true,\"created\":1520539714,\"updated\":1520539714,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/5bf4a43fd7d94d2a8a97d2c11695dcae\",\"attributes\":{\"enabled\":true,\"created\":1520539714,\"updated\":1520539714,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/615d8b7870ed4557951dc5436092fc53\",\"attributes\":{\"enabled\":true,\"created\":1520539715,\"updated\":1520539715,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/6938d1b4ac364ff59aee999b643bcc03\",\"attributes\":{\"enabled\":true,\"created\":1520539715,\"updated\":1520539715,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys/javaKey/versions?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMjAhTURBd01EUTBJV3RsZVM5S1FWWkJTMFZaTHpjMk9FTkJOVGd3TmpZek5UUkVPVFE0UkRFeU4wWTFNa0pDT0VaR01qRTNJVEF3TURBeU9DRXlNREU0TFRBekxUQTRWREU0T2pFMk9qVTFMalkzTVRVeE9UQmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=4\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/versions?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMjAhTURBd01EUTBJV3RsZVM5S1FWWkJTMFZaTDBReE1qSkNNMFJFTmtReE5qUTNSa1pDUTBORlJFRXpRVGswTUVFNFFUQTJJVEF3TURBeU9DRXlNREUzTFRFeExURTFWREF3T2pNMU9qUXdMakEyTlRjNU1EUmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=4", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/versions?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMjAhTURBd01EUTBJV3RsZVM5S1FWWkJTMFZaTHpjMk9FTkJOVGd3TmpZek5UUkVPVFE0UkRFeU4wWTFNa0pDT0VaR01qRTNJVEF3TURBeU9DRXlNREU0TFRBekxUQTRWREU0T2pFMk9qVTFMalkzTVRVeE9UQmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=4", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:47 GMT", + "date" : "Thu, 08 Mar 2018 20:08:35 GMT", "content-length" : "242", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -177,19 +177,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "fb6096d4-f929-4c5c-a2ed-f7dfbe7a1a91", - "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/fd6d55d4017646769aa79f917439c42e\",\"attributes\":{\"enabled\":true,\"created\":1511230544,\"updated\":1511230544,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "af608440-5a57-4fc0-a903-ac2e6b71206f", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/accc35ea21684e41b0c564a035615268\",\"attributes\":{\"enabled\":true,\"created\":1520539712,\"updated\":1520539712,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/versions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/versions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:48 GMT", + "date" : "Thu, 08 Mar 2018 20:08:35 GMT", "content-length" : "1102", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -203,19 +203,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "aa1dbcd4-7bf3-4f92-9304-2d19ae926f59", - "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/573c29c1320946d7b2a5a34918b2d64b\",\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/6b7abc15b3c44bf3bff34d68e960e7da\",\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/7ca15108523243aaab76a194d7b15371\",\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/c6b65254feb64d65842a4a0665c089b1\",\"attributes\":{\"enabled\":true,\"created\":1511230546,\"updated\":1511230546,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/fd6d55d4017646769aa79f917439c42e\",\"attributes\":{\"enabled\":true,\"created\":1511230544,\"updated\":1511230544,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e9c1d2c2-2280-47a3-9dd5-c17854d3e13d", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/1df63c4693704233a6d0e1010ca3cea8\",\"attributes\":{\"enabled\":true,\"created\":1520539714,\"updated\":1520539714,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/5bf4a43fd7d94d2a8a97d2c11695dcae\",\"attributes\":{\"enabled\":true,\"created\":1520539714,\"updated\":1520539714,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/615d8b7870ed4557951dc5436092fc53\",\"attributes\":{\"enabled\":true,\"created\":1520539715,\"updated\":1520539715,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/6938d1b4ac364ff59aee999b643bcc03\",\"attributes\":{\"enabled\":true,\"created\":1520539715,\"updated\":1520539715,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/accc35ea21684e41b0c564a035615268\",\"attributes\":{\"enabled\":true,\"created\":1520539712,\"updated\":1520539712,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:48 GMT", + "date" : "Thu, 08 Mar 2018 20:08:35 GMT", "content-length" : "803", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -229,19 +229,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9cb14de3-e9e4-4ecc-93cd-0e7733a00a4c", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1511230548,\"scheduledPurgeDate\":1519006548,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/7ca15108523243aaab76a194d7b15371\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pMlrJ0ZRO4K7K22zZwiihcV1c8wexl5tuXwpyGuBShrHoAc5-erUt_Y6BARm4OfGycBuguXfMeGZAC5r0tpbKFks1pmSbOweOYwyNL25AzfXmz185kVuZCiFkVk_csLxlqS5spoljQeln05oR1UlWl4s3IGh8SdnvHBR92G1uJ_D9ZVUTEKZ5Qjsr7ttEcY4mjMteoCrkITVvUwyy9wCpp17dkQ27xAhHM0L_Pi46RGDp4R0DQSgwDBcVRG50IqT0Utk09W88cVgdwUXYw6zLLIzzkgbaiY5e4dkR8KLQOUZNFT2openGa3ZFl6cGSFCGqLLXNL5OYs_X0xc1vZKFw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "53ca8e77-5b98-4769-9027-cb4759740110", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1520539716,\"scheduledPurgeDate\":1528315716,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/615d8b7870ed4557951dc5436092fc53\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"xyXiGP_KuZiLfDxcM-jJ_DJ2jhLWYRhn7qVAQ96jk_MV8bWKAUrLMOve25Y81oStiCExSJZTuV8HZ3sgIt-6_rHyZEvDA_mTGaBDQ19NvFvcSqicejUx6UTdPQwkmcfaddWc8_N0wW6zygMYvtce6a9T8_dVfFnFZWq-5dRW39YO301Y4P3J1NKULDegTH3E-OUfXxaASSS0FCTG4-kRKDF2lNEGhgaIOVsuuhdJV8KtVUIim4yyabEEeEuZZXTjQsejgttmn1YfSsfC_nQCtsFB5jUnHGGYVjMwE1ig7ihpAMCkr8Wnfg4r9HfNvVFMhDJ4wqzH2aCpyAE5THNOGQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539715,\"updated\":1520539715,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:49 GMT", + "date" : "Thu, 08 Mar 2018 20:08:36 GMT", "content-length" : "75", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -255,45 +255,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e68409d8-c116-42d3-ac11-1d566c7767e6", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7b94b07c-eac3-4862-bdff-e54b491b87fd", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:59 GMT", - "content-length" : "75", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5b5a3053-b42e-4029-8e03-ddd3a8531ab8", - "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:10 GMT", + "date" : "Thu, 08 Mar 2018 20:08:47 GMT", "content-length" : "803", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -307,19 +281,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8cba0796-1ef0-4f5f-a941-b9f09eb9392b", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1511230548,\"scheduledPurgeDate\":1519006548,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/7ca15108523243aaab76a194d7b15371\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"pMlrJ0ZRO4K7K22zZwiihcV1c8wexl5tuXwpyGuBShrHoAc5-erUt_Y6BARm4OfGycBuguXfMeGZAC5r0tpbKFks1pmSbOweOYwyNL25AzfXmz185kVuZCiFkVk_csLxlqS5spoljQeln05oR1UlWl4s3IGh8SdnvHBR92G1uJ_D9ZVUTEKZ5Qjsr7ttEcY4mjMteoCrkITVvUwyy9wCpp17dkQ27xAhHM0L_Pi46RGDp4R0DQSgwDBcVRG50IqT0Utk09W88cVgdwUXYw6zLLIzzkgbaiY5e4dkR8KLQOUZNFT2openGa3ZFl6cGSFCGqLLXNL5OYs_X0xc1vZKFw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230547,\"updated\":1511230547,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9e542a7d-a676-44eb-b2af-142a74f1d99b", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1520539716,\"scheduledPurgeDate\":1528315716,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/615d8b7870ed4557951dc5436092fc53\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"xyXiGP_KuZiLfDxcM-jJ_DJ2jhLWYRhn7qVAQ96jk_MV8bWKAUrLMOve25Y81oStiCExSJZTuV8HZ3sgIt-6_rHyZEvDA_mTGaBDQ19NvFvcSqicejUx6UTdPQwkmcfaddWc8_N0wW6zygMYvtce6a9T8_dVfFnFZWq-5dRW39YO301Y4P3J1NKULDegTH3E-OUfXxaASSS0FCTG4-kRKDF2lNEGhgaIOVsuuhdJV8KtVUIim4yyabEEeEuZZXTjQsejgttmn1YfSsfC_nQCtsFB5jUnHGGYVjMwE1ig7ihpAMCkr8Wnfg4r9HfNvVFMhDJ4wqzH2aCpyAE5THNOGQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539715,\"updated\":1520539715,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:16:10 GMT", + "date" : "Thu, 08 Mar 2018 20:08:47 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -331,8 +305,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "16376492-c2c9-44e1-9ee6-890ec25da676", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ca2f2d03-e623-469d-ac7a-51a01dab7680", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/listKeysForKeyOperationsTest.json b/azure-keyvault/target/test-classes/session-records/listKeysForKeyOperationsTest.json index 8d1d201..60f04fa 100644 --- a/azure-keyvault/target/test-classes/session-records/listKeysForKeyOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/listKeysForKeyOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:09 GMT", + "date" : "Thu, 08 Mar 2018 20:03:30 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "734b852b-3c74-477b-863a-7f228407e3a6", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0a001efe-79fe-4349-a9b5-dcc6fd81704c", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:09 GMT", + "date" : "Thu, 08 Mar 2018 20:03:30 GMT", "content-length" : "665", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f110e183-d706-4a12-9c61-344677e212ae", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/4c8befc28e73434bbed1d8bead1d4de8\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tHNBnpHGpkJIkxDRHmhvrgkMCzZc7FKqUTWZ2FJMlj3tw8XuaOIi60jJzz0buX94WDdP19KiJOHUM-jbxAYFbkJKhlRRq58p1PQO7sF_NtW0UmPeAhUWyLqvqvv7vYvbHK8j75Uvncg4SOqDlNOAb_q4xRmsgBkhKpYzOqVqICqDIMuUYveOBtWD5E73YgrATfII2RWYx_3zfJYrEw4ghvF7z_3IqA2Ucz47qw14vtkl9vC-AvwL763NQOzQGuGuCXk4pLNWd7XKQeTB301qye7A6IkQOZOK_Lo56ZH7KW7en0cvJ4huBphUo1uB5QSbac5t9-VED45zDT8tqlh52Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "cf7dea2c-381c-47dc-9676-349012ef858a", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/8ff45eeb5b724c5ba7829e3961649b92\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"uwZTLp2MkPH4Sn1FlHolkrbjR5ufM7yqggYKBdsTSqDoDZjyjdUj4ed_8k64q8X9aEgVi-94pXMuJ4XNWAfcKvsqONNsIBkhP2uhQOuk1CLovVbZ153jAM5Ab1ENwXgNZxr_aSJoFjatjK2Xibgb9BHUI2r_NAq1YJMZFQdi8e1LpISCp_I9kujN0Eh0VfPxAuNrPXOLV1mqm7MiNa1M1uL_UuZ5zEA9zjuuuT1i7tCG42rZmVUoLkGeJyBTPGmuCwlxj4p5SxBQheC-MIGOkQ6ynwTI5QezIXsLckCGyBt-RKkzI3o9smGD0ZmLWQzuj0buOcpPK_JNSMOJQRRnsw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539410,\"updated\":1520539410,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:09 GMT", + "date" : "Thu, 08 Mar 2018 20:03:30 GMT", "content-length" : "665", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5ff6aad3-f136-45c1-8e8d-784c157128d6", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1/79492c1d171b4be485f418cb92d79c40\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"qk_RCKPT1b4b6ALRQcbHoP-v78RG5tbHn3oQDL21hedOvCR3YVg2Fkv4uy4_UjsBCbOGM6EmR0TDJXSi0_Jj8k_k7KswkCjFaC3z7Ncz3YTjezEAFMH7b4onf6K4DfEixJpc9KFyI5DBUMkwoufVV37vYxdNEA8AHH2SUh9vSy3wGN7J5YY0X9U6Ha4IRGGEmKM-hZrYFBKEhewscUS0AxwsqPS9GfCiX1cTv9my1YdqyrxBzeLOW5ywGtQVTrphBhMS6oToHPLDIh-O_k-ZqrW7YigzHaMolT-4K2QDQq7DH6GUh7Yqv8iYt2rOymSNkqoZ-HiMdwmzE1dBRralBQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "922d7a0a-c21e-4201-98a3-282b20fbcaca", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1/77bf62c6fe364bb1b17865306fc6343b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"jwjr_29snJXJl_rv1FTBklzTzQbGMbb4IgbuVlQwG2J7BBuoa_7qwHmI2d9-avdkE3yYSBXUmGdfvEKXDSPi-JbLNfYChravw4BpBWS3DlFp6QWGx4XPL7ArasoqOBdx15De2ucRAboufNq6t4cJ9ZFypLjOzWG6EKHDNqYNYq3Htacw97mZO5U3nez0aylcXwqSIR42nIBVEDebRPP5S8xpOp1QDCeVDSdxwnH_S_iv6Z7eF9Ub_58mUU0SZlE4bWCu3LJBHQWly9Gsy_0ASKwcSSNE9jxDKS2BJyWnonXfawzDealBJEUoAWGSKKw4OhYtELxJiNv-9HRon_56lQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:10 GMT", + "date" : "Thu, 08 Mar 2018 20:03:31 GMT", "content-length" : "665", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "da5efa98-562a-4c00-bae3-9c4c52ba4073", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2/6cf77aafb25849968e87790cc68394cc\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1h5Y5fsqsImOPXQWd_-B3EvbvZgNx0cFAMUao8ejDJx4KFUn5LVr4lzI32orYd06xh8tnXz4D6bTvZV2I3E6da1DYO1MsddXHBkWa1nb0qeBWDDvIS1sOAFFgmWkAh1ev9O7UIh3_m5kyGwNs4NGRhLvTDhWulQAChAY5NNxse_nsZZxX481T0g1bI2Q1_8a4nZHRpbZPanX7kVrYeOQ1vxNzFQU8heEz_Gjw3W4DGT9nNGdsXppcbM-z_Ov7_G0yIeHGPT-h-c6luCPoLq54Bp-CvzSmMBohQD_4iEz-WIqkphVtx8uIHUFyhgvR7HR1LrkyWYO4r8CKztZ1nRwUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "78510071-9961-48ee-a205-ba6536b1a413", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2/e7115054531641c8bfc681bb64d541fb\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tVUGo1OWaGDYvRbPMmfcg2xYEF_QcI7KXUnjKbK0tQjDh6IV634DAclf5d9vZwtskM-a0Ea8NSBcbTzXSnfBx9AKtLTTEgevNwBOtSXmAOByB4i1r6ojGjI27BiYmt1lXcqo3IjfILHlArixlnCsb4-Sdptd4ZJn8n_EMYj9JTxvtG6B2S7dmoN2bmvNQewgmq6TPKPUxjWJxE98MNBnDX5Q1Zan02emnEku4HBmRCgijsdqfVzvrC8u6yHbrMYpIWIxSicKLj4N_gZu4eXpmXogCCNrwpJVGZVqwhUaKJm2NwuQhrmEPolP2FV7_J8FgtbLVylJiWcbV6pebfAgCQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:11 GMT", + "date" : "Thu, 08 Mar 2018 20:03:31 GMT", "content-length" : "665", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,20 +125,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9715d96e-ec69-4843-8d53-05489484ae20", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3/0ce56f168c3846348c2cd927fcd69f2f\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"xiF5Q6baZJppEymYRVrQuDy6AEAjb8RPUSwlcx31EbOGyg_nkmYCaJNoPe_8ONAKJbsI9ESewOdabb8peyRiqSkQmzFBAbCLa7QAnVqmzGVs7X1jZXFjkaGSs7cgZc1WKQyB4xI7A7Gqfbvto9WoaSF3aoDk22lalMiQklI5tST1IAwDNPP22bg1ude_nupzlMzpyFi9H-Yksz2iUACz6O8fCdp3AkSFzI4Vs1-QwZC07Dzluc6ceuSvVMmMDqbzQaMh1Jfsb2QG_AXT_wndSEmRKbwMCNjU51GLRHp6wM0i1Fevxky7OGIwM-PghbAf_-3CLj_j3pRKCBNDvrxnew\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "85a54331-de7e-4187-8b39-9ca139b1b87c", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3/a6cd265ac5a5419ea54f95f1785dead9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"4NrxdkWWoqinWpYcymvzfAtR6kQE_EtI4MxnHMLZH2R-o9xRey_rB2BuBLm01C40PKm7hKVB_yUHwGnw-pnFTGZO0YmeItBjhBfysynYV3Tn-dqMGpVXu1KtKMaxQTXbU8TW0Tr_5C_Gfm6QOc5aN3FNUCPLTS07CWGohpV4KYHW4K3YXfVav3W4plaGbSZVDBd-bnPyPmF6XL8qon_pd-vJo4-GQ3weIUT3tHUz6KLd5Dobda7PXZ5mc-9vNspP4wxNvBdhD9ZQoko3K8Yk9fUTf6ykiMm6kn72jZvylnBCxB_Z5-bgPYD2VrMh9fPM5neDKccM6y7Xtvhx_Zcetw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539412,\"updated\":1520539412,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?maxresults=3&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?maxresults=3&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:11 GMT", - "content-length" : "301", + "date" : "Thu, 08 Mar 2018 20:03:31 GMT", + "content-length" : "302", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -151,20 +151,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "0d57afcc-cb88-40e3-85b6-746c3020ebc8", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElXdGxlUzlEVWtWQlZFVlVSVk5VU2tGV1FWQkZUU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "1e1e69e0-7691-48e1-b361-328ba2ccc978", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElXdGxlUzlEVWtWQlZFVlVSVk5VU2tGV1FWQkZUU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElXdGxlUzlEVWtWQlZFVlVSVk5VU2tGV1FWQkZUU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElXdGxlUzlEVWtWQlZFVlVSVk5VU2tGV1FWQkZUU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:11 GMT", - "content-length" : "285", + "date" : "Thu, 08 Mar 2018 20:03:32 GMT", + "content-length" : "286", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -177,20 +177,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "0cddbd1a-7329-46f0-8568-31b236671b9c", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeElXdGxlUzlLUVZaQlMwVlpJVEF3TURBeU9DRXlNREUzTFRFeExURTBWREl6T2pFd09qVXpMalExTlRJNE5UQmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "23b1d395-4038-406c-a5e3-f2954d4520fb", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeElXdGxlUzlLUVZaQlMwVlpJVEF3TURBeU9DRXlNREU0TFRBekxUQTRWREU0T2pBNU9qVXlMakE0T0RFMU56bGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeElXdGxlUzlLUVZaQlMwVlpJVEF3TURBeU9DRXlNREUzTFRFeExURTBWREl6T2pFd09qVXpMalExTlRJNE5UQmFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeElXdGxlUzlLUVZaQlMwVlpJVEF3TURBeU9DRXlNREU0TFRBekxUQTRWREU0T2pBNU9qVXlMakE0T0RFMU56bGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:11 GMT", - "content-length" : "832", + "date" : "Thu, 08 Mar 2018 20:03:32 GMT", + "content-length" : "833", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -203,20 +203,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "25fb495d-9ead-4bd5-9505-10b74ce98f3f", - "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey\",\"attributes\":{\"enabled\":true,\"created\":1511230208,\"updated\":1511230208,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0\",\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1\",\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeUlXdGxlUzlLUVZaQlMwVlpNaUV3TURBd01qZ2hNakF4TnkweE1TMHhORlF5TXpveE1Ub3dNaTQzTVRVeE5qazJXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7f598596-9261-47f3-bbcd-babff53b5909", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey\",\"attributes\":{\"enabled\":true,\"created\":1520539409,\"updated\":1520539409,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0\",\"attributes\":{\"enabled\":true,\"created\":1520539410,\"updated\":1520539410,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1\",\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeUlXdGxlUzlLUVZaQlMwVlpNaUV3TURBd01qZ2hNakF4T0Mwd015MHdPRlF4T0RveE1Ub3pNUzR3TnpZME1qQTBXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeUlXdGxlUzlLUVZaQlMwVlpNaUV3TURBd01qZ2hNakF4TnkweE1TMHhORlF5TXpveE1Ub3dNaTQzTVRVeE5qazJXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3NiFNREF3TURFeUlXdGxlUzlLUVZaQlMwVlpNaUV3TURBd01qZ2hNakF4T0Mwd015MHdPRlF4T0RveE1Ub3pNUzR3TnpZME1qQTBXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:13 GMT", - "content-length" : "666", + "date" : "Thu, 08 Mar 2018 20:03:32 GMT", + "content-length" : "667", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -229,20 +229,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "eeba6ccb-c2f2-4a48-9f0e-9efa97365c2e", - "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2\",\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3\",\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXhJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "35d65881-9cf8-4886-acbc-7d524b555af1", + "Body" : "{\"value\":[{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2\",\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3\",\"attributes\":{\"enabled\":true,\"created\":1520539412,\"updated\":1520539412,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXhJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXhJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVXhJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:13 GMT", - "content-length" : "312", + "date" : "Thu, 08 Mar 2018 20:03:33 GMT", + "content-length" : "313", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -255,20 +255,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5d505ef9-e32b-4e13-85dc-e3be962f6411", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5NiFNREF3TURJM0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVldSVkpUU1U5T1V5RXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "3da3112b-e51c-4e10-9e0e-57f747309f17", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5NiFNREF3TURJM0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVldSVkpUU1U5T1V5RXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5NiFNREF3TURJM0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVldSVkpUU1U5T1V5RXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5NiFNREF3TURJM0lXdGxlUzlNU1ZOVVEwVlNWRWxHU1VOQlZFVldSVkpUU1U5T1V5RXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:14 GMT", - "content-length" : "296", + "date" : "Thu, 08 Mar 2018 20:03:33 GMT", + "content-length" : "297", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -281,19 +281,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e393cd89-1cba-4393-a95c-cd9082747d04", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFNElXdGxlUzlWVUVSQlZFVkRSVkpVU2tGV1FTRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "986a0781-3814-4f35-9b38-356e35fd4260", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFNElXdGxlUzlWVUVSQlZFVkRSVkpVU2tGV1FTRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFNElXdGxlUzlWVUVSQlZFVkRSVkpVU2tGV1FTRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFNElXdGxlUzlWVUVSQlZFVkRSVkpVU2tGV1FTRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:14 GMT", + "date" : "Thu, 08 Mar 2018 20:03:33 GMT", "content-length" : "28", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -307,19 +307,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a6baad8f-4606-49e3-ac04-f346c9a52dd4", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5dd9b663-1127-4e9c-9a9d-1a38d51fdec6", "Body" : "{\"value\":[],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:14 GMT", + "date" : "Thu, 08 Mar 2018 20:03:33 GMT", "content-length" : "805", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -333,19 +333,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2f4fadb9-7b22-439f-a426-f01c29340402", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3\",\"deletedDate\":1511230214,\"scheduledPurgeDate\":1519006214,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3/0ce56f168c3846348c2cd927fcd69f2f\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"xiF5Q6baZJppEymYRVrQuDy6AEAjb8RPUSwlcx31EbOGyg_nkmYCaJNoPe_8ONAKJbsI9ESewOdabb8peyRiqSkQmzFBAbCLa7QAnVqmzGVs7X1jZXFjkaGSs7cgZc1WKQyB4xI7A7Gqfbvto9WoaSF3aoDk22lalMiQklI5tST1IAwDNPP22bg1ude_nupzlMzpyFi9H-Yksz2iUACz6O8fCdp3AkSFzI4Vs1-QwZC07Dzluc6ceuSvVMmMDqbzQaMh1Jfsb2QG_AXT_wndSEmRKbwMCNjU51GLRHp6wM0i1Fevxky7OGIwM-PghbAf_-3CLj_j3pRKCBNDvrxnew\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ba58ba03-075f-4e2d-90df-9c5a947b7156", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3\",\"deletedDate\":1520539414,\"scheduledPurgeDate\":1528315414,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3/a6cd265ac5a5419ea54f95f1785dead9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"4NrxdkWWoqinWpYcymvzfAtR6kQE_EtI4MxnHMLZH2R-o9xRey_rB2BuBLm01C40PKm7hKVB_yUHwGnw-pnFTGZO0YmeItBjhBfysynYV3Tn-dqMGpVXu1KtKMaxQTXbU8TW0Tr_5C_Gfm6QOc5aN3FNUCPLTS07CWGohpV4KYHW4K3YXfVav3W4plaGbSZVDBd-bnPyPmF6XL8qon_pd-vJo4-GQ3weIUT3tHUz6KLd5Dobda7PXZ5mc-9vNspP4wxNvBdhD9ZQoko3K8Yk9fUTf6ykiMm6kn72jZvylnBCxB_Z5-bgPYD2VrMh9fPM5neDKccM6y7Xtvhx_Zcetw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539412,\"updated\":1520539412,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:15 GMT", + "date" : "Thu, 08 Mar 2018 20:03:34 GMT", "content-length" : "76", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -359,45 +359,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2bd2a0b5-a3ab-4d4e-ac1d-9cf4606a0f0c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e1148392-1458-401b-a1e5-0881bdf6ca11", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey3\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:25 GMT", - "content-length" : "76", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "71689ceb-a12a-426b-8ec7-c36c7c072eb4", - "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey3\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:35 GMT", + "date" : "Thu, 08 Mar 2018 20:03:44 GMT", "content-length" : "805", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -411,19 +385,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4c349265-8884-4991-87a0-d8a5ea6430ac", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3\",\"deletedDate\":1511230214,\"scheduledPurgeDate\":1519006214,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3/0ce56f168c3846348c2cd927fcd69f2f\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"xiF5Q6baZJppEymYRVrQuDy6AEAjb8RPUSwlcx31EbOGyg_nkmYCaJNoPe_8ONAKJbsI9ESewOdabb8peyRiqSkQmzFBAbCLa7QAnVqmzGVs7X1jZXFjkaGSs7cgZc1WKQyB4xI7A7Gqfbvto9WoaSF3aoDk22lalMiQklI5tST1IAwDNPP22bg1ude_nupzlMzpyFi9H-Yksz2iUACz6O8fCdp3AkSFzI4Vs1-QwZC07Dzluc6ceuSvVMmMDqbzQaMh1Jfsb2QG_AXT_wndSEmRKbwMCNjU51GLRHp6wM0i1Fevxky7OGIwM-PghbAf_-3CLj_j3pRKCBNDvrxnew\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "30910674-685c-440b-86db-efaac9e343cf", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3\",\"deletedDate\":1520539414,\"scheduledPurgeDate\":1528315414,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3/a6cd265ac5a5419ea54f95f1785dead9\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"4NrxdkWWoqinWpYcymvzfAtR6kQE_EtI4MxnHMLZH2R-o9xRey_rB2BuBLm01C40PKm7hKVB_yUHwGnw-pnFTGZO0YmeItBjhBfysynYV3Tn-dqMGpVXu1KtKMaxQTXbU8TW0Tr_5C_Gfm6QOc5aN3FNUCPLTS07CWGohpV4KYHW4K3YXfVav3W4plaGbSZVDBd-bnPyPmF6XL8qon_pd-vJo4-GQ3weIUT3tHUz6KLd5Dobda7PXZ5mc-9vNspP4wxNvBdhD9ZQoko3K8Yk9fUTf6ykiMm6kn72jZvylnBCxB_Z5-bgPYD2VrMh9fPM5neDKccM6y7Xtvhx_Zcetw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539412,\"updated\":1520539412,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:35 GMT", + "date" : "Thu, 08 Mar 2018 20:03:45 GMT", "content-length" : "805", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -437,19 +411,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bbb0cd4f-c9b7-46c6-b9d1-ef704c7fbc56", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2\",\"deletedDate\":1511230235,\"scheduledPurgeDate\":1519006235,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2/6cf77aafb25849968e87790cc68394cc\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1h5Y5fsqsImOPXQWd_-B3EvbvZgNx0cFAMUao8ejDJx4KFUn5LVr4lzI32orYd06xh8tnXz4D6bTvZV2I3E6da1DYO1MsddXHBkWa1nb0qeBWDDvIS1sOAFFgmWkAh1ev9O7UIh3_m5kyGwNs4NGRhLvTDhWulQAChAY5NNxse_nsZZxX481T0g1bI2Q1_8a4nZHRpbZPanX7kVrYeOQ1vxNzFQU8heEz_Gjw3W4DGT9nNGdsXppcbM-z_Ov7_G0yIeHGPT-h-c6luCPoLq54Bp-CvzSmMBohQD_4iEz-WIqkphVtx8uIHUFyhgvR7HR1LrkyWYO4r8CKztZ1nRwUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "1f8dbaa8-becd-458b-be54-0ca3aed83e0c", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2\",\"deletedDate\":1520539425,\"scheduledPurgeDate\":1528315425,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2/e7115054531641c8bfc681bb64d541fb\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tVUGo1OWaGDYvRbPMmfcg2xYEF_QcI7KXUnjKbK0tQjDh6IV634DAclf5d9vZwtskM-a0Ea8NSBcbTzXSnfBx9AKtLTTEgevNwBOtSXmAOByB4i1r6ojGjI27BiYmt1lXcqo3IjfILHlArixlnCsb4-Sdptd4ZJn8n_EMYj9JTxvtG6B2S7dmoN2bmvNQewgmq6TPKPUxjWJxE98MNBnDX5Q1Zan02emnEku4HBmRCgijsdqfVzvrC8u6yHbrMYpIWIxSicKLj4N_gZu4eXpmXogCCNrwpJVGZVqwhUaKJm2NwuQhrmEPolP2FV7_J8FgtbLVylJiWcbV6pebfAgCQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:35 GMT", + "date" : "Thu, 08 Mar 2018 20:03:45 GMT", "content-length" : "76", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -463,19 +437,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "137318ca-2c23-450a-9f47-fef9b127d177", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "059f4101-9402-40da-9ad4-ff0df92104a4", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey2\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:46 GMT", + "date" : "Thu, 08 Mar 2018 20:03:54 GMT", "content-length" : "76", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -489,45 +463,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cea7cca9-8d2d-4487-853f-8247a2acbb41", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "834a967a-22b2-4c96-826f-210f74b3d47f", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey2\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:10:56 GMT", - "content-length" : "76", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a1c7c74e-4ca6-42a4-b0d8-208b3bb5b9f9", - "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey2\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:06 GMT", + "date" : "Thu, 08 Mar 2018 20:04:05 GMT", "content-length" : "805", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -541,19 +489,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3b615cf6-3036-4ebe-b57a-b5f9fcc88d90", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2\",\"deletedDate\":1511230235,\"scheduledPurgeDate\":1519006235,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2/6cf77aafb25849968e87790cc68394cc\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1h5Y5fsqsImOPXQWd_-B3EvbvZgNx0cFAMUao8ejDJx4KFUn5LVr4lzI32orYd06xh8tnXz4D6bTvZV2I3E6da1DYO1MsddXHBkWa1nb0qeBWDDvIS1sOAFFgmWkAh1ev9O7UIh3_m5kyGwNs4NGRhLvTDhWulQAChAY5NNxse_nsZZxX481T0g1bI2Q1_8a4nZHRpbZPanX7kVrYeOQ1vxNzFQU8heEz_Gjw3W4DGT9nNGdsXppcbM-z_Ov7_G0yIeHGPT-h-c6luCPoLq54Bp-CvzSmMBohQD_4iEz-WIqkphVtx8uIHUFyhgvR7HR1LrkyWYO4r8CKztZ1nRwUw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d99bd148-7273-4754-9787-672fb55823b6", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2\",\"deletedDate\":1520539425,\"scheduledPurgeDate\":1528315425,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2/e7115054531641c8bfc681bb64d541fb\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tVUGo1OWaGDYvRbPMmfcg2xYEF_QcI7KXUnjKbK0tQjDh6IV634DAclf5d9vZwtskM-a0Ea8NSBcbTzXSnfBx9AKtLTTEgevNwBOtSXmAOByB4i1r6ojGjI27BiYmt1lXcqo3IjfILHlArixlnCsb4-Sdptd4ZJn8n_EMYj9JTxvtG6B2S7dmoN2bmvNQewgmq6TPKPUxjWJxE98MNBnDX5Q1Zan02emnEku4HBmRCgijsdqfVzvrC8u6yHbrMYpIWIxSicKLj4N_gZu4eXpmXogCCNrwpJVGZVqwhUaKJm2NwuQhrmEPolP2FV7_J8FgtbLVylJiWcbV6pebfAgCQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:06 GMT", + "date" : "Thu, 08 Mar 2018 20:04:05 GMT", "content-length" : "803", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -567,19 +515,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9a16f839-f4ce-41bf-b189-e8e8c0d32797", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1511230267,\"scheduledPurgeDate\":1519006267,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/4293735168034fcc99591effa93b082b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230208,\"updated\":1511230208,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "bf6d09ac-2b4c-4a7c-bc83-b9aa09b78987", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1520539446,\"scheduledPurgeDate\":1528315446,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/ca70659367d84f4d8f62c4281869a54b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539409,\"updated\":1520539409,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:06 GMT", + "date" : "Thu, 08 Mar 2018 20:04:05 GMT", "content-length" : "75", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -593,51 +541,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a0088746-e7f3-4df4-889b-039e0bf37473", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "25b0c3e1-de99-41f8-96bf-210c95bf8dde", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:17 GMT", - "content-length" : "75", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2488fa91-d34e-4ad1-9698-b0b6ccc52477", - "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:28 GMT", - "content-length" : "75", + "date" : "Thu, 08 Mar 2018 20:04:15 GMT", + "content-length" : "803", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "404", + "StatusCode" : "200", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -645,20 +567,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a0adc653-0836-46b9-af45-5ff7cf251b09", - "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "279eb6f3-eddd-48a8-8dee-ea940ef6fc06", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1520539446,\"scheduledPurgeDate\":1528315446,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/ca70659367d84f4d8f62c4281869a54b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539409,\"updated\":1520539409,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:37 GMT", - "content-length" : "803", + "date" : "Thu, 08 Mar 2018 20:04:16 GMT", + "content-length" : "805", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -671,25 +593,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e5eee86c-d372-4f3a-aaf4-ef19a3c17a2e", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1511230267,\"scheduledPurgeDate\":1519006267,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/4293735168034fcc99591effa93b082b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230208,\"updated\":1511230208,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f606b5e5-dacd-4491-8826-1b225635f50c", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1\",\"deletedDate\":1520539456,\"scheduledPurgeDate\":1528315456,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1/77bf62c6fe364bb1b17865306fc6343b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"jwjr_29snJXJl_rv1FTBklzTzQbGMbb4IgbuVlQwG2J7BBuoa_7qwHmI2d9-avdkE3yYSBXUmGdfvEKXDSPi-JbLNfYChravw4BpBWS3DlFp6QWGx4XPL7ArasoqOBdx15De2ucRAboufNq6t4cJ9ZFypLjOzWG6EKHDNqYNYq3Htacw97mZO5U3nez0aylcXwqSIR42nIBVEDebRPP5S8xpOp1QDCeVDSdxwnH_S_iv6Z7eF9Ub_58mUU0SZlE4bWCu3LJBHQWly9Gsy_0ASKwcSSNE9jxDKS2BJyWnonXfawzDealBJEUoAWGSKKw4OhYtELxJiNv-9HRon_56lQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { - "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1?api-version=2016-10-01", + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:37 GMT", - "content-length" : "805", + "date" : "Thu, 08 Mar 2018 20:04:16 GMT", + "content-length" : "76", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "200", + "StatusCode" : "404", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -697,19 +619,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "af68af63-1e6d-4481-8399-5928c0882bf5", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1\",\"deletedDate\":1511230298,\"scheduledPurgeDate\":1519006298,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1/79492c1d171b4be485f418cb92d79c40\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"qk_RCKPT1b4b6ALRQcbHoP-v78RG5tbHn3oQDL21hedOvCR3YVg2Fkv4uy4_UjsBCbOGM6EmR0TDJXSi0_Jj8k_k7KswkCjFaC3z7Ncz3YTjezEAFMH7b4onf6K4DfEixJpc9KFyI5DBUMkwoufVV37vYxdNEA8AHH2SUh9vSy3wGN7J5YY0X9U6Ha4IRGGEmKM-hZrYFBKEhewscUS0AxwsqPS9GfCiX1cTv9my1YdqyrxBzeLOW5ywGtQVTrphBhMS6oToHPLDIh-O_k-ZqrW7YigzHaMolT-4K2QDQq7DH6GUh7Yqv8iYt2rOymSNkqoZ-HiMdwmzE1dBRralBQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "01a235c5-ade2-4c31-a6a5-1af918887943", + "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey1\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:39 GMT", + "date" : "Thu, 08 Mar 2018 20:04:26 GMT", "content-length" : "76", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -723,25 +645,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "093c4e67-3c7f-4447-9e55-f0183934d88f", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f434c6cc-254c-46cd-a800-bde2d8644db5", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey1\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:48 GMT", - "content-length" : "76", + "date" : "Thu, 08 Mar 2018 20:04:38 GMT", + "content-length" : "805", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "404", + "StatusCode" : "200", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -749,19 +671,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cedcf86d-b2b1-4301-a9f8-26fa83db8a08", - "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey1\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "bab3abe0-9029-4810-9f3e-68ce3f1c6993", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1\",\"deletedDate\":1520539456,\"scheduledPurgeDate\":1528315456,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1/77bf62c6fe364bb1b17865306fc6343b\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"jwjr_29snJXJl_rv1FTBklzTzQbGMbb4IgbuVlQwG2J7BBuoa_7qwHmI2d9-avdkE3yYSBXUmGdfvEKXDSPi-JbLNfYChravw4BpBWS3DlFp6QWGx4XPL7ArasoqOBdx15De2ucRAboufNq6t4cJ9ZFypLjOzWG6EKHDNqYNYq3Htacw97mZO5U3nez0aylcXwqSIR42nIBVEDebRPP5S8xpOp1QDCeVDSdxwnH_S_iv6Z7eF9Ub_58mUU0SZlE4bWCu3LJBHQWly9Gsy_0ASKwcSSNE9jxDKS2BJyWnonXfawzDealBJEUoAWGSKKw4OhYtELxJiNv-9HRon_56lQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1?api-version=2016-10-01", + "Method" : "DELETE", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:59 GMT", + "date" : "Thu, 08 Mar 2018 20:04:38 GMT", "content-length" : "805", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -775,25 +697,25 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "400f1ce9-25e9-4515-83fd-3fb082caf75f", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1\",\"deletedDate\":1511230298,\"scheduledPurgeDate\":1519006298,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1/79492c1d171b4be485f418cb92d79c40\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"qk_RCKPT1b4b6ALRQcbHoP-v78RG5tbHn3oQDL21hedOvCR3YVg2Fkv4uy4_UjsBCbOGM6EmR0TDJXSi0_Jj8k_k7KswkCjFaC3z7Ncz3YTjezEAFMH7b4onf6K4DfEixJpc9KFyI5DBUMkwoufVV37vYxdNEA8AHH2SUh9vSy3wGN7J5YY0X9U6Ha4IRGGEmKM-hZrYFBKEhewscUS0AxwsqPS9GfCiX1cTv9my1YdqyrxBzeLOW5ywGtQVTrphBhMS6oToHPLDIh-O_k-ZqrW7YigzHaMolT-4K2QDQq7DH6GUh7Yqv8iYt2rOymSNkqoZ-HiMdwmzE1dBRralBQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e3ad6ea3-058e-4697-b6ea-ef85fd870fe0", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0\",\"deletedDate\":1520539478,\"scheduledPurgeDate\":1528315478,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/8ff45eeb5b724c5ba7829e3961649b92\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"uwZTLp2MkPH4Sn1FlHolkrbjR5ufM7yqggYKBdsTSqDoDZjyjdUj4ed_8k64q8X9aEgVi-94pXMuJ4XNWAfcKvsqONNsIBkhP2uhQOuk1CLovVbZ153jAM5Ab1ENwXgNZxr_aSJoFjatjK2Xibgb9BHUI2r_NAq1YJMZFQdi8e1LpISCp_I9kujN0Eh0VfPxAuNrPXOLV1mqm7MiNa1M1uL_UuZ5zEA9zjuuuT1i7tCG42rZmVUoLkGeJyBTPGmuCwlxj4p5SxBQheC-MIGOkQ6ynwTI5QezIXsLckCGyBt-RKkzI3o9smGD0ZmLWQzuj0buOcpPK_JNSMOJQRRnsw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539410,\"updated\":1520539410,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { - "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0?api-version=2016-10-01", + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:59 GMT", - "content-length" : "805", + "date" : "Thu, 08 Mar 2018 20:04:38 GMT", + "content-length" : "76", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", "retry-after" : "0", - "StatusCode" : "200", + "StatusCode" : "404", "pragma" : "no-cache", "strict-transport-security" : "max-age=31536000;includeSubDomains", "x-content-type-options" : "nosniff", @@ -801,19 +723,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8cafeaf2-e8f4-4e70-a3ff-6f4a943119ce", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0\",\"deletedDate\":1511230319,\"scheduledPurgeDate\":1519006319,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/4c8befc28e73434bbed1d8bead1d4de8\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tHNBnpHGpkJIkxDRHmhvrgkMCzZc7FKqUTWZ2FJMlj3tw8XuaOIi60jJzz0buX94WDdP19KiJOHUM-jbxAYFbkJKhlRRq58p1PQO7sF_NtW0UmPeAhUWyLqvqvv7vYvbHK8j75Uvncg4SOqDlNOAb_q4xRmsgBkhKpYzOqVqICqDIMuUYveOBtWD5E73YgrATfII2RWYx_3zfJYrEw4ghvF7z_3IqA2Ucz47qw14vtkl9vC-AvwL763NQOzQGuGuCXk4pLNWd7XKQeTB301qye7A6IkQOZOK_Lo56ZH7KW7en0cvJ4huBphUo1uB5QSbac5t9-VED45zDT8tqlh52Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ae0ef430-d40c-410f-b375-fd43bbf52be2", + "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey0\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:11:59 GMT", + "date" : "Thu, 08 Mar 2018 20:04:48 GMT", "content-length" : "76", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -827,19 +749,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "67d4662b-df76-4525-a43a-4299079efbcb", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d13f66e4-630e-4ea2-bdec-280c32dbb79a", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey0\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:12:10 GMT", + "date" : "Thu, 08 Mar 2018 20:04:58 GMT", "content-length" : "76", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -853,19 +775,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "369f936a-48e7-4ea0-a574-91f8e61e834b", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "33bc3d13-33bf-4431-a329-f8a0ec253b93", "Body" : "{\"error\":{\"code\":\"KeyNotFound\",\"message\":\"Deleted Key not found: javaKey0\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:12:20 GMT", + "date" : "Thu, 08 Mar 2018 20:05:08 GMT", "content-length" : "805", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -879,20 +801,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "fd227a8a-94f8-4806-a571-690355062b6d", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0\",\"deletedDate\":1511230319,\"scheduledPurgeDate\":1519006319,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/4c8befc28e73434bbed1d8bead1d4de8\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"tHNBnpHGpkJIkxDRHmhvrgkMCzZc7FKqUTWZ2FJMlj3tw8XuaOIi60jJzz0buX94WDdP19KiJOHUM-jbxAYFbkJKhlRRq58p1PQO7sF_NtW0UmPeAhUWyLqvqvv7vYvbHK8j75Uvncg4SOqDlNOAb_q4xRmsgBkhKpYzOqVqICqDIMuUYveOBtWD5E73YgrATfII2RWYx_3zfJYrEw4ghvF7z_3IqA2Ucz47qw14vtkl9vC-AvwL763NQOzQGuGuCXk4pLNWd7XKQeTB301qye7A6IkQOZOK_Lo56ZH7KW7en0cvJ4huBphUo1uB5QSbac5t9-VED45zDT8tqlh52Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "77568839-d7e6-4270-a445-218f8a198457", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0\",\"deletedDate\":1520539478,\"scheduledPurgeDate\":1528315478,\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0/8ff45eeb5b724c5ba7829e3961649b92\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"uwZTLp2MkPH4Sn1FlHolkrbjR5ufM7yqggYKBdsTSqDoDZjyjdUj4ed_8k64q8X9aEgVi-94pXMuJ4XNWAfcKvsqONNsIBkhP2uhQOuk1CLovVbZ153jAM5Ab1ENwXgNZxr_aSJoFjatjK2Xibgb9BHUI2r_NAq1YJMZFQdi8e1LpISCp_I9kujN0Eh0VfPxAuNrPXOLV1mqm7MiNa1M1uL_UuZ5zEA9zjuuuT1i7tCG42rZmVUoLkGeJyBTPGmuCwlxj4p5SxBQheC-MIGOkQ6ynwTI5QezIXsLckCGyBt-RKkzI3o9smGD0ZmLWQzuj0buOcpPK_JNSMOJQRRnsw\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539410,\"updated\":1520539410,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:12:20 GMT", - "content-length" : "1967", + "date" : "Thu, 08 Mar 2018 20:05:08 GMT", + "content-length" : "1968", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -905,19 +827,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "90218cca-e75f-42a8-a1cd-b5ff31fad067", - "Body" : "{\"value\":[{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1511230267,\"scheduledPurgeDate\":1519006267,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey\",\"attributes\":{\"enabled\":true,\"created\":1511230208,\"updated\":1511230208,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0\",\"deletedDate\":1511230319,\"scheduledPurgeDate\":1519006319,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0\",\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1\",\"deletedDate\":1511230298,\"scheduledPurgeDate\":1519006298,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1\",\"attributes\":{\"enabled\":true,\"created\":1511230210,\"updated\":1511230210,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2\",\"deletedDate\":1511230235,\"scheduledPurgeDate\":1519006235,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2\",\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3\",\"deletedDate\":1511230214,\"scheduledPurgeDate\":1519006214,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3\",\"attributes\":{\"enabled\":true,\"created\":1511230211,\"updated\":1511230211,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/deletedkeys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMzIhTURBd01EVXpJV3RsZVM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4THpBd01USTROa0ZDUVVJelJUUkROVFZCT0VaQ1FVSTNOVVF3TURaRlJqTkNJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0c2196f3-5677-4644-a9a9-d529b08ec55d", + "Body" : "{\"value\":[{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey\",\"deletedDate\":1520539446,\"scheduledPurgeDate\":1528315446,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey\",\"attributes\":{\"enabled\":true,\"created\":1520539409,\"updated\":1520539409,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0\",\"deletedDate\":1520539478,\"scheduledPurgeDate\":1528315478,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey0\",\"attributes\":{\"enabled\":true,\"created\":1520539410,\"updated\":1520539410,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1\",\"deletedDate\":1520539456,\"scheduledPurgeDate\":1528315456,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey1\",\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2\",\"deletedDate\":1520539425,\"scheduledPurgeDate\":1528315425,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey2\",\"attributes\":{\"enabled\":true,\"created\":1520539411,\"updated\":1520539411,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3\",\"deletedDate\":1520539414,\"scheduledPurgeDate\":1528315414,\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey3\",\"attributes\":{\"enabled\":true,\"created\":1520539412,\"updated\":1520539412,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/deletedkeys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMzIhTURBd01EVXpJV3RsZVM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4THpBd01USTROa0ZDUVVJelJUUkROVFZCT0VaQ1FVSTNOVVF3TURaRlJqTkNJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMzIhTURBd01EVXpJV3RsZVM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4THpBd01USTROa0ZDUVVJelJUUkROVFZCT0VaQ1FVSTNOVVF3TURaRlJqTkNJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMzIhTURBd01EVXpJV3RsZVM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4THpBd01USTROa0ZDUVVJelJUUkROVFZCT0VaQ1FVSTNOVVF3TURaRlJqTkNJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:12:22 GMT", + "date" : "Thu, 08 Mar 2018 20:05:10 GMT", "content-length" : "28", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -931,19 +853,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "99985de3-0ffb-4cb7-8bcb-c6ceae4d4271", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "cb9dc4dd-e395-4ec1-9988-4e06933d7732", "Body" : "{\"value\":[],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:12:22 GMT", + "date" : "Thu, 08 Mar 2018 20:05:10 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -955,19 +877,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "120be02e-3566-4b95-9df0-e3d197d7899f", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "66eb6f82-5cc4-497b-9421-c5db41d62d9c", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:13:01 GMT", + "date" : "Thu, 08 Mar 2018 20:05:50 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -979,19 +901,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "86bdfdd8-8d07-4b7b-b8e2-2dd054a30ad1", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b1e1b942-9083-40fe-ada0-09819fe519ad", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:13:42 GMT", + "date" : "Thu, 08 Mar 2018 20:06:30 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -1003,19 +925,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e7f9dbe0-9280-4dc1-95a5-5f69377848a8", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b71fbbbb-7cad-4bde-b3e3-64e97c41d05b", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:14:23 GMT", + "date" : "Thu, 08 Mar 2018 20:07:10 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -1027,19 +949,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f4cb273c-7480-40f7-bad2-613eafe86732", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "2f9e5175-e8a1-453a-ab87-7079244653e2", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedkeys/javaKey3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:03 GMT", + "date" : "Thu, 08 Mar 2018 20:07:50 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -1051,8 +973,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "751e659b-7c5d-4575-93f6-73afbbe5f2ea", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "69d9ed27-1245-4c18-b489-595b811fbc86", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/listSecretVersionsForSecretOperationsTest.json b/azure-keyvault/target/test-classes/session-records/listSecretVersionsForSecretOperationsTest.json index a2f2abc..c98d187 100644 --- a/azure-keyvault/target/test-classes/session-records/listSecretVersionsForSecretOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/listSecretVersionsForSecretOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:14 GMT", + "date" : "Thu, 08 Mar 2018 20:17:34 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3baed0af-640e-4138-96f7-e039d8ec8c4a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "3799259a-a6de-4855-a0f0-976f7f22dea5", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:14 GMT", + "date" : "Thu, 08 Mar 2018 20:17:34 GMT", "content-length" : "283", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "11077174-2321-4029-b15d-f38de97993fd", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/fca2d52a85324785bc54d7d4ca6ffbee\",\"attributes\":{\"enabled\":true,\"created\":1511287095,\"updated\":1511287095,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "344aa329-bd0f-4b35-bce1-62cbb6f58a24", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/2bc763686e9443e782f3679363166840\",\"attributes\":{\"enabled\":true,\"created\":1520540254,\"updated\":1520540254,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:15 GMT", + "date" : "Thu, 08 Mar 2018 20:17:34 GMT", "content-length" : "283", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "09b56669-bbce-4d78-a971-5e151f7b44ed", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/20ed784d469e413f8311ee575464ea00\",\"attributes\":{\"enabled\":true,\"created\":1511287095,\"updated\":1511287095,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d771a188-143a-483a-bc07-9dfe51881ada", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/8cc93a20ea6641058ddb8a1af2bd0182\",\"attributes\":{\"enabled\":true,\"created\":1520540254,\"updated\":1520540254,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:15 GMT", + "date" : "Thu, 08 Mar 2018 20:17:35 GMT", "content-length" : "283", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "202ba5f7-f001-49a5-a9b4-ce0c000d9272", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/77b8689435ac4b77897ccf7cd4c65b07\",\"attributes\":{\"enabled\":true,\"created\":1511287096,\"updated\":1511287096,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b5b450a0-830b-4b16-9a93-04dde616292f", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/95a82b1ccd9f488f9d93e6a1cf8aaefc\",\"attributes\":{\"enabled\":true,\"created\":1520540255,\"updated\":1520540255,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:15 GMT", + "date" : "Thu, 08 Mar 2018 20:17:35 GMT", "content-length" : "283", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,20 +125,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "48d37907-2327-4c2b-90a9-fedb0da99f19", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/68bd127f047e47f794e2cb1955110082\",\"attributes\":{\"enabled\":true,\"created\":1511287096,\"updated\":1511287096,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c61e30f9-a861-4542-88c8-3e0131b79c0d", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/dec33b0b90ca47a3bc5e685922624826\",\"attributes\":{\"enabled\":true,\"created\":1520540255,\"updated\":1520540255,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/versions?maxresults=3&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/versions?maxresults=3&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:16 GMT", - "content-length" : "1081", + "date" : "Thu, 08 Mar 2018 20:17:35 GMT", + "content-length" : "1082", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -151,19 +151,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a3ce4615-bde3-456d-83c3-a455cb9be292", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/20ed784d469e413f8311ee575464ea00\",\"attributes\":{\"enabled\":true,\"created\":1511287095,\"updated\":1511287095,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/68bd127f047e47f794e2cb1955110082\",\"attributes\":{\"enabled\":true,\"created\":1511287096,\"updated\":1511287096,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/77b8689435ac4b77897ccf7cd4c65b07\",\"attributes\":{\"enabled\":true,\"created\":1511287096,\"updated\":1511287096,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets/javaSecretVersions/versions?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMzYhTURBd01EVTRJWE5sWTNKbGRDOUtRVlpCVTBWRFVrVlVWa1ZTVTBsUFRsTXZSa05CTWtRMU1rRTROVE15TkRjNE5VSkROVFJFTjBRMFEwRTJSa1pDUlVVaE1EQXdNREk0SVRrNU9Ua3RNVEl0TXpGVU1qTTZOVGs2TlRrdU9UazVPVGs1T1ZvaCIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ddabe402-60bc-49a2-b1b7-c493cdf6ed2b", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/2bc763686e9443e782f3679363166840\",\"attributes\":{\"enabled\":true,\"created\":1520540254,\"updated\":1520540254,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/8cc93a20ea6641058ddb8a1af2bd0182\",\"attributes\":{\"enabled\":true,\"created\":1520540254,\"updated\":1520540254,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/95a82b1ccd9f488f9d93e6a1cf8aaefc\",\"attributes\":{\"enabled\":true,\"created\":1520540255,\"updated\":1520540255,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets/javaSecretVersions/versions?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMzYhTURBd01EVTRJWE5sWTNKbGRDOUtRVlpCVTBWRFVrVlVWa1ZTVTBsUFRsTXZSRVZETXpOQ01FSTVNRU5CTkRkQk0wSkROVVUyT0RVNU1qSTJNalE0TWpZaE1EQXdNREk0SVRrNU9Ua3RNVEl0TXpGVU1qTTZOVGs2TlRrdU9UazVPVGs1T1ZvaCIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/versions?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMzYhTURBd01EVTRJWE5sWTNKbGRDOUtRVlpCVTBWRFVrVlVWa1ZTVTBsUFRsTXZSa05CTWtRMU1rRTROVE15TkRjNE5VSkROVFJFTjBRMFEwRTJSa1pDUlVVaE1EQXdNREk0SVRrNU9Ua3RNVEl0TXpGVU1qTTZOVGs2TlRrdU9UazVPVGs1T1ZvaCIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/versions?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMzYhTURBd01EVTRJWE5sWTNKbGRDOUtRVlpCVTBWRFVrVlVWa1ZTVTBsUFRsTXZSRVZETXpOQ01FSTVNRU5CTkRkQk0wSkROVVUyT0RVNU1qSTJNalE0TWpZaE1EQXdNREk0SVRrNU9Ua3RNVEl0TXpGVU1qTTZOVGs2TlRrdU9UazVPVGs1T1ZvaCIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:16 GMT", + "date" : "Thu, 08 Mar 2018 20:17:35 GMT", "content-length" : "255", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -177,19 +177,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "0798a7c3-03cf-4720-a06c-60e98a4fc0ff", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/fca2d52a85324785bc54d7d4ca6ffbee\",\"attributes\":{\"enabled\":true,\"created\":1511287095,\"updated\":1511287095,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e8dd51d1-904b-43ee-b2e1-df615df852ed", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/dec33b0b90ca47a3bc5e685922624826\",\"attributes\":{\"enabled\":true,\"created\":1520540255,\"updated\":1520540255,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/versions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/versions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:16 GMT", + "date" : "Thu, 08 Mar 2018 20:17:35 GMT", "content-length" : "939", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -203,19 +203,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "693c3d2d-7beb-4ae7-b8eb-25befcc2d5a9", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/20ed784d469e413f8311ee575464ea00\",\"attributes\":{\"enabled\":true,\"created\":1511287095,\"updated\":1511287095,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/68bd127f047e47f794e2cb1955110082\",\"attributes\":{\"enabled\":true,\"created\":1511287096,\"updated\":1511287096,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/77b8689435ac4b77897ccf7cd4c65b07\",\"attributes\":{\"enabled\":true,\"created\":1511287096,\"updated\":1511287096,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/fca2d52a85324785bc54d7d4ca6ffbee\",\"attributes\":{\"enabled\":true,\"created\":1511287095,\"updated\":1511287095,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fd01bbd6-b4f6-450e-8541-bf7fa602f43d", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/2bc763686e9443e782f3679363166840\",\"attributes\":{\"enabled\":true,\"created\":1520540254,\"updated\":1520540254,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/8cc93a20ea6641058ddb8a1af2bd0182\",\"attributes\":{\"enabled\":true,\"created\":1520540254,\"updated\":1520540254,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/95a82b1ccd9f488f9d93e6a1cf8aaefc\",\"attributes\":{\"enabled\":true,\"created\":1520540255,\"updated\":1520540255,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/dec33b0b90ca47a3bc5e685922624826\",\"attributes\":{\"enabled\":true,\"created\":1520540255,\"updated\":1520540255,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:16 GMT", + "date" : "Thu, 08 Mar 2018 20:17:36 GMT", "content-length" : "380", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -229,19 +229,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "fb5ca0d8-1437-47f9-83bd-28e7d9423f27", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions\",\"deletedDate\":1511287097,\"scheduledPurgeDate\":1519063097,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/68bd127f047e47f794e2cb1955110082\",\"attributes\":{\"enabled\":true,\"created\":1511287096,\"updated\":1511287096,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "6fbdf1cb-5345-485f-bba1-c8cf0b4948dd", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions\",\"deletedDate\":1520540256,\"scheduledPurgeDate\":1528316256,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/dec33b0b90ca47a3bc5e685922624826\",\"attributes\":{\"enabled\":true,\"created\":1520540255,\"updated\":1520540255,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:17 GMT", + "date" : "Thu, 08 Mar 2018 20:17:36 GMT", "content-length" : "92", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -255,19 +255,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "dac10adc-1bac-42d8-9328-bba9c06968c8", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5dd7ef16-6c52-4ae7-adcb-feeecba42c64", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecretVersions\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:27 GMT", + "date" : "Thu, 08 Mar 2018 20:17:46 GMT", "content-length" : "92", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -281,19 +281,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "270515dd-95ac-4b4d-bffd-588e8252722c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "39f90cc3-f24b-4924-92d8-99dd55dbcb41", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecretVersions\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:37 GMT", + "date" : "Thu, 08 Mar 2018 20:17:56 GMT", "content-length" : "380", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -307,19 +307,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1288207f-f81d-4111-b233-c9d46b079ac0", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions\",\"deletedDate\":1511287097,\"scheduledPurgeDate\":1519063097,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/68bd127f047e47f794e2cb1955110082\",\"attributes\":{\"enabled\":true,\"created\":1511287096,\"updated\":1511287096,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "42d426f1-3134-4b77-b8d6-04b35a862618", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions\",\"deletedDate\":1520540256,\"scheduledPurgeDate\":1528316256,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecretVersions/dec33b0b90ca47a3bc5e685922624826\",\"attributes\":{\"enabled\":true,\"created\":1520540255,\"updated\":1520540255,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecretVersions?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:58:38 GMT", + "date" : "Thu, 08 Mar 2018 20:17:57 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -331,8 +331,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8bd03984-0987-44b1-866b-a0a208bd73ad", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "51dac1b3-78fc-4223-9447-e2e387c33cf7", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/listSecretsForSecretOperationsTest.json b/azure-keyvault/target/test-classes/session-records/listSecretsForSecretOperationsTest.json index abec792..57f17f1 100644 --- a/azure-keyvault/target/test-classes/session-records/listSecretsForSecretOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/listSecretsForSecretOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:22 GMT", + "date" : "Thu, 08 Mar 2018 20:14:33 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "a631a5c5-7b52-4042-861b-60cbfa7b545c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "17ce8f3c-a853-4a90-918c-940bb5da6ea9", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:22 GMT", + "date" : "Thu, 08 Mar 2018 20:14:34 GMT", "content-length" : "276", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2f2a4a94-47d2-47c8-8560-6444c07c67ef", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0/8a47fc71235a400fa76a2157a743edcb\",\"attributes\":{\"enabled\":true,\"created\":1511286862,\"updated\":1511286862,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f6fb26b1-ad61-4243-a4bb-df6f7bf35b61", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0/1bdd6493d4a7441b9e13062c383399c9\",\"attributes\":{\"enabled\":true,\"created\":1520540074,\"updated\":1520540074,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:23 GMT", + "date" : "Thu, 08 Mar 2018 20:14:34 GMT", "content-length" : "276", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "71aefad4-c07d-47f6-8a45-5c23e33318e6", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1/37f27d5fb02945f38fdf8a2aec41fb66\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ef36e8b9-6a36-40e1-b567-0262ce163d9c", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1/764f150a3413423eabe8454b79215f11\",\"attributes\":{\"enabled\":true,\"created\":1520540074,\"updated\":1520540074,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:23 GMT", + "date" : "Thu, 08 Mar 2018 20:14:34 GMT", "content-length" : "276", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8f7c5d7a-d96b-434b-8af8-dbc117240ab3", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2/498e4b170ded44468edb145d2fadc4a2\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "6455571a-1e8f-4ea6-b8ca-5882ebd5436c", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2/26357c94e4e046e4b3dde17f75e9131c\",\"attributes\":{\"enabled\":true,\"created\":1520540075,\"updated\":1520540075,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:23 GMT", + "date" : "Thu, 08 Mar 2018 20:14:34 GMT", "content-length" : "276", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,20 +125,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e5b784a4-0761-4068-bcdc-60d31041f51d", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3/0d449237baa54e73b7e5bae040b544ca\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "0aada569-e282-420d-9830-cbcecff1a011", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3/ed437268ca2045e59b740bae14b0a34f\",\"attributes\":{\"enabled\":true,\"created\":1520540075,\"updated\":1520540075,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?maxresults=3&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?maxresults=3&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:23 GMT", - "content-length" : "310", + "date" : "Thu, 08 Mar 2018 20:14:34 GMT", + "content-length" : "311", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -151,20 +151,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c92d4155-7733-4ec2-932d-85465c243aa7", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElYTmxZM0psZEM5RFVrVkJWRVZVUlZOVVNrRldRVkJGVFNFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "56dad450-96f3-4de8-911a-797a3b6375c6", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElYTmxZM0psZEM5RFVrVkJWRVZVUlZOVVNrRldRVkJGVFNFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElYTmxZM0psZEM5RFVrVkJWRVZVUlZOVVNrRldRVkJGVFNFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElYTmxZM0psZEM5RFVrVkJWRVZVUlZOVVNrRldRVkJGVFNFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:24 GMT", - "content-length" : "299", + "date" : "Thu, 08 Mar 2018 20:14:35 GMT", + "content-length" : "300", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -177,20 +177,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3614a86f-cc8b-4881-9ec7-86c2cbfba41c", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lYTmxZM0psZEM5S1FWWkJVMFZEVWtWVUlUQXdNREF5T0NFeU1ERTNMVEV4TFRFMlZEQXlPakExT2pFMkxqRXpOak13TkRCYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c3a7857d-d46d-43b8-90d5-7e5c03883d3f", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lYTmxZM0psZEM5S1FWWkJVMFZEVWtWVUlUQXdNREF5T0NFeU1ERTNMVEV5TFRBM1ZEQXdPak01T2pFMkxqRTNOall3TURoYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lYTmxZM0psZEM5S1FWWkJVMFZEVWtWVUlUQXdNREF5T0NFeU1ERTNMVEV4TFRFMlZEQXlPakExT2pFMkxqRXpOak13TkRCYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lYTmxZM0psZEM5S1FWWkJVMFZEVWtWVUlUQXdNREF5T0NFeU1ERTNMVEV5TFRBM1ZEQXdPak01T2pFMkxqRTNOall3TURoYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:24 GMT", - "content-length" : "943", + "date" : "Thu, 08 Mar 2018 20:14:35 GMT", + "content-length" : "944", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -203,20 +203,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b146d61d-c7aa-4909-9439-a54fca081b1b", - "Body" : "{\"value\":[{\"contentType\":\"contentType\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret\",\"attributes\":{\"enabled\":true,\"nbf\":948477048,\"exp\":2526400248,\"created\":1511286647,\"updated\":1511286647,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0\",\"attributes\":{\"enabled\":true,\"created\":1511286862,\"updated\":1511286862,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFNElYTmxZM0psZEM5S1FWWkJVMFZEVWtWVU1pRXdNREF3TWpnaE1qQXhOeTB4TVMweE5sUXdNam93TlRveE5DNDNOalE1T0RZNFdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "aecb1e45-91e5-4a51-b61a-1d61b9f172e6", + "Body" : "{\"value\":[{\"contentType\":\"contentType\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret\",\"attributes\":{\"enabled\":true,\"nbf\":947361094,\"exp\":2525284294,\"created\":1520538694,\"updated\":1520538694,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0\",\"attributes\":{\"enabled\":true,\"created\":1520540074,\"updated\":1520540074,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1\",\"attributes\":{\"enabled\":true,\"created\":1520540074,\"updated\":1520540074,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFNElYTmxZM0psZEM5S1FWWkJVMFZEVWtWVU1pRXdNREF3TWpnaE1qQXhPQzB3TXkwd09GUXhPVG8wT1RveU5DNHhOelEzT0RZMFdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFNElYTmxZM0psZEM5S1FWWkJVMFZEVWtWVU1pRXdNREF3TWpnaE1qQXhOeTB4TVMweE5sUXdNam93TlRveE5DNDNOalE1T0RZNFdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFNElYTmxZM0psZEM5S1FWWkJVMFZEVWtWVU1pRXdNREF3TWpnaE1qQXhPQzB3TXkwd09GUXhPVG8wT1RveU5DNHhOelEzT0RZMFdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:24 GMT", - "content-length" : "685", + "date" : "Thu, 08 Mar 2018 20:14:36 GMT", + "content-length" : "686", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -229,20 +229,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "5d0c0918-c923-4ab0-98a2-776998eea416", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "81ed9bb4-84ba-4b29-beda-657b2357f243", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2\",\"attributes\":{\"enabled\":true,\"created\":1520540075,\"updated\":1520540075,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3\",\"attributes\":{\"enabled\":true,\"created\":1520540075,\"updated\":1520540075,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:24 GMT", - "content-length" : "322", + "date" : "Thu, 08 Mar 2018 20:14:36 GMT", + "content-length" : "323", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -255,20 +255,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4418c5c1-421a-4c56-8d03-95ea4399a40d", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDAhTURBd01ETXdJWE5sWTNKbGRDOU1TVk5VUTBWU1ZFbEdTVU5CVkVWV1JWSlRTVTlPVXlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ea5238c0-fc94-4af7-8dbd-4881892cf458", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDAhTURBd01ETXdJWE5sWTNKbGRDOU1TVk5VUTBWU1ZFbEdTVU5CVkVWV1JWSlRTVTlPVXlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDAhTURBd01ETXdJWE5sWTNKbGRDOU1TVk5VUTBWU1ZFbEdTVU5CVkVWV1JWSlRTVTlPVXlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDAhTURBd01ETXdJWE5sWTNKbGRDOU1TVk5VUTBWU1ZFbEdTVU5CVkVWV1JWSlRTVTlPVXlFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:25 GMT", - "content-length" : "304", + "date" : "Thu, 08 Mar 2018 20:14:36 GMT", + "content-length" : "305", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -281,19 +281,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e542466c-602c-44ac-8b67-ca50897a8dcf", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElYTmxZM0psZEM5VlVFUkJWRVZEUlZKVVNrRldRU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "36e0f4e9-e8f7-4fb2-94a0-7fb7f8f91c4c", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElYTmxZM0psZEM5VlVFUkJWRVZEUlZKVVNrRldRU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElYTmxZM0psZEM5VlVFUkJWRVZEUlZKVVNrRldRU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJeElYTmxZM0psZEM5VlVFUkJWRVZEUlZKVVNrRldRU0V3TURBd01qZ2hPVGs1T1MweE1pMHpNVlF5TXpvMU9UbzFPUzQ1T1RrNU9UazVXaUUtIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=3", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:25 GMT", + "date" : "Thu, 08 Mar 2018 20:14:36 GMT", "content-length" : "28", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -307,19 +307,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "005e003d-e6fb-4db7-917d-4b0cf75cedd2", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "126e2e04-d934-4e8c-ab7f-592fa2b5f2ef", "Body" : "{\"value\":[],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:25 GMT", + "date" : "Thu, 08 Mar 2018 20:14:37 GMT", "content-length" : "366", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -333,19 +333,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b7bd0e5e-8a0d-4c35-a471-594e4276ed33", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0\",\"deletedDate\":1511286866,\"scheduledPurgeDate\":1519062866,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0/8a47fc71235a400fa76a2157a743edcb\",\"attributes\":{\"enabled\":true,\"created\":1511286862,\"updated\":1511286862,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5d814de9-a476-420e-806d-aa1985f9c343", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0\",\"deletedDate\":1520540077,\"scheduledPurgeDate\":1528316077,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0/1bdd6493d4a7441b9e13062c383399c9\",\"attributes\":{\"enabled\":true,\"created\":1520540074,\"updated\":1520540074,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:26 GMT", + "date" : "Thu, 08 Mar 2018 20:14:37 GMT", "content-length" : "85", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -359,19 +359,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b6d4da7b-db09-43be-b7be-782c6a172af6", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "8eb15d38-5389-469c-a4a8-031db2f3e228", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret0\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:36 GMT", + "date" : "Thu, 08 Mar 2018 20:14:47 GMT", "content-length" : "85", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -385,19 +385,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bc6e6c50-07bc-4fc4-8cd8-194ddd10fb23", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "73e30cff-cd91-4287-94b2-a858a7a72a33", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret0\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:47 GMT", + "date" : "Thu, 08 Mar 2018 20:14:58 GMT", "content-length" : "366", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -411,19 +411,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "be16478c-973d-46f2-a65b-93f1cfce0d74", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0\",\"deletedDate\":1511286866,\"scheduledPurgeDate\":1519062866,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0/8a47fc71235a400fa76a2157a743edcb\",\"attributes\":{\"enabled\":true,\"created\":1511286862,\"updated\":1511286862,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "685353a6-11ec-420b-abe7-378071c6844e", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0\",\"deletedDate\":1520540077,\"scheduledPurgeDate\":1528316077,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret0/1bdd6493d4a7441b9e13062c383399c9\",\"attributes\":{\"enabled\":true,\"created\":1520540074,\"updated\":1520540074,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret0?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:54:47 GMT", + "date" : "Thu, 08 Mar 2018 20:14:58 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -435,19 +435,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b17d65bf-9a6d-4781-b396-ec6553d56108", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b5bec9be-4a85-4d4f-9691-8928bb511d5b", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:55:07 GMT", + "date" : "Thu, 08 Mar 2018 20:15:19 GMT", "content-length" : "366", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -461,19 +461,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4b7b42b1-ab1d-4b97-8ba1-906019d97151", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1\",\"deletedDate\":1511286908,\"scheduledPurgeDate\":1519062908,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1/37f27d5fb02945f38fdf8a2aec41fb66\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "6b9d6d8b-e0c5-47ab-8de5-3cc3e75b3a0f", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1\",\"deletedDate\":1520540119,\"scheduledPurgeDate\":1528316119,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1/764f150a3413423eabe8454b79215f11\",\"attributes\":{\"enabled\":true,\"created\":1520540074,\"updated\":1520540074,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:55:07 GMT", + "date" : "Thu, 08 Mar 2018 20:15:19 GMT", "content-length" : "85", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -487,19 +487,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "d22f677b-f4d0-46b7-b703-4739ec16639f", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c97f4eb0-f1ad-45f4-bc47-2cdcecfc23a5", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret1\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:55:18 GMT", + "date" : "Thu, 08 Mar 2018 20:15:29 GMT", "content-length" : "85", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -513,45 +513,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3eebb99c-6563-46ed-a64e-cafa32d67c91", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "68d90634-e38f-40a0-9b80-f0c4f7e03bf7", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret1\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:55:28 GMT", - "content-length" : "85", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b49c70ca-d328-40bd-aae3-40a98a39a9b5", - "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret1\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 17:55:39 GMT", + "date" : "Thu, 08 Mar 2018 20:15:39 GMT", "content-length" : "366", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -565,19 +539,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bbbe36a0-2a5b-45c0-aa7b-3a9435bd73db", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1\",\"deletedDate\":1511286908,\"scheduledPurgeDate\":1519062908,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1/37f27d5fb02945f38fdf8a2aec41fb66\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f17a8353-741f-4f03-9793-cc9369161692", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1\",\"deletedDate\":1520540119,\"scheduledPurgeDate\":1528316119,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret1/764f150a3413423eabe8454b79215f11\",\"attributes\":{\"enabled\":true,\"created\":1520540074,\"updated\":1520540074,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret1?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:55:39 GMT", + "date" : "Thu, 08 Mar 2018 20:15:39 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -589,19 +563,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cd740c46-3831-442c-b6c5-0e69f9d4e98f", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "3b00c25b-7f9c-46c6-84ce-34973736e2a5", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:55:59 GMT", + "date" : "Thu, 08 Mar 2018 20:15:59 GMT", "content-length" : "366", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -615,19 +589,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "79ff155e-af34-44b5-94f6-869e5bee43c8", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2\",\"deletedDate\":1511286960,\"scheduledPurgeDate\":1519062960,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2/498e4b170ded44468edb145d2fadc4a2\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a083230c-6d6a-4b26-9fda-64b50fc710e2", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2\",\"deletedDate\":1520540160,\"scheduledPurgeDate\":1528316160,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2/26357c94e4e046e4b3dde17f75e9131c\",\"attributes\":{\"enabled\":true,\"created\":1520540075,\"updated\":1520540075,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:56:00 GMT", + "date" : "Thu, 08 Mar 2018 20:16:01 GMT", "content-length" : "85", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -641,45 +615,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9cb79f21-f5cf-45c8-8c87-72c9d157d479", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "816c7712-8218-4ff7-833b-07495ed658f1", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret2\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:56:11 GMT", - "content-length" : "85", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "95db6763-df77-4853-a30b-50aa5aa0b724", - "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret2\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 17:56:21 GMT", + "date" : "Thu, 08 Mar 2018 20:16:11 GMT", "content-length" : "366", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -693,19 +641,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "56935f2a-cc04-4fd0-8abb-10984676f87f", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2\",\"deletedDate\":1511286960,\"scheduledPurgeDate\":1519062960,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2/498e4b170ded44468edb145d2fadc4a2\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "96774702-b032-4f42-a16f-8c1cfb4d02aa", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2\",\"deletedDate\":1520540160,\"scheduledPurgeDate\":1528316160,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret2/26357c94e4e046e4b3dde17f75e9131c\",\"attributes\":{\"enabled\":true,\"created\":1520540075,\"updated\":1520540075,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret2?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:56:21 GMT", + "date" : "Thu, 08 Mar 2018 20:16:11 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -717,19 +665,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "95ae4624-7cf2-4bc5-9f6d-1a899f36306a", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "61bddf45-0e71-4bdf-8153-0f28d9a342ce", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:56:41 GMT", + "date" : "Thu, 08 Mar 2018 20:16:31 GMT", "content-length" : "366", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -743,19 +691,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "38d2b18f-4b5e-4809-bb34-ea1d861bd71b", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3\",\"deletedDate\":1511287002,\"scheduledPurgeDate\":1519063002,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3/0d449237baa54e73b7e5bae040b544ca\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "5a40ab4d-83f2-4ae1-a68a-051f1409fbca", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3\",\"deletedDate\":1520540191,\"scheduledPurgeDate\":1528316191,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3/ed437268ca2045e59b740bae14b0a34f\",\"attributes\":{\"enabled\":true,\"created\":1520540075,\"updated\":1520540075,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:56:41 GMT", + "date" : "Thu, 08 Mar 2018 20:16:31 GMT", "content-length" : "85", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -769,45 +717,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3f19d4a3-34f0-4815-9431-4c34b7395063", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "acbb2324-050f-4f82-98f4-6a3d2ba09ef4", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret3\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:56:52 GMT", - "content-length" : "85", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8de12b90-acce-4581-ac55-40fd664574c1", - "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret3\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 17:57:02 GMT", + "date" : "Thu, 08 Mar 2018 20:16:41 GMT", "content-length" : "366", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -821,19 +743,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "57bc33f9-6d0a-49b2-836e-8eab91879e07", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3\",\"deletedDate\":1511287002,\"scheduledPurgeDate\":1519063002,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3/0d449237baa54e73b7e5bae040b544ca\",\"attributes\":{\"enabled\":true,\"created\":1511286863,\"updated\":1511286863,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "a4cbcb72-fe02-4473-8575-8de66630db85", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3\",\"deletedDate\":1520540191,\"scheduledPurgeDate\":1528316191,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret3/ed437268ca2045e59b740bae14b0a34f\",\"attributes\":{\"enabled\":true,\"created\":1520540075,\"updated\":1520540075,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret3?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:57:02 GMT", + "date" : "Thu, 08 Mar 2018 20:16:41 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -845,19 +767,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "039eb221-e047-491e-bcfc-30e8da1824d7", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c0e3a410-f8c9-4a9f-bf12-bedd66c13de4", "Body" : "" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:57:23 GMT", + "date" : "Thu, 08 Mar 2018 20:17:03 GMT", "content-length" : "446", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -871,71 +793,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e7fe70d2-1c9e-407b-919a-1bf0983f247a", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret\",\"deletedDate\":1511287043,\"scheduledPurgeDate\":1519063043,\"contentType\":\"contentType\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret/fa18af2f52d4433294303d6a4080ca18\",\"attributes\":{\"enabled\":true,\"nbf\":948477048,\"exp\":2526400248,\"created\":1511286647,\"updated\":1511286647,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 17:57:23 GMT", - "content-length" : "84", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4c28cd61-1400-4580-b06b-ee62bd60b677", - "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret\"}}" - } - }, { - "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret?api-version=2016-10-01", - "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", - "Content-Type" : "application/json; charset=utf-8" - }, - "Response" : { - "date" : "Tue, 21 Nov 2017 17:57:33 GMT", - "content-length" : "84", - "server" : "Microsoft-IIS/8.5", - "expires" : "-1", - "x-aspnet-version" : "4.0.30319", - "retry-after" : "0", - "StatusCode" : "404", - "pragma" : "no-cache", - "strict-transport-security" : "max-age=31536000;includeSubDomains", - "x-content-type-options" : "nosniff", - "x-powered-by" : "ASP.NET", - "content-type" : "application/json; charset=utf-8", - "x-ms-keyvault-region" : "West US", - "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c3bd1550-21f7-4bd6-a1f6-e5af0afc833e", - "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "56ba4361-d9d9-4a59-807c-3ce34be003c9", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret\",\"deletedDate\":1520540223,\"scheduledPurgeDate\":1528316223,\"contentType\":\"contentType\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret/9f3f0b1a09b44e7cbc492021e396caca\",\"attributes\":{\"enabled\":true,\"nbf\":947361094,\"exp\":2525284294,\"created\":1520538694,\"updated\":1520538694,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:57:44 GMT", + "date" : "Thu, 08 Mar 2018 20:17:03 GMT", "content-length" : "84", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -949,19 +819,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "21e53077-49cb-481d-ac1d-60ec31f44daa", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "450d91f8-fa59-452d-a3ee-b831f3a4ac69", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: javaSecret\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:57:54 GMT", + "date" : "Thu, 08 Mar 2018 20:17:12 GMT", "content-length" : "446", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -975,19 +845,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c97d5a32-10e9-4af8-bef4-70883f0c5f71", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret\",\"deletedDate\":1511287043,\"scheduledPurgeDate\":1519063043,\"contentType\":\"contentType\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret/fa18af2f52d4433294303d6a4080ca18\",\"attributes\":{\"enabled\":true,\"nbf\":948477048,\"exp\":2526400248,\"created\":1511286647,\"updated\":1511286647,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ea5ca130-02dc-4d1e-9928-f11132b76f5d", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret\",\"deletedDate\":1520540223,\"scheduledPurgeDate\":1528316223,\"contentType\":\"contentType\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret/9f3f0b1a09b44e7cbc492021e396caca\",\"attributes\":{\"enabled\":true,\"nbf\":947361094,\"exp\":2525284294,\"created\":1520538694,\"updated\":1520538694,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/javaSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:57:54 GMT", + "date" : "Thu, 08 Mar 2018 20:17:14 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -999,8 +869,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "754e068b-079b-40c2-8554-9a50463f66eb", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ca8ba993-3f35-41f8-a21f-60092813ab3a", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/secretAsyncForAsyncOperationsTest.json b/azure-keyvault/target/test-classes/session-records/secretAsyncForAsyncOperationsTest.json index a173029..3c86da6 100644 --- a/azure-keyvault/target/test-classes/session-records/secretAsyncForAsyncOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/secretAsyncForAsyncOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:24 GMT", + "date" : "Wed, 07 Mar 2018 19:05:54 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e8320bf1-71ac-493d-8a92-6c47d0d37639", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "f15b90a0-d140-4e87-bc6b-69a2a137319b", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:24 GMT", + "date" : "Wed, 07 Mar 2018 19:05:54 GMT", "content-length" : "236", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "3d1d1a9a-e63a-4570-883c-c3ae42cfa2a3", - "Body" : "{\"value\":\"password\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/69690e825eb944d6babe888aeacecbc6\",\"attributes\":{\"enabled\":true,\"created\":1511294784,\"updated\":1511294784,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7e53dbe6-514a-4688-8a93-5d5653f79370", + "Body" : "{\"value\":\"password\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/c3e25a8a351140fea24c76f1ada5f15a\",\"attributes\":{\"enabled\":true,\"created\":1520449555,\"updated\":1520449555,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "PATCH", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/69690e825eb944d6babe888aeacecbc6?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/c3e25a8a351140fea24c76f1ada5f15a?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:24 GMT", + "date" : "Wed, 07 Mar 2018 19:05:54 GMT", "content-length" : "217", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "acc9f2a3-684f-4452-a7fe-7178e6b5f584", - "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/69690e825eb944d6babe888aeacecbc6\",\"attributes\":{\"enabled\":true,\"created\":1511294784,\"updated\":1511294785,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "85096c57-3296-4f92-9c74-0c26370ae12d", + "Body" : "{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/c3e25a8a351140fea24c76f1ada5f15a\",\"attributes\":{\"enabled\":true,\"created\":1520449555,\"updated\":1520449555,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/69690e825eb944d6babe888aeacecbc6?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/c3e25a8a351140fea24c76f1ada5f15a?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:24 GMT", + "date" : "Wed, 07 Mar 2018 19:05:55 GMT", "content-length" : "236", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,20 +99,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "bee9be16-305d-485f-ba54-fba6d9abca4f", - "Body" : "{\"value\":\"password\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/69690e825eb944d6babe888aeacecbc6\",\"attributes\":{\"enabled\":true,\"created\":1511294784,\"updated\":1511294785,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "28e9a05b-7bca-489f-b2d8-16f19787e06b", + "Body" : "{\"value\":\"password\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/c3e25a8a351140fea24c76f1ada5f15a\",\"attributes\":{\"enabled\":true,\"created\":1520449555,\"updated\":1520449555,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?maxresults=2&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?maxresults=2&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:25 GMT", - "content-length" : "327", + "date" : "Wed, 07 Mar 2018 19:05:55 GMT", + "content-length" : "910", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -125,20 +125,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8243f63e-48d1-438d-9fe9-5c286f672fcb", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDQhTURBd01ETXpJWE5sWTNKbGRDOURVa1ZCVkVWVFJVeEdVMGxIVGtWRVNrRldRVkJMUTFNeE1pRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "655383a8-000b-4fbd-aa1b-4f5ca137e313", + "Body" : "{\"value\":[{\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/cancellationRequestedCertJava\",\"managed\":true,\"attributes\":{\"enabled\":false,\"nbf\":1519842497,\"exp\":1551379097,\"created\":1519843097,\"updated\":1519843097,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/createManualEnrollmentJava\",\"managed\":true,\"attributes\":{\"enabled\":false,\"nbf\":1519842513,\"exp\":1551379113,\"created\":1519843113,\"updated\":1519843113,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDQhTURBd01ETXpJWE5sWTNKbGRDOURVa1ZCVkVWVFJVeEdVMGxIVGtWRVNrRldRVkJMUTFNeE1pRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDQhTURBd01ETXpJWE5sWTNKbGRDOURVa1ZCVkVWVFJVeEdVMGxIVGtWRVNrRldRVkJMUTFNeE1pRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiExMDQhTURBd01ETXpJWE5sWTNKbGRDOURVa1ZCVkVWVFJVeEdVMGxIVGtWRVNrRldRVkJMUTFNeE1pRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:25 GMT", - "content-length" : "315", + "date" : "Wed, 07 Mar 2018 19:05:55 GMT", + "content-length" : "316", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -151,20 +151,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "171118ed-a7c9-4ed8-b46c-f6b29b7abc72", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5NiFNREF3TURJM0lYTmxZM0psZEM5RFVrVkJWRVZVUlZOVVNrRldRVkJMUTFNeE1pRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b0e39f7e-2830-477e-8a83-6d0c4e754c2c", + "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5NiFNREF3TURJM0lYTmxZM0psZEM5RFVrVkJWRVZVUlZOVVNrRldRVkJMUTFNeE1pRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5NiFNREF3TURJM0lYTmxZM0psZEM5RFVrVkJWRVZVUlZOVVNrRldRVkJMUTFNeE1pRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5NiFNREF3TURJM0lYTmxZM0psZEM5RFVrVkJWRVZVUlZOVVNrRldRVkJMUTFNeE1pRXdNREF3TWpnaE9UazVPUzB4TWkwek1WUXlNem8xT1RvMU9TNDVPVGs1T1RrNVdpRS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:25 GMT", - "content-length" : "299", + "date" : "Wed, 07 Mar 2018 19:05:55 GMT", + "content-length" : "467", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -177,20 +177,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "755bb392-614a-4a72-ba9d-e33a0ba6d92f", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lYTmxZM0psZEM5S1FWWkJVMFZEVWtWVUlUQXdNREF5T0NFeU1ERTNMVEV4TFRFMlZEQXlPakExT2pFMkxqRXpOak13TkRCYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "36056732-0687-45b3-9d2b-5b68dae2c3e6", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/default\",\"attributes\":{\"enabled\":true,\"created\":1518572677,\"updated\":1518572677,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3MiFNREF3TURFd0lYTmxZM0psZEM5RlJVVWhNREF3TURJNElUazVPVGt0TVRJdE16RlVNak02TlRrNk5Ua3VPVGs1T1RrNU9Wb2giLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lYTmxZM0psZEM5S1FWWkJVMFZEVWtWVUlUQXdNREF5T0NFeU1ERTNMVEV4TFRFMlZEQXlPakExT2pFMkxqRXpOak13TkRCYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE3MiFNREF3TURFd0lYTmxZM0psZEM5RlJVVWhNREF3TURJNElUazVPVGt0TVRJdE16RlVNak02TlRrNk5Ua3VPVGs1T1RrNU9Wb2giLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:26 GMT", - "content-length" : "578", + "date" : "Wed, 07 Mar 2018 19:05:56 GMT", + "content-length" : "479", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -203,20 +203,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "0dae18a0-66d3-45c4-bcd1-305868e6fc72", - "Body" : "{\"value\":[{\"contentType\":\"contentType\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret\",\"attributes\":{\"enabled\":true,\"nbf\":948477554,\"exp\":2526400754,\"created\":1511287153,\"updated\":1511287153,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b604a5bc-5c1e-403e-851a-87001c462791", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/eee\",\"attributes\":{\"enabled\":true,\"created\":1518572548,\"updated\":1518572548,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lYTmxZM0psZEM5S1FWWkJVMFZEVWtWVUlUQXdNREF5T0NFeU1ERTNMVEV5TFRBM1ZEQXdPak01T2pFMkxqRTNOall3TURoYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4NCFNREF3TURFM0lYTmxZM0psZEM5S1FWWkJVMFZEVWtWVUlUQXdNREF5T0NFeU1ERTNMVEV5TFRBM1ZEQXdPak01T2pFMkxqRTNOall3TURoYUlRLS0iLCJUYXJnZXRMb2NhdGlvbiI6MH0&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:26 GMT", - "content-length" : "310", + "date" : "Wed, 07 Mar 2018 19:05:56 GMT", + "content-length" : "776", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -229,20 +229,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "77c2324b-94a2-4444-ad54-2d3838fb8c88", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV6SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c3dab411-6e8e-410c-ac10-84b73632e146", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret\",\"attributes\":{\"enabled\":true,\"created\":1512607155,\"updated\":1512607155,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate0\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036639,\"updated\":1520036639,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV6SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV4SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:26 GMT", - "content-length" : "304", + "date" : "Wed, 07 Mar 2018 19:05:56 GMT", + "content-length" : "868", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -255,20 +255,20 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "9061b9b3-6b9d-46be-9801-d69b46b35cce", - "Body" : "{\"value\":[],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lYTmxZM0psZEM5TldVTkZVbFJKUmtsRFFWUkZJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "20886693-1c71-4985-9d79-8e622e8ec396", + "Body" : "{\"value\":[{\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate1\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036640,\"updated\":1520036640,\"recoveryLevel\":\"Recoverable+Purgeable\"}},{\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate2\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036641,\"updated\":1520036641,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV6SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lYTmxZM0psZEM5TldVTkZVbFJKUmtsRFFWUkZJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJeklYTmxZM0psZEM5TVNWTlVRMFZTVkVsR1NVTkJWRVV6SVRBd01EQXlPQ0U1T1RrNUxURXlMVE14VkRJek9qVTVPalU1TGprNU9UazVPVGxhSVEtLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:26 GMT", - "content-length" : "793", + "date" : "Wed, 07 Mar 2018 19:05:57 GMT", + "content-length" : "583", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -281,19 +281,45 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "295cc570-0ddc-4a35-8010-00a662eb3fc7", - "Body" : "{\"value\":[{\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/myCertificate\",\"managed\":true,\"attributes\":{\"enabled\":false,\"nbf\":1511294145,\"exp\":1542830745,\"created\":1511294745,\"updated\":1511294747,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"tag1\":\"foo\"}},{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret\",\"attributes\":{\"enabled\":true,\"created\":1511294784,\"updated\":1511294785,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElYTmxZM0psZEM5VFJVeEdVMGxIVGtWRVNrRldRVkJGVFNFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9a828171-f4d6-4b8e-a484-21357c839111", + "Body" : "{\"value\":[{\"contentType\":\"application/x-pkcs12\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/listCertificate3\",\"managed\":true,\"attributes\":{\"enabled\":true,\"nbf\":1430344421,\"exp\":2208988799,\"created\":1520036641,\"updated\":1520036641,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lYTmxZM0psZEM5TldVTkZVbFJKUmtsRFFWUkZJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2\"}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=2016-10-01&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElYTmxZM0psZEM5VFJVeEdVMGxIVGtWRVNrRldRVkJGVFNFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE4OCFNREF3TURJd0lYTmxZM0psZEM5TldVTkZVbFJKUmtsRFFWUkZJVEF3TURBeU9DRTVPVGs1TFRFeUxUTXhWREl6T2pVNU9qVTVMams1T1RrNU9UbGFJUS0tIiwiVGFyZ2V0TG9jYXRpb24iOjB9&maxresults=2", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:27 GMT", + "date" : "Wed, 07 Mar 2018 19:05:57 GMT", + "content-length" : "495", + "server" : "Microsoft-IIS/8.5", + "expires" : "-1", + "x-aspnet-version" : "4.0.30319", + "retry-after" : "0", + "StatusCode" : "200", + "pragma" : "no-cache", + "strict-transport-security" : "max-age=31536000;includeSubDomains", + "x-content-type-options" : "nosniff", + "x-powered-by" : "ASP.NET", + "content-type" : "application/json; charset=utf-8", + "x-ms-keyvault-region" : "West US", + "cache-control" : "no-cache", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "b312ffec-ae3c-4f14-b9ac-667996d310ad", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret\",\"attributes\":{\"enabled\":true,\"created\":1520449555,\"updated\":1520449555,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":\"https://tifchen-keyvault-fancy.vault.azure.net:443/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElYTmxZM0psZEM5VFJVeEdVMGxIVGtWRVNrRldRVkJGVFNFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2\"}" + } + }, { + "Method" : "GET", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets?api-version=7.0-preview&$skiptoken=eyJOZXh0TWFya2VyIjoiMiE5MiFNREF3TURJMElYTmxZM0psZEM5VFJVeEdVMGxIVGtWRVNrRldRVkJGVFNFd01EQXdNamdoT1RrNU9TMHhNaTB6TVZReU16bzFPVG8xT1M0NU9UazVPVGs1V2lFLSIsIlRhcmdldExvY2F0aW9uIjowfQ&maxresults=2", + "Headers" : { + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", + "Content-Type" : "application/json; charset=utf-8" + }, + "Response" : { + "date" : "Wed, 07 Mar 2018 19:05:57 GMT", "content-length" : "28", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -307,19 +333,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "dc04f570-7313-483e-876c-e6b313f55123", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "3dbeb831-26c6-431e-a8f0-162624d40d42", "Body" : "{\"value\":[],\"nextLink\":null}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/versions?maxresults=2&api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/versions?maxresults=2&api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:27 GMT", + "date" : "Wed, 07 Mar 2018 19:05:58 GMT", "content-length" : "245", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -333,19 +359,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "8221782f-a4cb-4bc8-9f4c-d53855a8fd24", - "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/69690e825eb944d6babe888aeacecbc6\",\"attributes\":{\"enabled\":true,\"created\":1511294784,\"updated\":1511294785,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "ea95db10-b1ef-4175-83c8-c28a08f95963", + "Body" : "{\"value\":[{\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/c3e25a8a351140fea24c76f1ada5f15a\",\"attributes\":{\"enabled\":true,\"created\":1520449555,\"updated\":1520449555,\"recoveryLevel\":\"Recoverable+Purgeable\"}}],\"nextLink\":null}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:28 GMT", + "date" : "Wed, 07 Mar 2018 19:05:58 GMT", "content-length" : "360", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -359,19 +385,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e4cad402-e96a-4893-b803-45df4f14b7ea", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret\",\"deletedDate\":1511294788,\"scheduledPurgeDate\":1519070788,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/69690e825eb944d6babe888aeacecbc6\",\"attributes\":{\"enabled\":true,\"created\":1511294784,\"updated\":1511294785,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c22f1b6e-c56d-4576-a9a5-d3997d503166", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret\",\"deletedDate\":1520449558,\"scheduledPurgeDate\":1528225558,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/c3e25a8a351140fea24c76f1ada5f15a\",\"attributes\":{\"enabled\":true,\"created\":1520449555,\"updated\":1520449555,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:28 GMT", + "date" : "Wed, 07 Mar 2018 19:05:58 GMT", "content-length" : "74", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -385,19 +411,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "59604d6c-1143-40b5-91c1-400b858deb39", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "435443c2-7cad-45ca-bf3d-450084f13b18", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Secret not found: mySecret\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:28 GMT", + "date" : "Wed, 07 Mar 2018 19:05:58 GMT", "content-length" : "82", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -411,19 +437,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "f0c77c6d-e619-4cae-8dc3-489a2a5224a9", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "691d3b3a-e458-4f51-b930-7c1152dd0997", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: mySecret\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:39 GMT", + "date" : "Wed, 07 Mar 2018 19:06:09 GMT", "content-length" : "82", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -437,19 +463,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "dfcc5c6a-089c-4065-abc3-e116bf63c109", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "800a4b8f-e230-4fb0-921b-abfd4e3bd002", "Body" : "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: mySecret\"}}" } }, { "Method" : "GET", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:50 GMT", + "date" : "Wed, 07 Mar 2018 19:06:19 GMT", "content-length" : "360", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -463,19 +489,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "18c668a5-86ab-4614-a11b-624bce1a582b", - "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret\",\"deletedDate\":1511294788,\"scheduledPurgeDate\":1519070788,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/69690e825eb944d6babe888aeacecbc6\",\"attributes\":{\"enabled\":true,\"created\":1511294784,\"updated\":1511294785,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d2e4370d-b0b4-4574-b074-bb99179f53c5", + "Body" : "{\"recoveryId\":\"https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret\",\"deletedDate\":1520449558,\"scheduledPurgeDate\":1528225558,\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/mySecret/c3e25a8a351140fea24c76f1ada5f15a\",\"attributes\":{\"enabled\":true,\"created\":1520449555,\"updated\":1520449555,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "DELETE", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/deletedsecrets/mySecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 20:06:50 GMT", + "date" : "Wed, 07 Mar 2018 19:06:19 GMT", "server" : "Microsoft-IIS/8.5", "expires" : "-1", "x-aspnet-version" : "4.0.30319", @@ -487,8 +513,8 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1a579b11-02db-4a1b-8766-4b1ab18046cf", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7fd6878d-10a7-4a53-986f-06014044bccb", "Body" : "" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/signVerifyOperationsForKeyOperationsTest.json b/azure-keyvault/target/test-classes/session-records/signVerifyOperationsForKeyOperationsTest.json index 2189ef5..85ee908 100644 --- a/azure-keyvault/target/test-classes/session-records/signVerifyOperationsForKeyOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/signVerifyOperationsForKeyOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:43 GMT", + "date" : "Thu, 08 Mar 2018 20:08:31 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "2ee6409a-edc3-45d5-abec-e4e62225bae3", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9784bcf5-f5ce-4bfa-9160-223972cedca6", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:43 GMT", + "date" : "Thu, 08 Mar 2018 20:08:31 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "03cb5285-4afe-4a1b-8258-ba71aacfd38d", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/fd6d55d4017646769aa79f917439c42e\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230544,\"updated\":1511230544,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "4e371207-35d4-4c5a-b86a-26d13a21cd86", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/accc35ea21684e41b0c564a035615268\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539712,\"updated\":1520539712,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//sign?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//sign?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:43 GMT", + "date" : "Thu, 08 Mar 2018 20:08:32 GMT", "content-length" : "455", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b83f910d-1224-4960-b312-934991325157", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/fd6d55d4017646769aa79f917439c42e\",\"value\":\"VycNS2AleyY425cgT02DdqHgz0r95vm0UDEsnG8uQiT7IfxflrjKM_d8PvOeV6JA6kamk6lhvFKnJqXyNmFaPcI7RcibAW-e3-9k91TEegUNl4dZpPeuy6AY5-CkafXBBTHCCOAfGuyCeNnr8jJF7teQa_Z246wgoOiGACQx37C2m9jb2x-Q3-mxo8utyi3NFu8LCJs7C9h_AlcszRJ0l9a0dP97YnNFW75GtBpfjt7frZFUGdJNeWvZXBhCzhtYN9ynN6SHIKKVfZEe-Uqc3HvY63oEGvVGcPnWeV2wY8NfQn04gji3hdKKyRH0VLSkwHJpSA7V42EDaPbaQCriQA\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "65c15ba0-ca33-4016-985e-109825142271", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/accc35ea21684e41b0c564a035615268\",\"value\":\"VycNS2AleyY425cgT02DdqHgz0r95vm0UDEsnG8uQiT7IfxflrjKM_d8PvOeV6JA6kamk6lhvFKnJqXyNmFaPcI7RcibAW-e3-9k91TEegUNl4dZpPeuy6AY5-CkafXBBTHCCOAfGuyCeNnr8jJF7teQa_Z246wgoOiGACQx37C2m9jb2x-Q3-mxo8utyi3NFu8LCJs7C9h_AlcszRJ0l9a0dP97YnNFW75GtBpfjt7frZFUGdJNeWvZXBhCzhtYN9ynN6SHIKKVfZEe-Uqc3HvY63oEGvVGcPnWeV2wY8NfQn04gji3hdKKyRH0VLSkwHJpSA7V42EDaPbaQCriQA\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//verify?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//verify?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:44 GMT", + "date" : "Thu, 08 Mar 2018 20:08:32 GMT", "content-length" : "14", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "1939dde0-b44b-4cb7-878e-6cb5f11dd7b5", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7d92d997-49cd-4ae3-af03-6346cc10137b", "Body" : "{\"value\":true}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/fd6d55d4017646769aa79f917439c42e/sign?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/accc35ea21684e41b0c564a035615268/sign?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:44 GMT", + "date" : "Thu, 08 Mar 2018 20:08:32 GMT", "content-length" : "455", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,19 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "87d2f587-8e21-4296-8e11-2f83dcbc5f13", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/fd6d55d4017646769aa79f917439c42e\",\"value\":\"VycNS2AleyY425cgT02DdqHgz0r95vm0UDEsnG8uQiT7IfxflrjKM_d8PvOeV6JA6kamk6lhvFKnJqXyNmFaPcI7RcibAW-e3-9k91TEegUNl4dZpPeuy6AY5-CkafXBBTHCCOAfGuyCeNnr8jJF7teQa_Z246wgoOiGACQx37C2m9jb2x-Q3-mxo8utyi3NFu8LCJs7C9h_AlcszRJ0l9a0dP97YnNFW75GtBpfjt7frZFUGdJNeWvZXBhCzhtYN9ynN6SHIKKVfZEe-Uqc3HvY63oEGvVGcPnWeV2wY8NfQn04gji3hdKKyRH0VLSkwHJpSA7V42EDaPbaQCriQA\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "c1a9461c-348c-463d-8bf0-835ab01924ff", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/accc35ea21684e41b0c564a035615268\",\"value\":\"VycNS2AleyY425cgT02DdqHgz0r95vm0UDEsnG8uQiT7IfxflrjKM_d8PvOeV6JA6kamk6lhvFKnJqXyNmFaPcI7RcibAW-e3-9k91TEegUNl4dZpPeuy6AY5-CkafXBBTHCCOAfGuyCeNnr8jJF7teQa_Z246wgoOiGACQx37C2m9jb2x-Q3-mxo8utyi3NFu8LCJs7C9h_AlcszRJ0l9a0dP97YnNFW75GtBpfjt7frZFUGdJNeWvZXBhCzhtYN9ynN6SHIKKVfZEe-Uqc3HvY63oEGvVGcPnWeV2wY8NfQn04gji3hdKKyRH0VLSkwHJpSA7V42EDaPbaQCriQA\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/fd6d55d4017646769aa79f917439c42e/verify?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/accc35ea21684e41b0c564a035615268/verify?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:15:44 GMT", + "date" : "Thu, 08 Mar 2018 20:08:33 GMT", "content-length" : "14", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,8 +151,8 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "fb7f50dd-def5-44b1-9684-98aa40d10251", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "651ef36f-432f-4da9-a291-797fe3833404", "Body" : "{\"value\":true}" } } ], diff --git a/azure-keyvault/target/test-classes/session-records/transparentAuthenticationForKeyOperationsTest.json b/azure-keyvault/target/test-classes/session-records/transparentAuthenticationForKeyOperationsTest.json index dbfbe7d..3a5a6cf 100644 --- a/azure-keyvault/target/test-classes/session-records/transparentAuthenticationForKeyOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/transparentAuthenticationForKeyOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:08:41 GMT", + "date" : "Thu, 08 Mar 2018 20:02:14 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "63e65d8e-efc6-47ba-b336-e84a52f278d2", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "58851647-92f9-43ee-ad7b-4a4b9cdfa1e2", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:08:43 GMT", + "date" : "Thu, 08 Mar 2018 20:02:14 GMT", "content-length" : "680", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4c8aa4c9-5458-4c2f-8312-e1b183d73a2b", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/0b01a724eb5a4d29ae2b23bceebe4447\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\"],\"n\":\"pjQ5hkAhCK24gnKqfNxwirGPPW2sMQtt3bt4UrT9VNzrfiRG5qeBntgutpySZsOI7fYOqRz9P0OUsSwerV-vWAKSbj-jilRKMAv930_ld_evTwXvan-R1Vekk7QakojriI-fqwQvoXjOcIQBXojJMRQPbqzvLwewBvGEx_Mcl2eEXIIo96VoA7eXgCz8ZI4gv1iMDPw5hffhHC28xyJcUjWCQ8Qqa5lJSBG_jD_vPHFnbwoSzumLmZCEtcA0aC4Kk_s7C1Tlk1zE9unyFg0l3Bvds_UB0SzufOLCXnu0IMfjoea0lYU2Ugddwv3-SgF-vZUZAQjy3gLLS0V4TiLSaQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":948420523,\"exp\":2526343723,\"created\":1511230123,\"updated\":1511230123,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "7806e0f5-29cd-416d-ad33-1b6c5a743775", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/137d21017a7b48b687ab210de4fb7b3a\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\"],\"n\":\"zKL2Gsl4Mg_gRSThhq3cHfBiVTKU1q2-U-5iXD978_dzSAaQtxHraCXNvyXz1SQgUmOYPs0YbgkgFLZHW8XBv4yXT9CCd_eqVaBFMPv1dHDvdaDUQpkUv-QUp7qrsWhilxwD6zd03FQosMs7V76k1M5ikmGUqPuDki1_-7S7Bmm9-ZLjYTOL7Gb0YL4kRs_kb5V_khyH7GwtU5So7T6m2Du5zZgjZ9Az2figHFs3NTToPP1lXdhJ2u9-qCj-u-o1mr63cZph-DFki5yX-C3QuyTyKMepxoGYyNBB5jtKFmNUzhW7_pZv92sM7JLScPxTNPqws6nGWnsMRqQHDuo8hQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"nbf\":947361734,\"exp\":2525284934,\"created\":1520539335,\"updated\":1520539335,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancier.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancier.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:08:44 GMT", + "date" : "Thu, 08 Mar 2018 20:02:14 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "484efb12-3c41-4484-91d7-37b160afba3c", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "760e3fd5-4ef6-478e-9306-26f070ac3c2e", "Body" : "" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancier.vault.azure.net/keys/javaKey/create?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancier.vault.azure.net/keys/javaKey/create?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:08:44 GMT", + "date" : "Thu, 08 Mar 2018 20:02:15 GMT", "content-length" : "654", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,9 +99,9 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "7b5a357e-9323-478c-ab68-bb074892fdbd", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancier.vault.azure.net/keys/javaKey/0610435ef4fa40f3b9195c15ae24a1c2\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"rkgJ7n82Lu10nbzUCOtM9yM2mFP4DQIRF32fuxBl44noX5pqwMCMAWX4Rk0SzX-kBDq2QirKbE-8VavwPM-IVITETRIb1RnriM6W1sDDGDM0PLbmsM7aHxYOTEuThHFRm9d85iidlvTDLq6jL4VeL99tzSc9Yi98SqeUDioBv316uJxwRT_FHMcj2k1U2hzZInJV59bk4I9mgY6VCaawPIxQkoX09hzKQhRvWO4Sk7iCInjESviCo8cWuX71K-TYDInszq_BSESdrPC6amUUmG8fRJHE1xOZ3OoDgl_S6T1AKIAoS3J8o54IdZhBDwlG1i55EZ0sR0HgkS8DfdGRdQ\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230124,\"updated\":1511230124,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "15f22cfb-9a9f-4fab-9d9e-2c29edeb70e3", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancier.vault.azure.net/keys/javaKey/ec5f81cfa44746e9bd2c459088f00604\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"xInIC8b49iChpufX2xeTAxGlhmkIAM0vQXHl7XJz-t3RkA-hMvVgucDSARo2e1T5SHxYZRzs18qeNM-OUzbax-iAZvEITkvcNnUHWnQFwjr9jsB_GD4bHQvwHvcTbjGrLCUitnNL1dv_tsTBROt4HqTM8rmg5FS4zcHLTKvr4ymVYM9D-GV7PVPLKobXRneadTRVEnfQWsFrVLqFpE9imnhbWQ2OpSug_EEzyggSrwLo9nxJMeHtJjrZ6lKLMBYkLC5DvCVGDnqJR9HIRsnLsbvc25ak0PMP5ox5e0rhCQQUaUWOqnjwR47UCvGZnoVxWFybxUJdSAq8d3ii9mvz7Q\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539336,\"updated\":1520539336,\"recoveryLevel\":\"Purgeable\"}}" } } ], "variables" : [ ] diff --git a/azure-keyvault/target/test-classes/session-records/transparentAuthenticationForSecretOperationsTest.json b/azure-keyvault/target/test-classes/session-records/transparentAuthenticationForSecretOperationsTest.json index 6e837d1..a576e3f 100644 --- a/azure-keyvault/target/test-classes/session-records/transparentAuthenticationForSecretOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/transparentAuthenticationForSecretOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:12 GMT", + "date" : "Thu, 08 Mar 2018 20:18:10 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c9a540e9-0eed-4d46-b805-c2f1d73fa6ff", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "91939041-a007-4449-bb8f-476db709835e", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:12 GMT", + "date" : "Thu, 08 Mar 2018 20:18:10 GMT", "content-length" : "357", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "cea6a2f4-11ff-469e-a063-1a2bcf87b9f1", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"contentType\":\"contentType\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret/532818c21f384c79854ad333dfe4e3c1\",\"attributes\":{\"enabled\":true,\"nbf\":948477554,\"exp\":2526400754,\"created\":1511287153,\"updated\":1511287153,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "bf06fe79-2347-4386-825b-5adabf0fbf55", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"contentType\":\"contentType\",\"id\":\"https://tifchen-keyvault-fancy.vault.azure.net/secrets/javaSecret/58d2ca009c244b3bba92306d05a108f6\",\"attributes\":{\"enabled\":true,\"nbf\":947362690,\"exp\":2525285890,\"created\":1520540290,\"updated\":1520540290,\"recoveryLevel\":\"Recoverable+Purgeable\"},\"tags\":{\"foo\":\"baz\"}}" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancier.vault.azure.net/secrets/javaSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancier.vault.azure.net/secrets/javaSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:12 GMT", + "date" : "Thu, 08 Mar 2018 20:18:10 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "e0c57c83-4532-434b-8fac-30b480465feb", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "adc27dde-2355-4f20-8de9-1ac5da042686", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancier.vault.azure.net/secrets/javaSecret?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancier.vault.azure.net/secrets/javaSecret?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 17:59:13 GMT", + "date" : "Thu, 08 Mar 2018 20:18:10 GMT", "content-length" : "265", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,9 +99,9 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "4ccec423-1490-4f76-be27-6c9a31e27007", - "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancier.vault.azure.net/secrets/javaSecret/9f162f2397034ed2893ca77abdb5832a\",\"attributes\":{\"enabled\":true,\"created\":1511287153,\"updated\":1511287153,\"recoveryLevel\":\"Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "92d3d303-4116-4c6d-b7be-69e144933617", + "Body" : "{\"value\":\"Chocolate is hidden in the toothpaste cabinet\",\"id\":\"https://tifchen-keyvault-fancier.vault.azure.net/secrets/javaSecret/fb595473d1b948a5b88af2ed4c515bc0\",\"attributes\":{\"enabled\":true,\"created\":1520540291,\"updated\":1520540291,\"recoveryLevel\":\"Purgeable\"}}" } } ], "variables" : [ ] diff --git a/azure-keyvault/target/test-classes/session-records/wrapUnwrapOperationsForKeyOperationsTest.json b/azure-keyvault/target/test-classes/session-records/wrapUnwrapOperationsForKeyOperationsTest.json index bd2a651..a7f7dd8 100644 --- a/azure-keyvault/target/test-classes/session-records/wrapUnwrapOperationsForKeyOperationsTest.json +++ b/azure-keyvault/target/test-classes/session-records/wrapUnwrapOperationsForKeyOperationsTest.json @@ -1,13 +1,13 @@ { "networkCallRecords" : [ { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:57 GMT", + "date" : "Thu, 08 Mar 2018 20:10:33 GMT", "content-length" : "0", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -21,19 +21,19 @@ "x-powered-by" : "ASP.NET", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "c9163e04-f348-460b-a0e9-2ff14018ff3f", + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "d8b7d570-2401-4644-a07a-6b83b6547b27", "Body" : "" } }, { "Method" : "PUT", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:57 GMT", + "date" : "Thu, 08 Mar 2018 20:10:33 GMT", "content-length" : "664", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -47,19 +47,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b89fc34b-2f65-4775-8b5f-cc36bcf5075c", - "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/49c91d0e4a5345658a83f31475eacafa\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1511230677,\"updated\":1511230677,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "fe861fd9-1622-4468-a798-5bbe3df4448a", + "Body" : "{\"key\":{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b61ac719d3634bc785300c59f1702f41\",\"kty\":\"RSA\",\"key_ops\":[\"encrypt\",\"decrypt\",\"sign\",\"verify\",\"wrapKey\",\"unwrapKey\"],\"n\":\"1_6ZtP288hEkKML-L6nFyZh1PD1rmAgwbbwjEvTSDK_008BYWhjp_6ULy9BhWtRIytNkPkm9gzaBTrCpp-vyDXPGa836Htp-w8u5JmxoUZchJh576m3m-8ZYWTmZSAp5SpruyKAmLSxPJHEWPXQntnmuTMjb9HBT9Ltrwc0ZDk-jsMLYunDJrNmrRUxQgb0zQ_Tl5fJjj8j-0KVx2RXtbfWFvf5fRdBYyP3m0aUpoopQPwtXszD2LcSKMJ_TnmnvMWr8MOA5aRlBaGdBk7zBgRafvDPam3Q2AvFA9mfcAVncpfZ3JFm73VARw6MofXtRqOHtZ7y4oNbY95xXwU2r6w\",\"e\":\"AQAB\"},\"attributes\":{\"enabled\":true,\"created\":1520539834,\"updated\":1520539834,\"recoveryLevel\":\"Recoverable+Purgeable\"}}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//wrapkey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//wrapkey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:58 GMT", + "date" : "Thu, 08 Mar 2018 20:10:34 GMT", "content-length" : "455", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -73,19 +73,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "6ed74d0e-f477-410f-9a06-8b7da6f10684", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/49c91d0e4a5345658a83f31475eacafa\",\"value\":\"pEiKnut1WJWdgi-CAJdIDCJ7UWdxWlj3mVLRmDoouFqgjUy_m9KYTOmbq00Cp7W8rF41CZqbF6-E7bq42V7PlwIIrZ1w7io0vUqEs0xdRdQviBfd-49cDkEUUR9MClZmvlrV0Wg9ckiuOuLLIkO1rLusi2cNOhMFPgiVXN-5Mvo2vtHVFZIYeiMAp--I7y7A0DMu94z_qm3IRGrhwXxDiW43f9OLkbMsuiuZlF8UUaexleIdluzNEAyNbpwtM7frS4UXC31XrznFArUPKSsG7SmCdjeG7UDLPmna8kDHpOrsN1SBrSH-pNRPAiQ_QL-3YsDy9v9UmP1dv9pydoicew\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "58000449-c725-44eb-a174-a45a6179e050", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b61ac719d3634bc785300c59f1702f41\",\"value\":\"AQv3F-EbaKD5J9JC1pkJ81X4o7Q58kpEHMMUF6mo-d1Od1ZxOLXpAuONzAuR1svtvaS7EqOdtHYTUbVSe0lRcrXJolVAIftS3y3nKWh9tAoXNAk_X33v-yGB-u4SUXygbLUGrObqae2UUiCvKGUOwdpAv8I5mJbGWpsqwLqpvPLsKHnNVdR59JLudfhKGLdUdYJSgvOCsMbz494gC24khIBq2qYFgI2VcEyRXwKUVsxAWOM79s4TZx0JIYLAN68JctcayRy4IHOB_dIOMqs_LnaHS4FUHv-OAGMB9zYzzzKrITIlb1iaGa1gkfvCxR7oNF6PXVRQNGFYV0N_1V_rWw\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//unwrapkey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey//unwrapkey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:58 GMT", + "date" : "Thu, 08 Mar 2018 20:10:34 GMT", "content-length" : "247", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -99,19 +99,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "139394bc-82c4-4f80-8e70-b8aa0e5aabeb", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/49c91d0e4a5345658a83f31475eacafa\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "e2151a6e-d710-4593-b781-864d5f845a4a", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b61ac719d3634bc785300c59f1702f41\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/49c91d0e4a5345658a83f31475eacafa/wrapkey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b61ac719d3634bc785300c59f1702f41/wrapkey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:58 GMT", + "date" : "Thu, 08 Mar 2018 20:10:34 GMT", "content-length" : "455", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -125,19 +125,19 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "ecce3439-094f-499b-b564-c2cfed3e2e47", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/49c91d0e4a5345658a83f31475eacafa\",\"value\":\"k5H9sBzAlB81sOpss_HS_Aqoq5tRpYR8LCJIki9V4jAxajiDKl964_d_fHULzbAYbnyE-xENeovlbvpSIytawdySvXKef915X9LgM8bm53LlNFOaCDjK_hu7NMBwLxmO7cUZ_D9iXdYc1naOfxqbZr5OXTXfnRusdrDLtjsp0nWyHzeRhMC-49CbAKJ3aKcrqbWGIsFyMNfV-GM8dMD-Byvc7RMIXRcYXsPdOJXmy016QVQXDg60jU6VhoJDTxc8wWZ84hdD0SthjPI_Y_keuwF6MCxibQ2SruznBIg1NZPhMmACxEHiVH7tFbW9JLLfwmTGKQbVU9WcFTjaua-qiw\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "9ead81a5-5b41-4834-a950-0c7bdb472301", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b61ac719d3634bc785300c59f1702f41\",\"value\":\"LvhE5r7H_lEy3VUhJHhDo-5WTrlRG8JumdypsOJPt2CihJhB_OTU2R9oefP2Pp6ExBskiApRDN7VKihmtyyzPZTGr1bO392CPUE36JrXSvxykYMOK0WqVZxQgNEA646GXWG8H6MBisD7NtqHI9ZQvNDy4CCLF8GZqVhjlZD5ryCu7KyD62-B0KmyLPXNCIuVx57h6Hbvl-th4D7pgZTU-ZcXJx9BMwbhJF-_ZymDcCUPW9GnApU3e93GWWJXNbn2MsCXSZuBprYua-wFG_0XbwTjJ95tc8Z9Y2-3W1vsQiQNZu40-bCj0yXcwXWK7BUYFKBrp72l-2y6qTsDnr5fHQ\"}" } }, { "Method" : "POST", - "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/49c91d0e4a5345658a83f31475eacafa/unwrapkey?api-version=2016-10-01", + "Uri" : "https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b61ac719d3634bc785300c59f1702f41/unwrapkey?api-version=7.0-preview", "Headers" : { - "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 2016-10-01)", + "User-Agent" : "Azure-SDK-For-Java/null OS:Windows 10/10.0 MacAddressHash:08b8c65810754c5927ba6275e7902c61544ffc9cb2de4d24196bc80b2fbba780 Java:1.8.0_141-2-redhat (KeyVaultClientBase, 7.0-preview)", "Content-Type" : "application/json; charset=utf-8" }, "Response" : { - "date" : "Tue, 21 Nov 2017 02:17:58 GMT", + "date" : "Thu, 08 Mar 2018 20:10:34 GMT", "content-length" : "247", "server" : "Microsoft-IIS/8.5", "expires" : "-1", @@ -151,9 +151,9 @@ "content-type" : "application/json; charset=utf-8", "x-ms-keyvault-region" : "West US", "cache-control" : "no-cache", - "x-ms-keyvault-service-version" : "1.0.0.828", - "x-ms-request-id" : "b0ffcfe0-b4c1-424d-9b69-7eb92d87eea7", - "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/49c91d0e4a5345658a83f31475eacafa\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" + "x-ms-keyvault-service-version" : "1.0.0.841", + "x-ms-request-id" : "bfed39c0-2c13-49d2-8228-03cc157c7730", + "Body" : "{\"kid\":\"https://tifchen-keyvault-fancy.vault.azure.net/keys/javaKey/b61ac719d3634bc785300c59f1702f41\",\"value\":\"G9GT23aoJ9lUS5WtxwlS9igODCiTObv_Z7U9HhTbk99t_24WdBcngS2ycvtJ7_VQ6ESEKt1QdoI8UMRwh2UOMalPrw1leEgbwgpOtCPjmzCk2fhuxCHyinA3x0iGnD2jyYaXiw\"}" } } ], "variables" : [ ] diff --git a/pom.xml b/pom.xml index a00a3ff..663fd97 100644 --- a/pom.xml +++ b/pom.xml @@ -6,7 +6,7 @@ 4.0.0 com.microsoft.azure - 1.1-alpha-1 + 1.1-alpha-2 azure-keyvault-parent pom