-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add core-http-compat in Key Vault Admin #20900
Add core-http-compat in Key Vault Admin #20900
Conversation
I don't think I need to do a minor version bump for this, but please let me know if I should. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚀 I think this is fine but I am really surprised there are no code changes associated with this - does core-http-compat patch things when included? Like how does CommonClientOptions gets replaced with ExtendedCommonClientOptions?
@maorleger thanks for pointing this out, I updated the ClientOptions to extend from |
This pull request is protected by Check Enforcer. What is Check Enforcer?Check Enforcer helps ensure all pull requests are covered by at least one check-run (typically an Azure Pipeline). When all check-runs associated with this pull request pass then Check Enforcer itself will pass. Why am I getting this message?You are getting this message because Check Enforcer did not detect any check-runs being associated with this pull request within five minutes. This may indicate that your pull request is not covered by any pipelines and so Check Enforcer is correctly blocking the pull request being merged. What should I do now?If the check-enforcer check-run is not passing and all other check-runs associated with this PR are passing (excluding license-cla) then you could try telling Check Enforcer to evaluate your pull request again. You can do this by adding a comment to this pull request as follows: What if I am onboarding a new service?Often, new services do not have validation pipelines associated with them, in order to bootstrap pipelines for a new service, you can issue the following command as a pull request comment: |
/azp run js - keyvault - ci |
Azure Pipelines successfully started running 1 pipeline(s). |
Just thinking about this, this is such a niche package (600 weekly downloads) with such a narrow API I wonder if it's even worth the added complexity of the core-http compat shim here... Like there's only one previous version, it's hardly used, and when it is used it's mostly for admin tasks (backup/restore, access control) against a managed HSM. it doesn't even work on normal key vault. I advocate skipping this for keyvault-admin |
Huh, I pressed ctrl+enter I think and it closed the PR - sorry about that! |
If that it's the case, I can agree on skipping this package. |
A new version of Key Vault Admin has been released without the core-http-compat changes, therefore I'm closing this PR. This PR can be reopened in the future if customers want this compat feature. |
Packages impacted by this PR
@azure/keyvault-admin
Issues associated with this PR
core-http-compat
#20919Describe the problem that is addressed by this PR
KeyVault Admin has already migrated to the new Core client and Core rest pipeline libraries, however, this introduced too many breaking changes. In order to minimize the braking changes,
core-http-compat
was created. This PR regenerates the client with the latest version of autorest, with thecore-http-compat-mode
flag set to true, and no longer depending oncore-http
.Checklists