diff --git a/sdk/keyvault/azure-keyvault-certificates/HISTORY.md b/sdk/keyvault/azure-keyvault-certificates/HISTORY.md new file mode 100644 index 000000000000..a706f9774c09 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/HISTORY.md @@ -0,0 +1,5 @@ +# Release History + +## 4.0.0b1 (2019-06-28) +For release notes and more information please visit +https://aka.ms/azure-sdk-preview1-python diff --git a/sdk/keyvault/azure-keyvault-certificates/MANIFEST.in b/sdk/keyvault/azure-keyvault-certificates/MANIFEST.in new file mode 100644 index 000000000000..7872cdc8cbae --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/MANIFEST.in @@ -0,0 +1,6 @@ +include *.md +include azure/__init__.py +include azure/keyvault/__init__.py +include azure/keyvault/certificates/__init__.py +include azure/keyvault/certificates/_generated/__init__.py +include azure/keyvault/certificates/aio/__init__.py diff --git a/sdk/keyvault/azure-keyvault-certificates/README.md b/sdk/keyvault/azure-keyvault-certificates/README.md new file mode 100644 index 000000000000..e75752458f9f --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/README.md @@ -0,0 +1,233 @@ +# Azure Key Vault Certificates client library for Python +Azure Key Vault is a cloud service that provides a secure management of certificates, which are built on top of keys and secrets and adds an automated renewal feature. The certificate client library allows you securely store and manage the life-cycle of your certificate, be notified about certificate life-cycle events, and supports automatic renewal with selected issuers. This library offers operations to create, retrieve, update, delete, purge, backup, restore, and list the certificates and its versions, and offers CRUD operations for the certificate issuers, contacts, and management policies of the certificates.. + +[Source code][certificates_client_src] | [Package (PyPI)][pypi_package_certificates] | [API reference documentation][reference_docs] | [Product documentation][keyvault_docs] | [Samples][certificates_samples] +## Getting started +### Install the package +Install the Azure Key Vault client library for Python with [pip][pip]: + +```Bash +pip install azure-keyvault-certificates +``` + +### Prerequisites +* An [Azure subscription][azure_sub]. +* Python 2.7, 3.5.3, or later to use this package. +* An existing Key Vault. If you need to create a Key Vault, you can use the [Azure Cloud Shell][azure_cloud_shell] to create one with this Azure CLI command. Replace `` and `` with your own unique names: + + ```Bash + az keyvault create --resource-group --name + ``` + +### Authenticate the client +In order to interact with the Key Vault service, you'll need to create an instance of the [CertificateClient][certificate_client_docs] class. You would need a **vault url** and **client certificate credentials (client id, client secret, tenant id)** to instantiate a client object for using the `DefaultAzureCredential` examples in the README. `DefaultAzureCredential` authentication is achieved by providing client certificate credentials as seen in this getting started section, but you can find more ways to authenticate with [azure-identity][azure_identity]. + + #### Create/Get credentials +Use the [Azure Cloud Shell][azure_cloud_shell] snippet below to create/get client certificate credentials. + + * Create a service principal and configure its access to Azure resources: + ```Bash + az ad sp create-for-rbac -n --skip-assignment + ``` + Output: + ```json + { + "appId": "generated-app-ID", + "displayName": "dummy-app-name", + "name": "http://dummy-app-name", + "password": "random-password", + "tenant": "tenant-ID" + } + ``` +* Use the credentials returned above to set **AZURE_CLIENT_ID**(appId), **AZURE_CLIENT_SECRET**(password) and (password) and **AZURE_TENANT_ID**(tenant) environment variables. The following example shows a way to do this in Bash: + ```Bash + export AZURE_CLIENT_ID="generated-app-ID" + export AZURE_CLIENT_SECRET="random-password" + export AZURE_TENANT_ID="tenant-ID" + ``` + +* Grant the above mentioned application authorization to perform certificate operations on the keyvault: + ```Bash + az keyvault set-policy --name --spn $AZURE_CLIENT_ID --certificate-permissions backup create delete get import list purge recover restore update + ``` + > --certificate-permissions: + > Accepted values: backup, create, delete, deleteissuers, get, getissuers, import, list, listissuers, managecontacts, manageissuers, purge, recover, restore, setissuers, update + +* Use the above mentioned Key Vault name to retrieve details of your Vault which also contains your Key Vault URL: + ```Bash + az keyvault show --name + ``` + +#### Create Certificate client +Once you've populated the **AZURE_CLIENT_ID**, **AZURE_CLIENT_SECRET** and **AZURE_TENANT_ID** environment variables and replaced **your-vault-url** with the above returned URI, you can create the [CertificateClient][certificate_client_docs]: + +```python + from azure.identity import DefaultAzureCredential + from azure.keyvault.certificates import CertificateClient + + credential = DefaultAzureCredential() + + # Create a new certificate client using the default credential + certificate_client = CertificateClient(vault_url=, credential=credential) +``` +## Key concepts +### Certificate + A certificate is the fundamental resource within Azure KeyVault. From a developer's perspective, Key Vault APIs accept and return certificates as the Certificate type. In addition to the certificate data, the following attributes may be specified: +* expires: Identifies the expiration time on or after which the certificate data should not be retrieved. +* not_before: Identifies the time after which the certificate will be active. +* enabled: Specifies whether the certificate data can be retrieved. +* created: Indicates when this version of the certificate was created. +* updated: Indicates when this version of the certificate was updated. + +### Certificate Client: +The Certificate client performs the interactions with the Azure Key Vault service for getting, setting, updating, deleting, and listing certificates and their versions. An asynchronous and synchronous CertificateClient exists in the SDK allowing for selection of a client based on an application's use case. Once you've initialized a CertificateClient, you can interact with the primary resource types in Key Vault. + +## Examples +The following section provides several code snippets using the above created `certificate_client`, covering some of the most common Azure Key Vault Certificate service related tasks, including: +* [Create a Certificate](#create-a-certificate) +* [Retrieve a Certificate](#retrieve-a-certificate) +* [Update an existing Certificate](#update-an-existing-certificate) +* [Delete a Certificate](#delete-a-certificate) +* [List Certificates](#list-certificates) +* + +### Create a Certificate +`create_certificate` creates a Certificate to be stored in the Azure Key Vault. If a certificate with the same name already exists, then a new version of the certificate is created. +Before creating a certificate, a management policy for the certificate can be created or our default policy will be used. The `create_certificate` operation returns a long running operation poller in both the synchronous and asynchronous method. +```python + create_certificate_poller = certificate_client.create_certificate(name="cert-name") + + create_certificate_poller.wait() + print(create_certificate_poller.result()) +``` + +### Retrieve a Certificate +`get_certificate_with_policy` retrieves a certificate previously stored in the Key Vault without having to specify version. +```python + certificate = certificate_client.get_certificate_with_policy(name="cert-name") + + print(certificate.name) + print(certificate.version) +``` + +### Update an existing Certificate +`update_certificate` updates a certificate previously stored in the Key Vault. +```python + # You can specify additional application-specific metadata in the form of tags. + tags = {"foo": "updated tag"} + + updated_certificate= certificate_client.update_certificate(name="cert-name", tags=tags) + + print(updated_certificate.name) + print(updated_certificate.version) + print(updated_certificate.updated) + print(updated_certificate.tags) + +``` + +### Delete a Certificate +`delete_certificate` deletes a certificate previously stored in the Key Vault. When [soft-delete][soft_delete] is not enabled for the Key Vault, this operation permanently deletes the certificate. +```python + deleted_certificate = certificate_client.delete_certificate(name="cert-name") + + print(deleted_certificate.name) + print(deleted_certificate.deleted_date) +``` +### List Certificates +This example lists all the certificates in the specified Key Vault. +```python + certificates = certificate_client.list_certificates() + + for certificate in certificates: + # this list doesn't include versions of the certificates + print(certificate.name) +``` + +## Troubleshooting +### General +Key Vault clients raise exceptions defined in azure-core. For more detailed information about exceptions and how to deal with them, see [Azure Core exceptions][azure_core_exceptions]. + +For example, if you try to retrieve a certificate after it is deleted a `404` error is returned, indicating resource not found. In the following snippet, the error is handled gracefully by catching the exception and displaying additional information about the error. +```python +from azure.core.exceptions import ResourceNotFoundError +try: + certificate_client.get_certificate(name="deleted_certificate", version="deleted_certificate_version") +except ResourceNotFoundError as e: + print(e.message) + +Output: "certificate not found:deleted_certificate" +``` +### Logging +Network trace logging is disabled by default for this library. When enabled, this will be logged at DEBUG level. The logging policy is used to output the HTTP network trace to the configured logger. You can configure logging to print out debugging information to the stdout or write it to a file using the following example: + + ```python +import sys +import logging + # Create a logger for the 'azure' SDK +logger = logging.getLogger(__name__) +logger.setLevel(logging.DEBUG) + # Configure a console output +handler = logging.StreamHandler(stream=sys.stdout) +logger.addHandler(handler) + # Configure a file output +file_handler = logging.FileHandler(filename) +logger.addHandler(file_handler) + +# Enable network trace logging. This will be logged at DEBUG level. +# By default, network trace logging is disabled. +config = CertificateClient.create_config(credential=credential, logging_enable=True) +client = CertificateClient(vault_url=url, credential=credential, config=config) +``` +The logger can also be enabled per operation. + + ```python +certificate = certificate_client.get_certificate_with_policy(name="cert-name", logging_enable=True) +``` + +## Next steps +Several KeyVault Python SDK samples are available to you in the SDK's GitHub repository. These samples provide example code for additional scenarios commonly encountered while working with Key Vault: +* [test_examples_certificates.py][test_examples_certificates] - Contains the code snippets working with Key Vault certificates. +* [hello_world.py][hello_world_sample] and [hello_world_async.py][hello_world_async_sample] - Python code for working with Azure Key Vault, including: + * Create a new certificate + * Get an existing certificate + * Update an existing certificate + * Delete certificate +* [backup_restore_operations.py][backup_operations_sample] and [backup_restore_operations_async.py][backup_operations_async_sample] - Example code for working with Key Vault certficates backup and recovery, including: + * Create certificate + * Backup a certificate + * Delete the certificate + * Use backed up certificate bytes to restore the deleted certificate + + ### Additional Documentation +For more extensive documentation on Azure Key Vault, see the [API reference documentation][reference_docs]. + +## Contributing +This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com. + +When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA. + +This project has adopted the [Microsoft Open Source Code of Conduct][code_of_conduct]. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments. + + +[asyncio_package]: https://docs.python.org/3/library/asyncio.html +[azure_cloud_shell]: https://shell.azure.com/bash +[azure_core_exceptions]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/core/azure-core/docs/exceptions.md +[azure_identity]: https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/identity/azure-identity +[azure_sub]: https://azure.microsoft.com/free/ +[code_of_conduct]: https://opensource.microsoft.com/codeofconduct/ +[backup_operations_sample]: https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations.py +[backup_operations_async_sample]: https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations_async.py +[hello_world_sample]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-certificates/samples/hello_world.py +[hello_world_async_sample]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-certificates/samples/hello_world_async.py +[certificate_client_docs]: https://azure.github.io/azure-sdk-for-python/ref/azure.keyvault.certificates.html#azure.keyvault.certificates.CertificateClient +[keyvault_docs]: https://docs.microsoft.com/en-us/azure/key-vault/ +[list_operations_sample]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-certificates/samples/list_operations.py +[pip]: https://pypi.org/project/pip/ +[pypi_package_certificates]: https://pypi.org/project/azure-keyvault-certificates/ +[reference_docs]: https://azure.github.io/azure-sdk-for-python/ref/azure.keyvault.certificates.html +[certificates_client_src]: https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault/azure/keyvault/certificates +[certificates_samples]: https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates/samples +[soft_delete]: https://docs.microsoft.com/en-us/azure/key-vault/key-vault-ovw-soft-delete +[test_example_certificates]: https://github.com/Azure/azure-sdk-for-python/blob/master/sdk/keyvault/azure-keyvault-certificates/tests/test_example_certificates.py + +![Impressions](https://azure-sdk-impressions.azurewebsites.net/api/impressions/azure-sdk-for-python%2Fsdk%2Fkeyvault%2Fazure-keyvault-certificates%2FFREADME.png) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/__init__.py new file mode 100644 index 000000000000..125860bac907 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/__init__.py @@ -0,0 +1,6 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +# pylint:disable=missing-docstring +__path__ = __import__("pkgutil").extend_path(__path__, __name__) # type: ignore diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/__init__.py new file mode 100644 index 000000000000..125860bac907 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/__init__.py @@ -0,0 +1,6 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +# pylint:disable=missing-docstring +__path__ = __import__("pkgutil").extend_path(__path__, __name__) # type: ignore diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/__init__.py new file mode 100644 index 000000000000..db62571fe925 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/__init__.py @@ -0,0 +1,27 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from .client import CertificateClient +from .enums import ActionType, JsonWebKeyCurveName, JsonWebKeyType, SecretContentType, KeyUsageType +from .models import ( + AdministratorDetails, + CertificatePolicy, + Contact, + KeyProperties, + LifetimeAction +) + +__all__ = [ + "ActionType", + "AdministratorDetails", + "CertificateClient", + "CertificatePolicy", + "Contact", + "JsonWebKeyCurveName", + "JsonWebKeyType", + "KeyProperties", + "KeyUsageType", + "LifetimeAction", + "SecretContentType" +] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_polling.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_polling.py new file mode 100644 index 000000000000..e8ea5cd12318 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_polling.py @@ -0,0 +1,63 @@ +# ------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# -------------------------------------------------------------------------- +import logging +import time + +from azure.core.exceptions import HttpResponseError +from azure.core.polling import PollingMethod +from azure.keyvault.certificates._shared import parse_vault_id + +logger = logging.getLogger(__name__) + + +class CreateCertificatePoller(PollingMethod): + def __init__(self, interval=5, unknown_issuer=False): + self._command = None + self._status = None + self._certificate_id = None + self.polling_interval = interval + self.unknown_issuer = unknown_issuer + + def _update_status(self): + # type: () -> None + pending_certificate = self._command() + self._status = pending_certificate.status.lower() + if not self._certificate_id: + self._certificate_id = parse_vault_id(pending_certificate.id) + + def initialize(self, client, initial_response, _): + # type: (Any, Any, Callable) -> None + self._command = client + self._status = initial_response + + def run(self): + # type: () -> None + try: + while not self.finished(): + self._update_status() + if self._status != 'completed' and self._status != 'inprogress' and self._status != 'cancelled': + raise HttpResponseError( + 'Unknown status \'{}\' for pending certificate {}'.format(self._status, self._certificate_id)) + time.sleep(self.polling_interval) + except Exception as e: + logger.warning(str(e)) + raise + + def finished(self): + # type: () -> bool + if self.unknown_issuer: + return True + return self._status != 'inprogress' + + def resource(self): + # type: () -> str + if not self.finished(): + self._update_status() + return self._status + + def status(self): + # type: () ->str + return self._status diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/__init__.py new file mode 100644 index 000000000000..a8fd2a41d71f --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/__init__.py @@ -0,0 +1,57 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from collections import namedtuple + +try: + import urllib.parse as parse +except ImportError: + # pylint:disable=import-error + import urlparse as parse # type: ignore + +from .challenge_auth_policy import ChallengeAuthPolicy, ChallengeAuthPolicyBase +from .client_base import KeyVaultClientBase +from .http_challenge import HttpChallenge +from . import http_challenge_cache as HttpChallengeCache + +__all__ = [ + "ChallengeAuthPolicy", + "ChallengeAuthPolicyBase", + "HttpChallenge", + "HttpChallengeCache", + "KeyVaultClientBase", +] + +_VaultId = namedtuple("VaultId", ["vault_url", "collection", "name", "version"]) + + +def parse_vault_id(url): + try: + parsed_uri = parse.urlparse(url) + except Exception: # pylint: disable=broad-except + raise ValueError("'{}' is not not a valid url".format(url)) + if not (parsed_uri.scheme and parsed_uri.hostname): + raise ValueError("'{}' is not not a valid url".format(url)) + + path = list(filter(None, parsed_uri.path.split("/"))) + + if len(path) < 2 or len(path) > 3: + raise ValueError("'{}' is not not a valid vault url".format(url)) + + return _VaultId( + vault_url="{}://{}".format(parsed_uri.scheme, parsed_uri.hostname), + collection=path[0], + name=path[1], + version=path[2] if len(path) == 3 else None, + ) + + +try: + # pylint:disable=unused-import + from .async_challenge_auth_policy import AsyncChallengeAuthPolicy + from .async_client_base import AsyncKeyVaultClientBase + + __all__.extend(["AsyncChallengeAuthPolicy", "AsyncKeyVaultClientBase"]) +except (SyntaxError, ImportError): + pass diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/__init__.py new file mode 100644 index 000000000000..efc5f67755a2 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/__init__.py @@ -0,0 +1,7 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from .key_vault_client import KeyVaultClient + +__all__ = ["KeyVaultClient"] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/key_vault_client.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/key_vault_client.py new file mode 100644 index 000000000000..6221dd5e7bec --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/key_vault_client.py @@ -0,0 +1,199 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from azure.profiles import KnownProfiles, ProfileDefinition +from azure.profiles.multiapiclient import MultiApiClientMixin + +from .v7_0.version import VERSION as V7_0_VERSION +from .v2016_10_01.version import VERSION as V2016_10_01_VERSION + + +class KeyVaultClient(MultiApiClientMixin): + """The key vault client performs cryptographic key operations and vault operations against the Key Vault service. + Implementation depends on the API version: + + * 2016-10-01: :class:`v2016_10_01.KeyVaultClient` + * 7.0: :class:`v7_0.KeyVaultClient` + + :param credentials: Credentials needed for the client to connect to Azure. + :type credentials: :mod:`A msrestazure Credentials + object` + + :param str api_version: API version to use if no profile is provided, or if + missing in profile. + :param profile: A profile definition, from KnownProfiles to dict. + :type profile: azure.profiles.KnownProfiles + """ + + DEFAULT_API_VERSION = "7.0" + _PROFILE_TAG = "azure.keyvault.KeyVaultClient" + LATEST_PROFILE = ProfileDefinition({_PROFILE_TAG: {None: DEFAULT_API_VERSION}}, _PROFILE_TAG + " latest") + + _init_complete = False + + def __init__(self, credentials, pipeline=None, api_version=None, aio=False, profile=KnownProfiles.default): + self._client_impls = {} + self._pipeline = pipeline + self._entered = False + self._aio = aio + super(KeyVaultClient, self).__init__(api_version=api_version, profile=profile) + + self._credentials = credentials + self._init_complete = True + + @staticmethod + def get_configuration_class(api_version, aio=False): + """ + Get the versioned configuration implementation corresponding to the current profile. + :return: The versioned configuration implementation. + """ + if api_version == V7_0_VERSION: + if aio: + from .v7_0.aio._configuration_async import KeyVaultClientConfiguration as ImplConfig + else: + from .v7_0._configuration import KeyVaultClientConfiguration as ImplConfig + elif api_version == V2016_10_01_VERSION: + if aio: + from .v2016_10_01.aio._configuration_async import KeyVaultClientConfiguration as ImplConfig + else: + from .v2016_10_01._configuration import KeyVaultClientConfiguration as ImplConfig + else: + raise NotImplementedError("API version {} is not available".format(api_version)) + return ImplConfig + + @property + def models(self): + """Module depends on the API version: + * 2016-10-01: :mod:`v2016_10_01.models` + * 7.0: :mod:`v7_0.models` + """ + api_version = self._get_api_version(None) + + if api_version == V7_0_VERSION: + from .v7_0 import models as impl_models + elif api_version == V2016_10_01_VERSION: + from .v2016_10_01 import models as impl_models + else: + raise NotImplementedError("APIVersion {} is not available".format(api_version)) + return impl_models + + def _get_client_impl(self): + """ + Get the versioned client implementation corresponding to the current profile. + :return: The versioned client implementation. + """ + api_version = self._get_api_version(None) + if api_version not in self._client_impls: + self._create_client_impl(api_version) + return self._client_impls[api_version] + + def _create_client_impl(self, api_version): + """ + Creates the client implementation corresponding to the specified api_version. + :param api_version: + :return: + """ + if api_version == V7_0_VERSION: + if self._aio: + from .v7_0.aio import KeyVaultClient as ImplClient + else: + from .v7_0 import KeyVaultClient as ImplClient + elif api_version == V2016_10_01_VERSION: + if self._aio: + from .v2016_10_01.aio import KeyVaultClient as ImplClient + else: + from .v2016_10_01 import KeyVaultClient as ImplClient + else: + raise NotImplementedError("API version {} is not available".format(api_version)) + + impl = ImplClient(credentials=self._credentials, pipeline=self._pipeline) + + # if __enter__ has previously been called and the impl client has __enter__ defined we need to call it + if self._entered: + if hasattr(impl, "__enter__"): + impl.__enter__() + elif hasattr(impl, "__aenter__"): + impl.__aenter__() + + self._client_impls[api_version] = impl + return impl + + def __aenter__(self, *args, **kwargs): + """ + Calls __aenter__ on all client implementations which support it + :param args: positional arguments to relay to client implementations of __aenter__ + :param kwargs: keyword arguments to relay to client implementations of __aenter__ + :return: returns the current KeyVaultClient instance + """ + for _, impl in self._client_impls.items(): + if hasattr(impl, "__aenter__"): + impl.__aenter__(*args, **kwargs) + + # mark the current KeyVaultClient as _entered so that client implementations instantiated + # subsequently will also have __aenter__ called on them as appropriate + self._entered = True + return self + + def __enter__(self, *args, **kwargs): + """ + Calls __enter__ on all client implementations which support it + :param args: positional arguments to relay to client implementations of __enter__ + :param kwargs: keyword arguments to relay to client implementations of __enter__ + :return: returns the current KeyVaultClient instance + """ + for _, impl in self._client_impls.items(): + if hasattr(impl, "__enter__"): + impl.__enter__(*args, **kwargs) + + # mark the current KeyVaultClient as _entered so that client implementations instantiated + # subsequently will also have __enter__ called on them as appropriate + self._entered = True + return self + + def __aexit__(self, *args, **kwargs): + """ + Calls __aexit__ on all client implementations which support it + :param args: positional arguments to relay to client implementations of __aexit__ + :param kwargs: keyword arguments to relay to client implementations of __aexit__ + :return: returns the current KeyVaultClient instance + """ + for _, impl in self._client_impls.items(): + if hasattr(impl, "__aexit__"): + impl.__aexit__(*args, **kwargs) + return self + + def __exit__(self, *args, **kwargs): + """ + Calls __exit__ on all client implementations which support it + :param args: positional arguments to relay to client implementations of __enter__ + :param kwargs: keyword arguments to relay to client implementations of __enter__ + :return: returns the current KeyVaultClient instance + """ + for _, impl in self._client_impls.items(): + if hasattr(impl, "__exit__"): + impl.__exit__(*args, **kwargs) + return self + + def __getattr__(self, name): + """ + In the case that the attribute is not defined on the custom KeyVaultClient. Attempt to get + the attribute from the versioned client implementation corresponding to the current profile. + :param name: Name of the attribute retrieve from the current versioned client implementation + :return: The value of the specified attribute on the current client implementation. + """ + impl = self._get_client_impl() + return getattr(impl, name) + + def __setattr__(self, name, attr): + """ + Sets the specified attribute either on the custom KeyVaultClient or the current underlying implementation. + :param name: Name of the attribute to set + :param attr: Value of the attribute to set + :return: None + """ + if self._init_complete and not hasattr(self, name): + impl = self._get_client_impl() + setattr(impl, name, attr) + else: + super(KeyVaultClient, self).__setattr__(name, attr) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/__init__.py new file mode 100644 index 000000000000..e913d4cf6c46 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/__init__.py @@ -0,0 +1,18 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from ._key_vault_client import KeyVaultClient +__all__ = ['KeyVaultClient'] + +from .version import VERSION + +__version__ = VERSION + diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/_configuration.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/_configuration.py new file mode 100644 index 000000000000..28cf75e3d2b4 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/_configuration.py @@ -0,0 +1,48 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- +from azure.core.configuration import Configuration, ConnectionConfiguration +from azure.core.pipeline import policies + +from .version import VERSION + + +class KeyVaultClientConfiguration(Configuration): + """Configuration for KeyVaultClient + Note that all parameters used to create this instance are saved as instance + attributes. + + :param credentials: Credentials needed for the client to connect to Azure. + :type credentials: :mod:`A msrestazure Credentials + object` + """ + + def __init__(self, credentials, **kwargs): + + if credentials is None: + raise ValueError("Parameter 'credentials' must not be None.") + + super(KeyVaultClientConfiguration, self).__init__(**kwargs) + self._configure(**kwargs) + + self.user_agent_policy.add_user_agent('azsdk-python-azure-keyvault/{}'.format(VERSION)) + self.generate_client_request_id = True + + self.credentials = credentials + + def _configure(self, **kwargs): + self.connection = ConnectionConfiguration(**kwargs) + self.user_agent_policy = policies.UserAgentPolicy(**kwargs) + self.headers_policy = policies.HeadersPolicy(**kwargs) + self.proxy_policy = policies.ProxyPolicy(**kwargs) + self.logging_policy = policies.NetworkTraceLoggingPolicy(**kwargs) + self.retry_policy = policies.RetryPolicy(**kwargs) + self.custom_hook_policy = policies.CustomHookPolicy(**kwargs) + self.redirect_policy = policies.RedirectPolicy(**kwargs) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/_key_vault_client.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/_key_vault_client.py new file mode 100644 index 000000000000..e3ec609b6cd3 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/_key_vault_client.py @@ -0,0 +1,46 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from azure.core import PipelineClient +from msrest import Serializer, Deserializer + +from ._configuration import KeyVaultClientConfiguration +from .operations import KeyVaultClientOperationsMixin +from . import models + + +class KeyVaultClient(KeyVaultClientOperationsMixin): + """The key vault client performs cryptographic key operations and vault operations against the Key Vault service. + + + :param credentials: Credentials needed for the client to connect to Azure. + :type credentials: :mod:`A msrestazure Credentials + object` + """ + + def __init__( + self, credentials, **kwargs): + + base_url = '{vaultBaseUrl}' + self._config = KeyVaultClientConfiguration(credentials, **kwargs) + self._client = PipelineClient(base_url=base_url, config=self._config, **kwargs) + + client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)} + self.api_version = '2016-10-01' + self._serialize = Serializer(client_models) + self._deserialize = Deserializer(client_models) + + + def __enter__(self): + self._client.__enter__() + return self + def __exit__(self, *exc_details): + self._client.__exit__(*exc_details) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/__init__.py new file mode 100644 index 000000000000..fb2e6c3866fd --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/__init__.py @@ -0,0 +1,13 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from ._key_vault_client_async import KeyVaultClient +__all__ = ['KeyVaultClient'] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/_configuration_async.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/_configuration_async.py new file mode 100644 index 000000000000..a61d9eeff444 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/_configuration_async.py @@ -0,0 +1,47 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- +from azure.core.configuration import Configuration, ConnectionConfiguration +from azure.core.pipeline import policies + +from ..version import VERSION + + +class KeyVaultClientConfiguration(Configuration): + """Configuration for KeyVaultClient + Note that all parameters used to create this instance are saved as instance + attributes. + + :param credentials: Credentials needed for the client to connect to Azure. + :type credentials: :mod:`A msrestazure Credentials + object` + """ + + def __init__(self, credentials, **kwargs): + + if credentials is None: + raise ValueError("Parameter 'credentials' must not be None.") + + super(KeyVaultClientConfiguration, self).__init__(**kwargs) + self._configure(**kwargs) + + self.user_agent_policy.add_user_agent('azsdk-python-azure-keyvault/{}'.format(VERSION)) + self.generate_client_request_id = True + + self.credentials = credentials + + def _configure(self, **kwargs): + self.connection = ConnectionConfiguration(**kwargs) + self.user_agent_policy = policies.UserAgentPolicy(**kwargs) + self.headers_policy = policies.HeadersPolicy(**kwargs) + self.proxy_policy = policies.ProxyPolicy(**kwargs) + self.logging_policy = policies.NetworkTraceLoggingPolicy(**kwargs) + self.retry_policy = policies.AsyncRetryPolicy(**kwargs) + self.redirect_policy = policies.AsyncRedirectPolicy(**kwargs) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/_key_vault_client_async.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/_key_vault_client_async.py new file mode 100644 index 000000000000..ad4b8a97754f --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/_key_vault_client_async.py @@ -0,0 +1,46 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from azure.core import AsyncPipelineClient +from msrest import Serializer, Deserializer + +from ._configuration_async import KeyVaultClientConfiguration +from .operations_async import KeyVaultClientOperationsMixin +from .. import models + + +class KeyVaultClient(KeyVaultClientOperationsMixin): + """The key vault client performs cryptographic key operations and vault operations against the Key Vault service. + + + :param credentials: Credentials needed for the client to connect to Azure. + :type credentials: :mod:`A msrestazure Credentials + object` + """ + + def __init__( + self, credentials, **kwargs): + + base_url = '{vaultBaseUrl}' + self._config = KeyVaultClientConfiguration(credentials, **kwargs) + self._client = AsyncPipelineClient(base_url=base_url, config=self._config, **kwargs) + + client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)} + self.api_version = '2016-10-01' + self._serialize = Serializer(client_models) + self._deserialize = Deserializer(client_models) + + + async def __aenter__(self): + await self._client.__aenter__() + return self + async def __aexit__(self, *exc_details): + await self._client.__aexit__(*exc_details) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/operations_async/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/operations_async/__init__.py new file mode 100644 index 000000000000..771a17ceb80d --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/operations_async/__init__.py @@ -0,0 +1,16 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from ._key_vault_client_operations_async import KeyVaultClientOperationsMixin + +__all__ = [ + 'KeyVaultClientOperationsMixin', +] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/operations_async/_key_vault_client_operations_async.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/operations_async/_key_vault_client_operations_async.py new file mode 100644 index 000000000000..b5cc965119ed --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/aio/operations_async/_key_vault_client_operations_async.py @@ -0,0 +1,4475 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from azure.core.exceptions import map_error +from azure.core.async_paging import AsyncItemPaged, AsyncList +from ... import models +import uuid + + +class KeyVaultClientOperationsMixin: + + async def create_key(self, vault_base_url, key_name, kty, key_size=None, key_ops=None, key_attributes=None, tags=None, curve=None, *, cls=None, **kwargs): + """Creates a new key, stores it, then returns key parameters and + attributes to the client. + + The create key operation can be used to create any key type in Azure + Key Vault. If the named key already exists, Azure Key Vault creates a + new version of the key. It requires the keys/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name for the new key. The system will generate + the version name for the new key. + :type key_name: str + :param kty: The type of key to create. For valid values, see + JsonWebKeyType. Possible values include: 'EC', 'EC-HSM', 'RSA', + 'RSA-HSM', 'oct' + :type kty: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or + 4096 for RSA. + :type key_size: int + :param key_ops: + :type key_ops: list[str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', + 'P-521', 'SECP256K1' + :type curve: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyCurveName + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyCreateParameters(kty=kty, key_size=key_size, key_ops=key_ops, key_attributes=key_attributes, tags=tags, curve=curve) + + # Construct URL + url = self.create_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyCreateParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + create_key.metadata = {'url': '/keys/{key-name}/create'} + + async def import_key(self, vault_base_url, key_name, key, hsm=None, key_attributes=None, tags=None, *, cls=None, **kwargs): + """Imports an externally created key, stores it, and returns key + parameters and attributes to the client. + + The import key operation may be used to import any key type into an + Azure Key Vault. If the named key already exists, Azure Key Vault + creates a new version of the key. This operation requires the + keys/import permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: Name for the imported key. + :type key_name: str + :param key: The Json web key + :type key: ~azure.keyvault.v2016_10_01.models.JsonWebKey + :param hsm: Whether to import as a hardware key (HSM) or software key. + :type hsm: bool + :param key_attributes: The key management attributes. + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyImportParameters(hsm=hsm, key=key, key_attributes=key_attributes, tags=tags) + + # Construct URL + url = self.import_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyImportParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + import_key.metadata = {'url': '/keys/{key-name}'} + + async def delete_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Deletes a key of any type from storage in Azure Key Vault. + + The delete key operation cannot be used to remove individual versions + of a key. This operation removes the cryptographic material associated + with the key, which means the key is not usable for Sign/Verify, + Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the + keys/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key to delete. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedKeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedKeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedKeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_key.metadata = {'url': '/keys/{key-name}'} + + async def update_key(self, vault_base_url, key_name, key_version, key_ops=None, key_attributes=None, tags=None, *, cls=None, **kwargs): + """The update key operation changes specified attributes of a stored key + and can be applied to any key type and key version stored in Azure Key + Vault. + + In order to perform this operation, the key must already exist in the + Key Vault. Note: The cryptographic material of a key itself cannot be + changed. This operation requires the keys/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of key to update. + :type key_name: str + :param key_version: The version of the key to update. + :type key_version: str + :param key_ops: Json web key operations. For more information on + possible key operations, see JsonWebKeyOperation. + :type key_ops: list[str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyUpdateParameters(key_ops=key_ops, key_attributes=key_attributes, tags=tags) + + # Construct URL + url = self.update_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_key.metadata = {'url': '/keys/{key-name}/{key-version}'} + + async def get_key(self, vault_base_url, key_name, key_version, *, cls=None, **kwargs): + """Gets the public part of a stored key. + + The get key operation is applicable to all key types. If the requested + key is symmetric, then no key material is released in the response. + This operation requires the keys/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key to get. + :type key_name: str + :param key_version: Adding the version parameter retrieves a specific + version of a key. + :type key_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_key.metadata = {'url': '/keys/{key-name}/{key-version}'} + + def get_key_versions( + self, vault_base_url, key_name, maxresults=None, *, cls=None, **kwargs): + """Retrieves a list of individual key versions with the same key name. + + The full key identifier, attributes, and tags are provided in the + response. This operation requires the keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of KeyItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.KeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_key_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('KeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_key_versions.metadata = {'url': '/keys/{key-name}/versions'} + + def get_keys( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """List keys in the specified vault. + + Retrieves a list of the keys in the Key Vault as JSON Web Key + structures that contain the public part of a stored key. The LIST + operation is applicable to all key types, however only the base key + identifier, attributes, and tags are provided in the response. + Individual versions of a key are not listed in the response. This + operation requires the keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of KeyItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.KeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_keys.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('KeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_keys.metadata = {'url': '/keys'} + + async def backup_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Requests that a backup of the specified key be downloaded to the + client. + + The Key Backup operation exports a key from Azure Key Vault in a + protected form. Note that this operation does NOT return key material + in a form that can be used outside the Azure Key Vault system, the + returned key material is either protected to a Azure Key Vault HSM or + to Azure Key Vault itself. The intent of this operation is to allow a + client to GENERATE a key in one Azure Key Vault instance, BACKUP the + key, and then RESTORE it into another Azure Key Vault instance. The + BACKUP operation may be used to export, in protected form, any key type + from Azure Key Vault. Individual versions of a key cannot be backed up. + BACKUP / RESTORE can be performed within geographical boundaries only; + meaning that a BACKUP from one geographical area cannot be restored to + another geographical area. For example, a backup from the US + geographical area cannot be restored in an EU geographical area. This + operation requires the key/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupKeyResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.BackupKeyResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupKeyResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_key.metadata = {'url': '/keys/{key-name}/backup'} + + async def restore_key(self, vault_base_url, key_bundle_backup, *, cls=None, **kwargs): + """Restores a backed up key to a vault. + + Imports a previously backed up key into Azure Key Vault, restoring the + key, its key identifier, attributes and access control policies. The + RESTORE operation may be used to import a previously backed up key. + Individual versions of a key cannot be restored. The key is restored in + its entirety with the same key name as it had when it was backed up. If + the key name is not available in the target Key Vault, the RESTORE + operation will be rejected. While the key name is retained during + restore, the final key identifier will change if the key is restored to + a different vault. Restore will restore all versions and preserve + version identifiers. The RESTORE operation is subject to security + constraints: The target Key Vault must be owned by the same Microsoft + Azure Subscription as the source Key Vault The user must have RESTORE + permission in the target Key Vault. This operation requires the + keys/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_bundle_backup: The backup blob associated with a key + bundle. + :type key_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyRestoreParameters(key_bundle_backup=key_bundle_backup) + + # Construct URL + url = self.restore_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_key.metadata = {'url': '/keys/restore'} + + async def encrypt(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Encrypts an arbitrary sequence of bytes using an encryption key that is + stored in a key vault. + + The ENCRYPT operation encrypts an arbitrary sequence of bytes using an + encryption key that is stored in Azure Key Vault. Note that the ENCRYPT + operation only supports a single block of data, the size of which is + dependent on the target key and the encryption algorithm to be used. + The ENCRYPT operation is only strictly necessary for symmetric keys + stored in Azure Key Vault since protection with an asymmetric key can + be performed using public portion of the key. This operation is + supported for asymmetric keys as a convenience for callers that have a + key-reference but do not have access to the public key material. This + operation requires the keys/encrypt permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.encrypt.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + encrypt.metadata = {'url': '/keys/{key-name}/{key-version}/encrypt'} + + async def decrypt(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Decrypts a single block of encrypted data. + + The DECRYPT operation decrypts a well-formed block of ciphertext using + the target encryption key and specified algorithm. This operation is + the reverse of the ENCRYPT operation; only a single block of data may + be decrypted, the size of this block is dependent on the target key and + the algorithm to be used. The DECRYPT operation applies to asymmetric + and symmetric keys stored in Azure Key Vault since it uses the private + portion of the key. This operation requires the keys/decrypt + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.decrypt.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + decrypt.metadata = {'url': '/keys/{key-name}/{key-version}/decrypt'} + + async def sign(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Creates a signature from a digest using the specified key. + + The SIGN operation is applicable to asymmetric and symmetric keys + stored in Azure Key Vault since this operation uses the private portion + of the key. This operation requires the keys/sign permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: The signing/verification algorithm identifier. For + more information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', + 'PS384', 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', + 'ES384', 'ES512', 'ECDSA256' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeySignatureAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeySignParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.sign.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeySignParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + sign.metadata = {'url': '/keys/{key-name}/{key-version}/sign'} + + async def verify(self, vault_base_url, key_name, key_version, algorithm, digest, signature, *, cls=None, **kwargs): + """Verifies a signature using a specified key. + + The VERIFY operation is applicable to symmetric keys stored in Azure + Key Vault. VERIFY is not strictly necessary for asymmetric keys stored + in Azure Key Vault since signature verification can be performed using + the public portion of the key but this operation is supported as a + convenience for callers that only have a key-reference and not the + public portion of the key. This operation requires the keys/verify + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: The signing/verification algorithm. For more + information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', + 'PS384', 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', + 'ES384', 'ES512', 'ECDSA256' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeySignatureAlgorithm + :param digest: The digest used for signing. + :type digest: bytes + :param signature: The signature to be verified. + :type signature: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyVerifyResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyVerifyResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyVerifyParameters(algorithm=algorithm, digest=digest, signature=signature) + + # Construct URL + url = self.verify.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyVerifyParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyVerifyResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + verify.metadata = {'url': '/keys/{key-name}/{key-version}/verify'} + + async def wrap_key(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Wraps a symmetric key using a specified key. + + The WRAP operation supports encryption of a symmetric key using a key + encryption key that has previously been stored in an Azure Key Vault. + The WRAP operation is only strictly necessary for symmetric keys stored + in Azure Key Vault since protection with an asymmetric key can be + performed using the public portion of the key. This operation is + supported for asymmetric keys as a convenience for callers that have a + key-reference but do not have access to the public key material. This + operation requires the keys/wrapKey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.wrap_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + wrap_key.metadata = {'url': '/keys/{key-name}/{key-version}/wrapkey'} + + async def unwrap_key(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Unwraps a symmetric key using the specified key that was initially used + for wrapping that key. + + The UNWRAP operation supports decryption of a symmetric key using the + target key encryption key. This operation is the reverse of the WRAP + operation. The UNWRAP operation applies to asymmetric and symmetric + keys stored in Azure Key Vault since it uses the private portion of the + key. This operation requires the keys/unwrapKey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.unwrap_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + unwrap_key.metadata = {'url': '/keys/{key-name}/{key-version}/unwrapkey'} + + def get_deleted_keys( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """Lists the deleted keys in the specified vault. + + Retrieves a list of the keys in the Key Vault as JSON Web Key + structures that contain the public part of a deleted key. This + operation includes deletion-specific information. The Get Deleted Keys + operation is applicable for vaults enabled for soft-delete. While the + operation can be invoked on any vault, it will return an error if + invoked on a non soft-delete enabled vault. This operation requires the + keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedKeyItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.DeletedKeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_keys.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('DeletedKeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_deleted_keys.metadata = {'url': '/deletedkeys'} + + async def get_deleted_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Gets the public part of a deleted key. + + The Get Deleted Key operation is applicable for soft-delete enabled + vaults. While the operation can be invoked on any vault, it will return + an error if invoked on a non soft-delete enabled vault. This operation + requires the keys/get permission. . + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedKeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedKeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedKeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_key.metadata = {'url': '/deletedkeys/{key-name}'} + + async def purge_deleted_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Permanently deletes the specified key. + + The Purge Deleted Key operation is applicable for soft-delete enabled + vaults. While the operation can be invoked on any vault, it will return + an error if invoked on a non soft-delete enabled vault. This operation + requires the keys/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_key.metadata = {'url': '/deletedkeys/{key-name}'} + + async def recover_deleted_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Recovers the deleted key to its latest version. + + The Recover Deleted Key operation is applicable for deleted keys in + soft-delete enabled vaults. It recovers the deleted key back to its + latest version under /keys. An attempt to recover an non-deleted key + will return an error. Consider this the inverse of the delete operation + on soft-delete enabled vaults. This operation requires the keys/recover + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the deleted key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_key.metadata = {'url': '/deletedkeys/{key-name}/recover'} + + async def set_secret(self, vault_base_url, secret_name, value, tags=None, content_type=None, secret_attributes=None, *, cls=None, **kwargs): + """Sets a secret in a specified key vault. + + The SET operation adds a secret to the Azure Key Vault. If the named + secret already exists, Azure Key Vault creates a new version of that + secret. This operation requires the secrets/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param value: The value of the secret. + :type value: str + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: + ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretSetParameters(value=value, tags=tags, content_type=content_type, secret_attributes=secret_attributes) + + # Construct URL + url = self.set_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretSetParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_secret.metadata = {'url': '/secrets/{secret-name}'} + + async def delete_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Deletes a secret from a specified key vault. + + The DELETE operation applies to any secret stored in Azure Key Vault. + DELETE cannot be applied to an individual version of a secret. This + operation requires the secrets/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedSecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_secret.metadata = {'url': '/secrets/{secret-name}'} + + async def update_secret(self, vault_base_url, secret_name, secret_version, content_type=None, secret_attributes=None, tags=None, *, cls=None, **kwargs): + """Updates the attributes associated with a specified secret in a given + key vault. + + The UPDATE operation changes specified attributes of an existing stored + secret. Attributes that are not specified in the request are left + unchanged. The value of a secret itself cannot be changed. This + operation requires the secrets/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param secret_version: The version of the secret. + :type secret_version: str + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: + ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretUpdateParameters(content_type=content_type, secret_attributes=secret_attributes, tags=tags) + + # Construct URL + url = self.update_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str'), + 'secret-version': self._serialize.url("secret_version", secret_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} + + async def get_secret(self, vault_base_url, secret_name, secret_version, *, cls=None, **kwargs): + """Get a specified secret from a given key vault. + + The GET operation is applicable to any secret stored in Azure Key + Vault. This operation requires the secrets/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param secret_version: The version of the secret. + :type secret_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str'), + 'secret-version': self._serialize.url("secret_version", secret_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} + + def get_secrets( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """List secrets in a specified key vault. + + The Get Secrets operation is applicable to the entire vault. However, + only the base secret identifier and its attributes are provided in the + response. Individual secret versions are not listed in the response. + This operation requires the secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified, the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SecretItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.SecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_secrets.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('SecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_secrets.metadata = {'url': '/secrets'} + + def get_secret_versions( + self, vault_base_url, secret_name, maxresults=None, *, cls=None, **kwargs): + """List all versions of the specified secret. + + The full secret identifier and attributes are provided in the response. + No values are returned for the secrets. This operations requires the + secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified, the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SecretItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.SecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_secret_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('SecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_secret_versions.metadata = {'url': '/secrets/{secret-name}/versions'} + + def get_deleted_secrets( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """Lists deleted secrets for the specified vault. + + The Get Deleted Secrets operation returns the secrets that have been + deleted for a vault enabled for soft-delete. This operation requires + the secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedSecretItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.DeletedSecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_secrets.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('DeletedSecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_deleted_secrets.metadata = {'url': '/deletedsecrets'} + + async def get_deleted_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Gets the specified deleted secret. + + The Get Deleted Secret operation returns the specified deleted secret + along with its attributes. This operation requires the secrets/get + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedSecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}'} + + async def purge_deleted_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Permanently deletes the specified secret. + + The purge deleted secret operation removes the secret permanently, + without the possibility of recovery. This operation can only be enabled + on a soft-delete enabled vault. This operation requires the + secrets/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}'} + + async def recover_deleted_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Recovers the deleted secret to the latest version. + + Recovers the deleted secret in the specified vault. This operation can + only be performed on a soft-delete enabled vault. This operation + requires the secrets/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the deleted secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}/recover'} + + async def backup_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Backs up the specified secret. + + Requests that a backup of the specified secret be downloaded to the + client. All versions of the secret will be downloaded. This operation + requires the secrets/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupSecretResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.BackupSecretResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupSecretResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_secret.metadata = {'url': '/secrets/{secret-name}/backup'} + + async def restore_secret(self, vault_base_url, secret_bundle_backup, *, cls=None, **kwargs): + """Restores a backed up secret to a vault. + + Restores a backed up secret, and all its versions, to a vault. This + operation requires the secrets/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_bundle_backup: The backup blob associated with a secret + bundle. + :type secret_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretRestoreParameters(secret_bundle_backup=secret_bundle_backup) + + # Construct URL + url = self.restore_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_secret.metadata = {'url': '/secrets/restore'} + + def get_certificates( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """List certificates in a specified key vault. + + The GetCertificates operation returns the set of certificates resources + in the specified key vault. This operation requires the + certificates/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.CertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificates.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('CertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_certificates.metadata = {'url': '/certificates'} + + async def delete_certificate(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Deletes a certificate from a specified key vault. + + Deletes all versions of a certificate object along with its associated + policy. Delete certificate cannot be used to remove individual versions + of a certificate object. This operation requires the + certificates/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedCertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedCertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedCertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate.metadata = {'url': '/certificates/{certificate-name}'} + + async def set_certificate_contacts(self, vault_base_url, contact_list=None, *, cls=None, **kwargs): + """Sets the certificate contacts for the specified key vault. + + Sets the certificate contacts for the specified key vault. This + operation requires the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param contact_list: The contact list for the vault certificates. + :type contact_list: list[~azure.keyvault.v2016_10_01.models.Contact] + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + contacts = models.Contacts(contact_list=contact_list) + + # Construct URL + url = self.set_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(contacts, 'Contacts') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + async def get_certificate_contacts(self, vault_base_url, *, cls=None, **kwargs): + """Lists the certificate contacts for a specified key vault. + + The GetCertificateContacts operation returns the set of certificate + contact resources in the specified key vault. This operation requires + the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + async def delete_certificate_contacts(self, vault_base_url, *, cls=None, **kwargs): + """Deletes the certificate contacts for a specified key vault. + + Deletes the certificate contacts for a specified key vault certificate. + This operation requires the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + def get_certificate_issuers( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """List certificate issuers for a specified key vault. + + The GetCertificateIssuers operation returns the set of certificate + issuer resources in the specified key vault. This operation requires + the certificates/manageissuers/getissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateIssuerItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.CertificateIssuerItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificate_issuers.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('CertificateIssuerListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_certificate_issuers.metadata = {'url': '/certificates/issuers'} + + async def set_certificate_issuer(self, vault_base_url, issuer_name, provider, credentials=None, organization_details=None, attributes=None, *, cls=None, **kwargs): + """Sets the specified certificate issuer. + + The SetCertificateIssuer operation adds or updates the specified + certificate issuer. This operation requires the certificates/setissuers + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: + ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided + to the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameter = models.CertificateIssuerSetParameters(provider=provider, credentials=credentials, organization_details=organization_details, attributes=attributes) + + # Construct URL + url = self.set_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameter, 'CertificateIssuerSetParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + async def update_certificate_issuer(self, vault_base_url, issuer_name, provider=None, credentials=None, organization_details=None, attributes=None, *, cls=None, **kwargs): + """Updates the specified certificate issuer. + + The UpdateCertificateIssuer operation performs an update on the + specified certificate issuer entity. This operation requires the + certificates/setissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: + ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided + to the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameter = models.CertificateIssuerUpdateParameters(provider=provider, credentials=credentials, organization_details=organization_details, attributes=attributes) + + # Construct URL + url = self.update_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameter, 'CertificateIssuerUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + async def get_certificate_issuer(self, vault_base_url, issuer_name, *, cls=None, **kwargs): + """Lists the specified certificate issuer. + + The GetCertificateIssuer operation returns the specified certificate + issuer resources in the specified key vault. This operation requires + the certificates/manageissuers/getissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + async def delete_certificate_issuer(self, vault_base_url, issuer_name, *, cls=None, **kwargs): + """Deletes the specified certificate issuer. + + The DeleteCertificateIssuer operation permanently removes the specified + certificate issuer from the vault. This operation requires the + certificates/manageissuers/deleteissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + async def create_certificate(self, vault_base_url, certificate_name, certificate_policy=None, certificate_attributes=None, tags=None, *, cls=None, **kwargs): + """Creates a new certificate. + + If this is the first version, the certificate resource is created. This + operation requires the certificates/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateCreateParameters(certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.create_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateCreateParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [202]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 202: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + create_certificate.metadata = {'url': '/certificates/{certificate-name}/create'} + + async def import_certificate(self, vault_base_url, certificate_name, base64_encoded_certificate, password=None, certificate_policy=None, certificate_attributes=None, tags=None, *, cls=None, **kwargs): + """Imports a certificate into a specified key vault. + + Imports an existing valid certificate, containing a private key, into + Azure Key Vault. The certificate to be imported can be in either PFX or + PEM format. If the certificate is in PEM format the PEM file must + contain the key as well as x509 certificates. This operation requires + the certificates/import permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param base64_encoded_certificate: Base64 encoded representation of + the certificate object to import. This certificate needs to contain + the private key. + :type base64_encoded_certificate: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateImportParameters(base64_encoded_certificate=base64_encoded_certificate, password=password, certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.import_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateImportParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + import_certificate.metadata = {'url': '/certificates/{certificate-name}/import'} + + def get_certificate_versions( + self, vault_base_url, certificate_name, maxresults=None, *, cls=None, **kwargs): + """List the versions of a certificate. + + The GetCertificateVersions operation returns the versions of a + certificate in the specified key vault. This operation requires the + certificates/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.CertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificate_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('CertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_certificate_versions.metadata = {'url': '/certificates/{certificate-name}/versions'} + + async def get_certificate_policy(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Lists the policy for a certificate. + + The GetCertificatePolicy operation returns the specified certificate + policy resources in the specified key vault. This operation requires + the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in a given key + vault. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificatePolicy or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_policy.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificatePolicy', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_policy.metadata = {'url': '/certificates/{certificate-name}/policy'} + + async def update_certificate_policy(self, vault_base_url, certificate_name, certificate_policy, *, cls=None, **kwargs): + """Updates the policy for a certificate. + + Set specified members in the certificate policy. Leave others as null. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given + vault. + :type certificate_name: str + :param certificate_policy: The policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificatePolicy or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.update_certificate_policy.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(certificate_policy, 'CertificatePolicy') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificatePolicy', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_policy.metadata = {'url': '/certificates/{certificate-name}/policy'} + + async def update_certificate(self, vault_base_url, certificate_name, certificate_version, certificate_policy=None, certificate_attributes=None, tags=None, *, cls=None, **kwargs): + """Updates the specified attributes associated with the given certificate. + + The UpdateCertificate operation applies the specified update on the + given certificate; the only elements updated are the certificate's + attributes. This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given key + vault. + :type certificate_name: str + :param certificate_version: The version of the certificate. + :type certificate_version: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateUpdateParameters(certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.update_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str'), + 'certificate-version': self._serialize.url("certificate_version", certificate_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate.metadata = {'url': '/certificates/{certificate-name}/{certificate-version}'} + + async def get_certificate(self, vault_base_url, certificate_name, certificate_version, *, cls=None, **kwargs): + """Gets information about a certificate. + + Gets information about a specific certificate. This operation requires + the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given + vault. + :type certificate_name: str + :param certificate_version: The version of the certificate. + :type certificate_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str'), + 'certificate-version': self._serialize.url("certificate_version", certificate_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate.metadata = {'url': '/certificates/{certificate-name}/{certificate-version}'} + + async def update_certificate_operation(self, vault_base_url, certificate_name, cancellation_requested, *, cls=None, **kwargs): + """Updates a certificate operation. + + Updates a certificate creation operation that is already in progress. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param cancellation_requested: Indicates if cancellation was requested + on the certificate operation. + :type cancellation_requested: bool + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + certificate_operation = models.CertificateOperationUpdateParameter(cancellation_requested=cancellation_requested) + + # Construct URL + url = self.update_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(certificate_operation, 'CertificateOperationUpdateParameter') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + async def get_certificate_operation(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Gets the creation operation of a certificate. + + Gets the creation operation associated with a specified certificate. + This operation requires the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + async def delete_certificate_operation(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Deletes the creation operation for a specific certificate. + + Deletes the creation operation for a specified certificate that is in + the process of being created. The certificate is no longer created. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + async def merge_certificate(self, vault_base_url, certificate_name, x509_certificates, certificate_attributes=None, tags=None, *, cls=None, **kwargs): + """Merges a certificate or a certificate chain with a key pair existing on + the server. + + The MergeCertificate operation performs the merging of a certificate or + certificate chain with a key pair currently available in the service. + This operation requires the certificates/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param x509_certificates: The certificate or the certificate chain to + merge. + :type x509_certificates: list[bytearray] + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateMergeParameters(x509_certificates=x509_certificates, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.merge_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateMergeParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [201]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 201: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + merge_certificate.metadata = {'url': '/certificates/{certificate-name}/pending/merge'} + + def get_deleted_certificates( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """Lists the deleted certificates in the specified vault currently + available for recovery. + + The GetDeletedCertificates operation retrieves the certificates in the + current vault which are in a deleted state and ready for recovery or + purging. This operation includes deletion-specific information. This + operation requires the certificates/get/list permission. This operation + can only be enabled on soft-delete enabled vaults. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedCertificateItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.DeletedCertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_certificates.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('DeletedCertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_deleted_certificates.metadata = {'url': '/deletedcertificates'} + + async def get_deleted_certificate(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Retrieves information about the specified deleted certificate. + + The GetDeletedCertificate operation retrieves the deleted certificate + information plus its attributes, such as retention interval, scheduled + permanent deletion and the current deletion recovery level. This + operation requires the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedCertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedCertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedCertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}'} + + async def purge_deleted_certificate(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Permanently deletes the specified deleted certificate. + + The PurgeDeletedCertificate operation performs an irreversible deletion + of the specified certificate, without possibility for recovery. The + operation is not available if the recovery level does not specify + 'Purgeable'. This operation requires the certificate/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}'} + + async def recover_deleted_certificate(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Recovers the deleted certificate back to its current version under + /certificates. + + The RecoverDeletedCertificate operation performs the reversal of the + Delete operation. The operation is applicable in vaults enabled for + soft-delete, and must be issued during the retention interval + (available in the deleted certificate's attributes). This operation + requires the certificates/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the deleted certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}/recover'} + + def get_storage_accounts( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """List storage accounts managed by the specified key vault. This + operation requires the storage/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of StorageAccountItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.StorageAccountItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_storage_accounts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('StorageListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_storage_accounts.metadata = {'url': '/storage'} + + async def delete_storage_account(self, vault_base_url, storage_account_name, *, cls=None, **kwargs): + """Deletes a storage account. This operation requires the storage/delete + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + async def get_storage_account(self, vault_base_url, storage_account_name, *, cls=None, **kwargs): + """Gets information about a specified storage account. This operation + requires the storage/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + async def set_storage_account(self, vault_base_url, storage_account_name, resource_id, active_key_name, auto_regenerate_key, regeneration_period=None, storage_account_attributes=None, tags=None, *, cls=None, **kwargs): + """Creates or updates a new storage account. This operation requires the + storage/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param resource_id: Storage account resource id. + :type resource_id: str + :param active_key_name: Current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration + specified in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage + account. + :type storage_account_attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountCreateParameters(resource_id=resource_id, active_key_name=active_key_name, auto_regenerate_key=auto_regenerate_key, regeneration_period=regeneration_period, storage_account_attributes=storage_account_attributes, tags=tags) + + # Construct URL + url = self.set_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountCreateParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + async def update_storage_account(self, vault_base_url, storage_account_name, active_key_name=None, auto_regenerate_key=None, regeneration_period=None, storage_account_attributes=None, tags=None, *, cls=None, **kwargs): + """Updates the specified attributes associated with the given storage + account. This operation requires the storage/set/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param active_key_name: The current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration + specified in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage + account. + :type storage_account_attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountUpdateParameters(active_key_name=active_key_name, auto_regenerate_key=auto_regenerate_key, regeneration_period=regeneration_period, storage_account_attributes=storage_account_attributes, tags=tags) + + # Construct URL + url = self.update_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + async def regenerate_storage_account_key(self, vault_base_url, storage_account_name, key_name, *, cls=None, **kwargs): + """Regenerates the specified key value for the given storage account. This + operation requires the storage/regeneratekey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param key_name: The storage account key name. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountRegenerteKeyParameters(key_name=key_name) + + # Construct URL + url = self.regenerate_storage_account_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountRegenerteKeyParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + regenerate_storage_account_key.metadata = {'url': '/storage/{storage-account-name}/regeneratekey'} + + def get_sas_definitions( + self, vault_base_url, storage_account_name, maxresults=None, *, cls=None, **kwargs): + """List storage SAS definitions for the given storage account. This + operation requires the storage/listsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SasDefinitionItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v2016_10_01.models.SasDefinitionItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_sas_definitions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('SasDefinitionListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_sas_definitions.metadata = {'url': '/storage/{storage-account-name}/sas'} + + async def delete_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, *, cls=None, **kwargs): + """Deletes a SAS definition from a specified storage account. This + operation requires the storage/deletesas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + async def get_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, *, cls=None, **kwargs): + """Gets information about a SAS definition for the specified storage + account. This operation requires the storage/getsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + async def set_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, parameters, sas_definition_attributes=None, tags=None, *, cls=None, **kwargs): + """Creates or updates a new SAS definition for the specified storage + account. This operation requires the storage/setsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param parameters: Sas definition creation metadata in the form of + key-value pairs. + :type parameters: dict[str, str] + :param sas_definition_attributes: The attributes of the SAS + definition. + :type sas_definition_attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters1 = models.SasDefinitionCreateParameters(parameters=parameters, sas_definition_attributes=sas_definition_attributes, tags=tags) + + # Construct URL + url = self.set_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters1, 'SasDefinitionCreateParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + async def update_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, parameters=None, sas_definition_attributes=None, tags=None, *, cls=None, **kwargs): + """Updates the specified attributes associated with the given SAS + definition. This operation requires the storage/setsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param parameters: Sas definition update metadata in the form of + key-value pairs. + :type parameters: dict[str, str] + :param sas_definition_attributes: The attributes of the SAS + definition. + :type sas_definition_attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters1 = models.SasDefinitionUpdateParameters(parameters=parameters, sas_definition_attributes=sas_definition_attributes, tags=tags) + + # Construct URL + url = self.update_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters1, 'SasDefinitionUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/__init__.py new file mode 100644 index 000000000000..6f134becdbd3 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/__init__.py @@ -0,0 +1,271 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +try: + from ._models_py3 import Action + from ._models_py3 import AdministratorDetails + from ._models_py3 import Attributes + from ._models_py3 import BackupKeyResult + from ._models_py3 import BackupSecretResult + from ._models_py3 import CertificateAttributes + from ._models_py3 import CertificateBundle + from ._models_py3 import CertificateCreateParameters + from ._models_py3 import CertificateImportParameters + from ._models_py3 import CertificateIssuerItem + from ._models_py3 import CertificateIssuerListResult + from ._models_py3 import CertificateIssuerSetParameters + from ._models_py3 import CertificateIssuerUpdateParameters + from ._models_py3 import CertificateItem + from ._models_py3 import CertificateListResult + from ._models_py3 import CertificateMergeParameters + from ._models_py3 import CertificateOperation + from ._models_py3 import CertificateOperationUpdateParameter + from ._models_py3 import CertificatePolicy + from ._models_py3 import CertificateUpdateParameters + from ._models_py3 import Contact + from ._models_py3 import Contacts + from ._models_py3 import DeletedCertificateBundle + from ._models_py3 import DeletedCertificateItem + from ._models_py3 import DeletedCertificateListResult + from ._models_py3 import DeletedKeyBundle + from ._models_py3 import DeletedKeyItem + from ._models_py3 import DeletedKeyListResult + from ._models_py3 import DeletedSecretBundle + from ._models_py3 import DeletedSecretItem + from ._models_py3 import DeletedSecretListResult + from ._models_py3 import Error + from ._models_py3 import IssuerAttributes + from ._models_py3 import IssuerBundle + from ._models_py3 import IssuerCredentials + from ._models_py3 import IssuerParameters + from ._models_py3 import JsonWebKey + from ._models_py3 import KeyAttributes + from ._models_py3 import KeyBundle + from ._models_py3 import KeyCreateParameters + from ._models_py3 import KeyImportParameters + from ._models_py3 import KeyItem + from ._models_py3 import KeyListResult + from ._models_py3 import KeyOperationResult + from ._models_py3 import KeyOperationsParameters + from ._models_py3 import KeyProperties + from ._models_py3 import KeyRestoreParameters + from ._models_py3 import KeySignParameters + from ._models_py3 import KeyUpdateParameters + from ._models_py3 import KeyVaultError, KeyVaultErrorException + from ._models_py3 import KeyVerifyParameters + from ._models_py3 import KeyVerifyResult + from ._models_py3 import LifetimeAction + from ._models_py3 import OrganizationDetails + from ._models_py3 import PendingCertificateSigningRequestResult + from ._models_py3 import SasDefinitionAttributes + from ._models_py3 import SasDefinitionBundle + from ._models_py3 import SasDefinitionCreateParameters + from ._models_py3 import SasDefinitionItem + from ._models_py3 import SasDefinitionListResult + from ._models_py3 import SasDefinitionUpdateParameters + from ._models_py3 import SecretAttributes + from ._models_py3 import SecretBundle + from ._models_py3 import SecretItem + from ._models_py3 import SecretListResult + from ._models_py3 import SecretProperties + from ._models_py3 import SecretRestoreParameters + from ._models_py3 import SecretSetParameters + from ._models_py3 import SecretUpdateParameters + from ._models_py3 import StorageAccountAttributes + from ._models_py3 import StorageAccountCreateParameters + from ._models_py3 import StorageAccountItem + from ._models_py3 import StorageAccountRegenerteKeyParameters + from ._models_py3 import StorageAccountUpdateParameters + from ._models_py3 import StorageBundle + from ._models_py3 import StorageListResult + from ._models_py3 import SubjectAlternativeNames + from ._models_py3 import Trigger + from ._models_py3 import X509CertificateProperties +except (SyntaxError, ImportError): + from ._models import Action + from ._models import AdministratorDetails + from ._models import Attributes + from ._models import BackupKeyResult + from ._models import BackupSecretResult + from ._models import CertificateAttributes + from ._models import CertificateBundle + from ._models import CertificateCreateParameters + from ._models import CertificateImportParameters + from ._models import CertificateIssuerItem + from ._models import CertificateIssuerListResult + from ._models import CertificateIssuerSetParameters + from ._models import CertificateIssuerUpdateParameters + from ._models import CertificateItem + from ._models import CertificateListResult + from ._models import CertificateMergeParameters + from ._models import CertificateOperation + from ._models import CertificateOperationUpdateParameter + from ._models import CertificatePolicy + from ._models import CertificateUpdateParameters + from ._models import Contact + from ._models import Contacts + from ._models import DeletedCertificateBundle + from ._models import DeletedCertificateItem + from ._models import DeletedCertificateListResult + from ._models import DeletedKeyBundle + from ._models import DeletedKeyItem + from ._models import DeletedKeyListResult + from ._models import DeletedSecretBundle + from ._models import DeletedSecretItem + from ._models import DeletedSecretListResult + from ._models import Error + from ._models import IssuerAttributes + from ._models import IssuerBundle + from ._models import IssuerCredentials + from ._models import IssuerParameters + from ._models import JsonWebKey + from ._models import KeyAttributes + from ._models import KeyBundle + from ._models import KeyCreateParameters + from ._models import KeyImportParameters + from ._models import KeyItem + from ._models import KeyListResult + from ._models import KeyOperationResult + from ._models import KeyOperationsParameters + from ._models import KeyProperties + from ._models import KeyRestoreParameters + from ._models import KeySignParameters + from ._models import KeyUpdateParameters + from ._models import KeyVaultError, KeyVaultErrorException + from ._models import KeyVerifyParameters + from ._models import KeyVerifyResult + from ._models import LifetimeAction + from ._models import OrganizationDetails + from ._models import PendingCertificateSigningRequestResult + from ._models import SasDefinitionAttributes + from ._models import SasDefinitionBundle + from ._models import SasDefinitionCreateParameters + from ._models import SasDefinitionItem + from ._models import SasDefinitionListResult + from ._models import SasDefinitionUpdateParameters + from ._models import SecretAttributes + from ._models import SecretBundle + from ._models import SecretItem + from ._models import SecretListResult + from ._models import SecretProperties + from ._models import SecretRestoreParameters + from ._models import SecretSetParameters + from ._models import SecretUpdateParameters + from ._models import StorageAccountAttributes + from ._models import StorageAccountCreateParameters + from ._models import StorageAccountItem + from ._models import StorageAccountRegenerteKeyParameters + from ._models import StorageAccountUpdateParameters + from ._models import StorageBundle + from ._models import StorageListResult + from ._models import SubjectAlternativeNames + from ._models import Trigger + from ._models import X509CertificateProperties +from ._key_vault_client_enums import ( + JsonWebKeyType, + JsonWebKeyCurveName, + DeletionRecoveryLevel, + KeyUsageType, + ActionType, + JsonWebKeyOperation, + JsonWebKeyEncryptionAlgorithm, + JsonWebKeySignatureAlgorithm, +) + +__all__ = [ + 'Action', + 'AdministratorDetails', + 'Attributes', + 'BackupKeyResult', + 'BackupSecretResult', + 'CertificateAttributes', + 'CertificateBundle', + 'CertificateCreateParameters', + 'CertificateImportParameters', + 'CertificateIssuerItem', + 'CertificateIssuerListResult', + 'CertificateIssuerSetParameters', + 'CertificateIssuerUpdateParameters', + 'CertificateItem', + 'CertificateListResult', + 'CertificateMergeParameters', + 'CertificateOperation', + 'CertificateOperationUpdateParameter', + 'CertificatePolicy', + 'CertificateUpdateParameters', + 'Contact', + 'Contacts', + 'DeletedCertificateBundle', + 'DeletedCertificateItem', + 'DeletedCertificateListResult', + 'DeletedKeyBundle', + 'DeletedKeyItem', + 'DeletedKeyListResult', + 'DeletedSecretBundle', + 'DeletedSecretItem', + 'DeletedSecretListResult', + 'Error', + 'IssuerAttributes', + 'IssuerBundle', + 'IssuerCredentials', + 'IssuerParameters', + 'JsonWebKey', + 'KeyAttributes', + 'KeyBundle', + 'KeyCreateParameters', + 'KeyImportParameters', + 'KeyItem', + 'KeyListResult', + 'KeyOperationResult', + 'KeyOperationsParameters', + 'KeyProperties', + 'KeyRestoreParameters', + 'KeySignParameters', + 'KeyUpdateParameters', + 'KeyVaultError', 'KeyVaultErrorException', + 'KeyVerifyParameters', + 'KeyVerifyResult', + 'LifetimeAction', + 'OrganizationDetails', + 'PendingCertificateSigningRequestResult', + 'SasDefinitionAttributes', + 'SasDefinitionBundle', + 'SasDefinitionCreateParameters', + 'SasDefinitionItem', + 'SasDefinitionListResult', + 'SasDefinitionUpdateParameters', + 'SecretAttributes', + 'SecretBundle', + 'SecretItem', + 'SecretListResult', + 'SecretProperties', + 'SecretRestoreParameters', + 'SecretSetParameters', + 'SecretUpdateParameters', + 'StorageAccountAttributes', + 'StorageAccountCreateParameters', + 'StorageAccountItem', + 'StorageAccountRegenerteKeyParameters', + 'StorageAccountUpdateParameters', + 'StorageBundle', + 'StorageListResult', + 'SubjectAlternativeNames', + 'Trigger', + 'X509CertificateProperties', + 'JsonWebKeyType', + 'JsonWebKeyCurveName', + 'DeletionRecoveryLevel', + 'KeyUsageType', + 'ActionType', + 'JsonWebKeyOperation', + 'JsonWebKeyEncryptionAlgorithm', + 'JsonWebKeySignatureAlgorithm', +] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/_key_vault_client_enums.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/_key_vault_client_enums.py new file mode 100644 index 000000000000..c9bb22cda150 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/_key_vault_client_enums.py @@ -0,0 +1,88 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from enum import Enum + + +class JsonWebKeyType(str, Enum): + + ec = "EC" + ec_hsm = "EC-HSM" + rsa = "RSA" + rsa_hsm = "RSA-HSM" + oct = "oct" + + +class JsonWebKeyCurveName(str, Enum): + + p_256 = "P-256" #: The NIST P-256 elliptic curve, AKA SECG curve SECP256R1. + p_384 = "P-384" #: The NIST P-384 elliptic curve, AKA SECG curve SECP384R1. + p_521 = "P-521" #: The NIST P-521 elliptic curve, AKA SECG curve SECP521R1. + secp256_k1 = "SECP256K1" #: The SECG SECP256K1 elliptic curve. + + +class DeletionRecoveryLevel(str, Enum): + + purgeable = "Purgeable" #: Soft-delete is not enabled for this vault. A DELETE operation results in immediate and irreversible data loss. + recoverable_purgeable = "Recoverable+Purgeable" #: Soft-delete is enabled for this vault; A privileged user may trigger an immediate, irreversible deletion(purge) of a deleted entity. + recoverable = "Recoverable" #: Soft-delete is enabled for this vault and purge has been disabled. A deleted entity will remain in this state until recovered, or the end of the retention interval. + recoverable_protected_subscription = "Recoverable+ProtectedSubscription" #: Soft-delete is enabled for this vault, and the subscription is protected against immediate deletion. + + +class KeyUsageType(str, Enum): + + digital_signature = "digitalSignature" + non_repudiation = "nonRepudiation" + key_encipherment = "keyEncipherment" + data_encipherment = "dataEncipherment" + key_agreement = "keyAgreement" + key_cert_sign = "keyCertSign" + c_rl_sign = "cRLSign" + encipher_only = "encipherOnly" + decipher_only = "decipherOnly" + + +class ActionType(str, Enum): + + email_contacts = "EmailContacts" + auto_renew = "AutoRenew" + + +class JsonWebKeyOperation(str, Enum): + + encrypt = "encrypt" + decrypt = "decrypt" + sign = "sign" + verify = "verify" + wrap_key = "wrapKey" + unwrap_key = "unwrapKey" + + +class JsonWebKeyEncryptionAlgorithm(str, Enum): + + rsa_oaep = "RSA-OAEP" + rsa_oaep_256 = "RSA-OAEP-256" + rsa1_5 = "RSA1_5" + + +class JsonWebKeySignatureAlgorithm(str, Enum): + + ps256 = "PS256" + ps384 = "PS384" + ps512 = "PS512" + rs256 = "RS256" + rs384 = "RS384" + rs512 = "RS512" + rsnull = "RSNULL" + es256 = "ES256" + es384 = "ES384" + es512 = "ES512" + ecdsa256 = "ECDSA256" diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/_models.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/_models.py new file mode 100644 index 000000000000..d1b025916b46 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/_models.py @@ -0,0 +1,2764 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from msrest.serialization import Model +from azure.core import HttpResponseError + + +class Action(Model): + """The action that will be executed. + + :param action_type: The type of the action. Possible values include: + 'EmailContacts', 'AutoRenew' + :type action_type: str or ~azure.keyvault.v2016_10_01.models.ActionType + """ + + _attribute_map = { + 'action_type': {'key': 'action_type', 'type': 'ActionType'}, + } + + def __init__(self, **kwargs): + super(Action, self).__init__(**kwargs) + self.action_type = kwargs.get('action_type', None) + + +class AdministratorDetails(Model): + """Details of the organization administrator of the certificate issuer. + + :param first_name: First name. + :type first_name: str + :param last_name: Last name. + :type last_name: str + :param email_address: Email address. + :type email_address: str + :param phone: Phone number. + :type phone: str + """ + + _attribute_map = { + 'first_name': {'key': 'first_name', 'type': 'str'}, + 'last_name': {'key': 'last_name', 'type': 'str'}, + 'email_address': {'key': 'email', 'type': 'str'}, + 'phone': {'key': 'phone', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(AdministratorDetails, self).__init__(**kwargs) + self.first_name = kwargs.get('first_name', None) + self.last_name = kwargs.get('last_name', None) + self.email_address = kwargs.get('email_address', None) + self.phone = kwargs.get('phone', None) + + +class Attributes(Model): + """The object attributes managed by the KeyVault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(Attributes, self).__init__(**kwargs) + self.enabled = kwargs.get('enabled', None) + self.not_before = kwargs.get('not_before', None) + self.expires = kwargs.get('expires', None) + self.created = None + self.updated = None + + +class BackupKeyResult(Model): + """The backup key result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up key. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(BackupKeyResult, self).__init__(**kwargs) + self.value = None + + +class BackupSecretResult(Model): + """The backup secret result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up secret. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(BackupSecretResult, self).__init__(**kwargs) + self.value = None + + +class CertificateAttributes(Attributes): + """The certificate management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for certificates in the current vault. If it contains 'Purgeable', + the certificate can be permanently deleted by a privileged user; + otherwise, only the system can purge the certificate, at the end of the + retention interval. Possible values include: 'Purgeable', + 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v2016_10_01.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateAttributes, self).__init__(**kwargs) + self.recovery_level = None + + +class CertificateBundle(Model): + """A certificate bundle consists of a certificate (X509) plus its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :ivar kid: The key id. + :vartype kid: str + :ivar sid: The secret id. + :vartype sid: str + :ivar x509_thumbprint: Thumbprint of the certificate. + :vartype x509_thumbprint: bytes + :ivar policy: The management policy. + :vartype policy: ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param cer: CER contents of x509 certificate. + :type cer: bytearray + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs + :type tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'kid': {'readonly': True}, + 'sid': {'readonly': True}, + 'x509_thumbprint': {'readonly': True}, + 'policy': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'sid': {'key': 'sid', 'type': 'str'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'cer': {'key': 'cer', 'type': 'bytearray'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateBundle, self).__init__(**kwargs) + self.id = None + self.kid = None + self.sid = None + self.x509_thumbprint = None + self.policy = None + self.cer = kwargs.get('cer', None) + self.content_type = kwargs.get('content_type', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + + +class CertificateCreateParameters(Model): + """The certificate create parameters. + + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateCreateParameters, self).__init__(**kwargs) + self.certificate_policy = kwargs.get('certificate_policy', None) + self.certificate_attributes = kwargs.get('certificate_attributes', None) + self.tags = kwargs.get('tags', None) + + +class CertificateImportParameters(Model): + """The certificate import parameters. + + All required parameters must be populated in order to send to Azure. + + :param base64_encoded_certificate: Required. Base64 encoded representation + of the certificate object to import. This certificate needs to contain the + private key. + :type base64_encoded_certificate: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'base64_encoded_certificate': {'required': True}, + } + + _attribute_map = { + 'base64_encoded_certificate': {'key': 'value', 'type': 'str'}, + 'password': {'key': 'pwd', 'type': 'str'}, + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateImportParameters, self).__init__(**kwargs) + self.base64_encoded_certificate = kwargs.get('base64_encoded_certificate', None) + self.password = kwargs.get('password', None) + self.certificate_policy = kwargs.get('certificate_policy', None) + self.certificate_attributes = kwargs.get('certificate_attributes', None) + self.tags = kwargs.get('tags', None) + + +class CertificateIssuerItem(Model): + """The certificate issuer item containing certificate issuer metadata. + + :param id: Certificate Identifier. + :type id: str + :param provider: The issuer provider. + :type provider: str + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'provider': {'key': 'provider', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateIssuerItem, self).__init__(**kwargs) + self.id = kwargs.get('id', None) + self.provider = kwargs.get('provider', None) + + +class CertificateIssuerListResult(Model): + """The certificate issuer list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of certificate issuers + in the key vault along with a link to the next page of certificate + issuers. + :vartype value: + list[~azure.keyvault.v2016_10_01.models.CertificateIssuerItem] + :ivar next_link: The URL to get the next set of certificate issuers. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[CertificateIssuerItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateIssuerListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class CertificateIssuerSetParameters(Model): + """The certificate issuer set parameters. + + All required parameters must be populated in order to send to Azure. + + :param provider: Required. The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + """ + + _validation = { + 'provider': {'required': True}, + } + + _attribute_map = { + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, **kwargs): + super(CertificateIssuerSetParameters, self).__init__(**kwargs) + self.provider = kwargs.get('provider', None) + self.credentials = kwargs.get('credentials', None) + self.organization_details = kwargs.get('organization_details', None) + self.attributes = kwargs.get('attributes', None) + + +class CertificateIssuerUpdateParameters(Model): + """The certificate issuer update parameters. + + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + """ + + _attribute_map = { + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, **kwargs): + super(CertificateIssuerUpdateParameters, self).__init__(**kwargs) + self.provider = kwargs.get('provider', None) + self.credentials = kwargs.get('credentials', None) + self.organization_details = kwargs.get('organization_details', None) + self.attributes = kwargs.get('attributes', None) + + +class CertificateItem(Model): + """The certificate item containing certificate metadata. + + :param id: Certificate identifier. + :type id: str + :param attributes: The certificate management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param x509_thumbprint: Thumbprint of the certificate. + :type x509_thumbprint: bytes + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(CertificateItem, self).__init__(**kwargs) + self.id = kwargs.get('id', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.x509_thumbprint = kwargs.get('x509_thumbprint', None) + + +class CertificateListResult(Model): + """The certificate list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of certificates in the + key vault along with a link to the next page of certificates. + :vartype value: list[~azure.keyvault.v2016_10_01.models.CertificateItem] + :ivar next_link: The URL to get the next set of certificates. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[CertificateItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class CertificateMergeParameters(Model): + """The certificate merge parameters. + + All required parameters must be populated in order to send to Azure. + + :param x509_certificates: Required. The certificate or the certificate + chain to merge. + :type x509_certificates: list[bytearray] + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'x509_certificates': {'required': True}, + } + + _attribute_map = { + 'x509_certificates': {'key': 'x5c', 'type': '[bytearray]'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateMergeParameters, self).__init__(**kwargs) + self.x509_certificates = kwargs.get('x509_certificates', None) + self.certificate_attributes = kwargs.get('certificate_attributes', None) + self.tags = kwargs.get('tags', None) + + +class CertificateOperation(Model): + """A certificate operation is returned in case of asynchronous requests. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :param issuer_parameters: Parameters for the issuer of the X509 component + of a certificate. + :type issuer_parameters: + ~azure.keyvault.v2016_10_01.models.IssuerParameters + :param csr: The certificate signing request (CSR) that is being used in + the certificate operation. + :type csr: bytearray + :param cancellation_requested: Indicates if cancellation was requested on + the certificate operation. + :type cancellation_requested: bool + :param status: Status of the certificate operation. + :type status: str + :param status_details: The status details of the certificate operation. + :type status_details: str + :param error: Error encountered, if any, during the certificate operation. + :type error: ~azure.keyvault.v2016_10_01.models.Error + :param target: Location which contains the result of the certificate + operation. + :type target: str + :param request_id: Identifier for the certificate operation. + :type request_id: str + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'issuer_parameters': {'key': 'issuer', 'type': 'IssuerParameters'}, + 'csr': {'key': 'csr', 'type': 'bytearray'}, + 'cancellation_requested': {'key': 'cancellation_requested', 'type': 'bool'}, + 'status': {'key': 'status', 'type': 'str'}, + 'status_details': {'key': 'status_details', 'type': 'str'}, + 'error': {'key': 'error', 'type': 'Error'}, + 'target': {'key': 'target', 'type': 'str'}, + 'request_id': {'key': 'request_id', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateOperation, self).__init__(**kwargs) + self.id = None + self.issuer_parameters = kwargs.get('issuer_parameters', None) + self.csr = kwargs.get('csr', None) + self.cancellation_requested = kwargs.get('cancellation_requested', None) + self.status = kwargs.get('status', None) + self.status_details = kwargs.get('status_details', None) + self.error = kwargs.get('error', None) + self.target = kwargs.get('target', None) + self.request_id = kwargs.get('request_id', None) + + +class CertificateOperationUpdateParameter(Model): + """The certificate operation update parameters. + + All required parameters must be populated in order to send to Azure. + + :param cancellation_requested: Required. Indicates if cancellation was + requested on the certificate operation. + :type cancellation_requested: bool + """ + + _validation = { + 'cancellation_requested': {'required': True}, + } + + _attribute_map = { + 'cancellation_requested': {'key': 'cancellation_requested', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(CertificateOperationUpdateParameter, self).__init__(**kwargs) + self.cancellation_requested = kwargs.get('cancellation_requested', None) + + +class CertificatePolicy(Model): + """Management policy for a certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :param key_properties: Properties of the key backing a certificate. + :type key_properties: ~azure.keyvault.v2016_10_01.models.KeyProperties + :param secret_properties: Properties of the secret backing a certificate. + :type secret_properties: + ~azure.keyvault.v2016_10_01.models.SecretProperties + :param x509_certificate_properties: Properties of the X509 component of a + certificate. + :type x509_certificate_properties: + ~azure.keyvault.v2016_10_01.models.X509CertificateProperties + :param lifetime_actions: Actions that will be performed by Key Vault over + the lifetime of a certificate. + :type lifetime_actions: + list[~azure.keyvault.v2016_10_01.models.LifetimeAction] + :param issuer_parameters: Parameters for the issuer of the X509 component + of a certificate. + :type issuer_parameters: + ~azure.keyvault.v2016_10_01.models.IssuerParameters + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'key_properties': {'key': 'key_props', 'type': 'KeyProperties'}, + 'secret_properties': {'key': 'secret_props', 'type': 'SecretProperties'}, + 'x509_certificate_properties': {'key': 'x509_props', 'type': 'X509CertificateProperties'}, + 'lifetime_actions': {'key': 'lifetime_actions', 'type': '[LifetimeAction]'}, + 'issuer_parameters': {'key': 'issuer', 'type': 'IssuerParameters'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + } + + def __init__(self, **kwargs): + super(CertificatePolicy, self).__init__(**kwargs) + self.id = None + self.key_properties = kwargs.get('key_properties', None) + self.secret_properties = kwargs.get('secret_properties', None) + self.x509_certificate_properties = kwargs.get('x509_certificate_properties', None) + self.lifetime_actions = kwargs.get('lifetime_actions', None) + self.issuer_parameters = kwargs.get('issuer_parameters', None) + self.attributes = kwargs.get('attributes', None) + + +class CertificateUpdateParameters(Model): + """The certificate update parameters. + + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateUpdateParameters, self).__init__(**kwargs) + self.certificate_policy = kwargs.get('certificate_policy', None) + self.certificate_attributes = kwargs.get('certificate_attributes', None) + self.tags = kwargs.get('tags', None) + + +class Contact(Model): + """The contact information for the vault certificates. + + :param email_address: Email address. + :type email_address: str + :param name: Name. + :type name: str + :param phone: Phone number. + :type phone: str + """ + + _attribute_map = { + 'email_address': {'key': 'email', 'type': 'str'}, + 'name': {'key': 'name', 'type': 'str'}, + 'phone': {'key': 'phone', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(Contact, self).__init__(**kwargs) + self.email_address = kwargs.get('email_address', None) + self.name = kwargs.get('name', None) + self.phone = kwargs.get('phone', None) + + +class Contacts(Model): + """The contacts for the vault certificates. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Identifier for the contacts collection. + :vartype id: str + :param contact_list: The contact list for the vault certificates. + :type contact_list: list[~azure.keyvault.v2016_10_01.models.Contact] + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'contact_list': {'key': 'contacts', 'type': '[Contact]'}, + } + + def __init__(self, **kwargs): + super(Contacts, self).__init__(**kwargs) + self.id = None + self.contact_list = kwargs.get('contact_list', None) + + +class DeletedCertificateBundle(CertificateBundle): + """A Deleted Certificate consisting of its previous id, attributes and its + tags, as well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :ivar kid: The key id. + :vartype kid: str + :ivar sid: The secret id. + :vartype sid: str + :ivar x509_thumbprint: Thumbprint of the certificate. + :vartype x509_thumbprint: bytes + :ivar policy: The management policy. + :vartype policy: ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param cer: CER contents of x509 certificate. + :type cer: bytearray + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs + :type tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted certificate. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the certificate is scheduled to + be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the certificate was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'kid': {'readonly': True}, + 'sid': {'readonly': True}, + 'x509_thumbprint': {'readonly': True}, + 'policy': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'sid': {'key': 'sid', 'type': 'str'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'cer': {'key': 'cer', 'type': 'bytearray'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedCertificateBundle, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedCertificateItem(CertificateItem): + """The deleted certificate item containing metadata about the deleted + certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Certificate identifier. + :type id: str + :param attributes: The certificate management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param x509_thumbprint: Thumbprint of the certificate. + :type x509_thumbprint: bytes + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted certificate. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the certificate is scheduled to + be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the certificate was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedCertificateItem, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedCertificateListResult(Model): + """A list of certificates that have been deleted in this vault. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of deleted certificates + in the vault along with a link to the next page of deleted certificates + :vartype value: + list[~azure.keyvault.v2016_10_01.models.DeletedCertificateItem] + :ivar next_link: The URL to get the next set of deleted certificates. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedCertificateItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(DeletedCertificateListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class KeyBundle(Model): + """A KeyBundle consisting of a WebKey plus its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param key: The Json web key. + :type key: ~azure.keyvault.v2016_10_01.models.JsonWebKey + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(KeyBundle, self).__init__(**kwargs) + self.key = kwargs.get('key', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.managed = None + + +class DeletedKeyBundle(KeyBundle): + """A DeletedKeyBundle consisting of a WebKey plus its Attributes and deletion + info. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param key: The Json web key. + :type key: ~azure.keyvault.v2016_10_01.models.JsonWebKey + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted key. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the key is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the key was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedKeyBundle, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class KeyItem(Model): + """The key item containing key metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param kid: Key identifier. + :type kid: str + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(KeyItem, self).__init__(**kwargs) + self.kid = kwargs.get('kid', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.managed = None + + +class DeletedKeyItem(KeyItem): + """The deleted key item containing the deleted key metadata and information + about deletion. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param kid: Key identifier. + :type kid: str + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted key. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the key is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the key was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedKeyItem, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedKeyListResult(Model): + """A list of keys that have been deleted in this vault. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of deleted keys in the + vault along with a link to the next page of deleted keys + :vartype value: list[~azure.keyvault.v2016_10_01.models.DeletedKeyItem] + :ivar next_link: The URL to get the next set of deleted keys. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedKeyItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(DeletedKeyListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SecretBundle(Model): + """A secret consisting of a value, id and its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param value: The secret value. + :type value: str + :param id: The secret id. + :type id: str + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar kid: If this is a secret backing a KV certificate, then this field + specifies the corresponding key backing the KV certificate. + :vartype kid: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a secret backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'kid': {'readonly': True}, + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'id': {'key': 'id', 'type': 'str'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(SecretBundle, self).__init__(**kwargs) + self.value = kwargs.get('value', None) + self.id = kwargs.get('id', None) + self.content_type = kwargs.get('content_type', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.kid = None + self.managed = None + + +class DeletedSecretBundle(SecretBundle): + """A Deleted Secret consisting of its previous id, attributes and its tags, as + well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param value: The secret value. + :type value: str + :param id: The secret id. + :type id: str + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar kid: If this is a secret backing a KV certificate, then this field + specifies the corresponding key backing the KV certificate. + :vartype kid: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a secret backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted secret. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the secret is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the secret was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'kid': {'readonly': True}, + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'id': {'key': 'id', 'type': 'str'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedSecretBundle, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class SecretItem(Model): + """The secret item containing secret metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Secret identifier. + :type id: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(SecretItem, self).__init__(**kwargs) + self.id = kwargs.get('id', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.content_type = kwargs.get('content_type', None) + self.managed = None + + +class DeletedSecretItem(SecretItem): + """The deleted secret item containing metadata about the deleted secret. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Secret identifier. + :type id: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted secret. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the secret is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the secret was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedSecretItem, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedSecretListResult(Model): + """The deleted secret list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of the deleted secrets + in the vault along with a link to the next page of deleted secrets + :vartype value: list[~azure.keyvault.v2016_10_01.models.DeletedSecretItem] + :ivar next_link: The URL to get the next set of deleted secrets. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedSecretItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(DeletedSecretListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class Error(Model): + """The key vault server error. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar code: The error code. + :vartype code: str + :ivar message: The error message. + :vartype message: str + :ivar inner_error: + :vartype inner_error: ~azure.keyvault.v2016_10_01.models.Error + """ + + _validation = { + 'code': {'readonly': True}, + 'message': {'readonly': True}, + 'inner_error': {'readonly': True}, + } + + _attribute_map = { + 'code': {'key': 'code', 'type': 'str'}, + 'message': {'key': 'message', 'type': 'str'}, + 'inner_error': {'key': 'innererror', 'type': 'Error'}, + } + + def __init__(self, **kwargs): + super(Error, self).__init__(**kwargs) + self.code = None + self.message = None + self.inner_error = None + + +class IssuerAttributes(Model): + """The attributes of an issuer managed by the Key Vault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the issuer is enabled. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(IssuerAttributes, self).__init__(**kwargs) + self.enabled = kwargs.get('enabled', None) + self.created = None + self.updated = None + + +class IssuerBundle(Model): + """The issuer for Key Vault certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Identifier for the issuer object. + :vartype id: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, **kwargs): + super(IssuerBundle, self).__init__(**kwargs) + self.id = None + self.provider = kwargs.get('provider', None) + self.credentials = kwargs.get('credentials', None) + self.organization_details = kwargs.get('organization_details', None) + self.attributes = kwargs.get('attributes', None) + + +class IssuerCredentials(Model): + """The credentials to be used for the certificate issuer. + + :param account_id: The user name/account name/account id. + :type account_id: str + :param password: The password/secret/account key. + :type password: str + """ + + _attribute_map = { + 'account_id': {'key': 'account_id', 'type': 'str'}, + 'password': {'key': 'pwd', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(IssuerCredentials, self).__init__(**kwargs) + self.account_id = kwargs.get('account_id', None) + self.password = kwargs.get('password', None) + + +class IssuerParameters(Model): + """Parameters for the issuer of the X509 component of a certificate. + + :param name: Name of the referenced issuer object or reserved names; for + example, 'Self' or 'Unknown'. + :type name: str + :param certificate_type: Type of certificate to be requested from the + issuer provider. + :type certificate_type: str + """ + + _attribute_map = { + 'name': {'key': 'name', 'type': 'str'}, + 'certificate_type': {'key': 'cty', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(IssuerParameters, self).__init__(**kwargs) + self.name = kwargs.get('name', None) + self.certificate_type = kwargs.get('certificate_type', None) + + +class JsonWebKey(Model): + """As of http://tools.ietf.org/html/draft-ietf-jose-json-web-key-18. + + :param kid: Key identifier. + :type kid: str + :param kty: JsonWebKey key type (kty). Possible values include: 'EC', + 'EC-HSM', 'RSA', 'RSA-HSM', 'oct' + :type kty: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyType + :param key_ops: + :type key_ops: list[str] + :param n: RSA modulus. + :type n: bytes + :param e: RSA public exponent. + :type e: bytes + :param d: RSA private exponent, or the D component of an EC private key. + :type d: bytes + :param dp: RSA private key parameter. + :type dp: bytes + :param dq: RSA private key parameter. + :type dq: bytes + :param qi: RSA private key parameter. + :type qi: bytes + :param p: RSA secret prime. + :type p: bytes + :param q: RSA secret prime, with p < q. + :type q: bytes + :param k: Symmetric key. + :type k: bytes + :param t: HSM Token, used with 'Bring Your Own Key'. + :type t: bytes + :param crv: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'SECP256K1' + :type crv: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyCurveName + :param x: X component of an EC public key. + :type x: bytes + :param y: Y component of an EC public key. + :type y: bytes + """ + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'kty': {'key': 'kty', 'type': 'str'}, + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'n': {'key': 'n', 'type': 'base64'}, + 'e': {'key': 'e', 'type': 'base64'}, + 'd': {'key': 'd', 'type': 'base64'}, + 'dp': {'key': 'dp', 'type': 'base64'}, + 'dq': {'key': 'dq', 'type': 'base64'}, + 'qi': {'key': 'qi', 'type': 'base64'}, + 'p': {'key': 'p', 'type': 'base64'}, + 'q': {'key': 'q', 'type': 'base64'}, + 'k': {'key': 'k', 'type': 'base64'}, + 't': {'key': 'key_hsm', 'type': 'base64'}, + 'crv': {'key': 'crv', 'type': 'str'}, + 'x': {'key': 'x', 'type': 'base64'}, + 'y': {'key': 'y', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(JsonWebKey, self).__init__(**kwargs) + self.kid = kwargs.get('kid', None) + self.kty = kwargs.get('kty', None) + self.key_ops = kwargs.get('key_ops', None) + self.n = kwargs.get('n', None) + self.e = kwargs.get('e', None) + self.d = kwargs.get('d', None) + self.dp = kwargs.get('dp', None) + self.dq = kwargs.get('dq', None) + self.qi = kwargs.get('qi', None) + self.p = kwargs.get('p', None) + self.q = kwargs.get('q', None) + self.k = kwargs.get('k', None) + self.t = kwargs.get('t', None) + self.crv = kwargs.get('crv', None) + self.x = kwargs.get('x', None) + self.y = kwargs.get('y', None) + + +class KeyAttributes(Attributes): + """The attributes of a key managed by the key vault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for keys in the current vault. If it contains 'Purgeable' the key + can be permanently deleted by a privileged user; otherwise, only the + system can purge the key, at the end of the retention interval. Possible + values include: 'Purgeable', 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v2016_10_01.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(KeyAttributes, self).__init__(**kwargs) + self.recovery_level = None + + +class KeyCreateParameters(Model): + """The key create parameters. + + All required parameters must be populated in order to send to Azure. + + :param kty: Required. The type of key to create. For valid values, see + JsonWebKeyType. Possible values include: 'EC', 'EC-HSM', 'RSA', 'RSA-HSM', + 'oct' + :type kty: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or 4096 + for RSA. + :type key_size: int + :param key_ops: + :type key_ops: list[str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'SECP256K1' + :type curve: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyCurveName + """ + + _validation = { + 'kty': {'required': True, 'min_length': 1}, + } + + _attribute_map = { + 'kty': {'key': 'kty', 'type': 'str'}, + 'key_size': {'key': 'key_size', 'type': 'int'}, + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'curve': {'key': 'crv', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(KeyCreateParameters, self).__init__(**kwargs) + self.kty = kwargs.get('kty', None) + self.key_size = kwargs.get('key_size', None) + self.key_ops = kwargs.get('key_ops', None) + self.key_attributes = kwargs.get('key_attributes', None) + self.tags = kwargs.get('tags', None) + self.curve = kwargs.get('curve', None) + + +class KeyImportParameters(Model): + """The key import parameters. + + All required parameters must be populated in order to send to Azure. + + :param hsm: Whether to import as a hardware key (HSM) or software key. + :type hsm: bool + :param key: Required. The Json web key + :type key: ~azure.keyvault.v2016_10_01.models.JsonWebKey + :param key_attributes: The key management attributes. + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'key': {'required': True}, + } + + _attribute_map = { + 'hsm': {'key': 'Hsm', 'type': 'bool'}, + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(KeyImportParameters, self).__init__(**kwargs) + self.hsm = kwargs.get('hsm', None) + self.key = kwargs.get('key', None) + self.key_attributes = kwargs.get('key_attributes', None) + self.tags = kwargs.get('tags', None) + + +class KeyListResult(Model): + """The key list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of keys in the key vault + along with a link to the next page of keys. + :vartype value: list[~azure.keyvault.v2016_10_01.models.KeyItem] + :ivar next_link: The URL to get the next set of keys. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[KeyItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(KeyListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class KeyOperationResult(Model): + """The key operation result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar kid: Key identifier + :vartype kid: str + :ivar result: + :vartype result: bytes + """ + + _validation = { + 'kid': {'readonly': True}, + 'result': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'result': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeyOperationResult, self).__init__(**kwargs) + self.kid = None + self.result = None + + +class KeyOperationsParameters(Model): + """The key operations parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: Required. + :type value: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'value': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeyOperationsParameters, self).__init__(**kwargs) + self.algorithm = kwargs.get('algorithm', None) + self.value = kwargs.get('value', None) + + +class KeyProperties(Model): + """Properties of the key pair backing a certificate. + + :param exportable: Indicates if the private key can be exported. + :type exportable: bool + :param key_type: The key type. + :type key_type: str + :param key_size: The key size in bits. For example: 2048, 3072, or 4096 + for RSA. + :type key_size: int + :param reuse_key: Indicates if the same key pair will be used on + certificate renewal. + :type reuse_key: bool + """ + + _attribute_map = { + 'exportable': {'key': 'exportable', 'type': 'bool'}, + 'key_type': {'key': 'kty', 'type': 'str'}, + 'key_size': {'key': 'key_size', 'type': 'int'}, + 'reuse_key': {'key': 'reuse_key', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(KeyProperties, self).__init__(**kwargs) + self.exportable = kwargs.get('exportable', None) + self.key_type = kwargs.get('key_type', None) + self.key_size = kwargs.get('key_size', None) + self.reuse_key = kwargs.get('reuse_key', None) + + +class KeyRestoreParameters(Model): + """The key restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param key_bundle_backup: Required. The backup blob associated with a key + bundle. + :type key_bundle_backup: bytes + """ + + _validation = { + 'key_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'key_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeyRestoreParameters, self).__init__(**kwargs) + self.key_bundle_backup = kwargs.get('key_bundle_backup', None) + + +class KeySignParameters(Model): + """The key operations parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. The signing/verification algorithm identifier. + For more information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', 'PS384', + 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', 'ES384', 'ES512', + 'ECDSA256' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeySignatureAlgorithm + :param value: Required. + :type value: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'value': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeySignParameters, self).__init__(**kwargs) + self.algorithm = kwargs.get('algorithm', None) + self.value = kwargs.get('value', None) + + +class KeyUpdateParameters(Model): + """The key update parameters. + + :param key_ops: Json web key operations. For more information on possible + key operations, see JsonWebKeyOperation. + :type key_ops: list[str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(KeyUpdateParameters, self).__init__(**kwargs) + self.key_ops = kwargs.get('key_ops', None) + self.key_attributes = kwargs.get('key_attributes', None) + self.tags = kwargs.get('tags', None) + + +class KeyVaultError(Model): + """The key vault error exception. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar error: + :vartype error: ~azure.keyvault.v2016_10_01.models.Error + """ + + _validation = { + 'error': {'readonly': True}, + } + + _attribute_map = { + 'error': {'key': 'error', 'type': 'Error'}, + } + + def __init__(self, **kwargs): + super(KeyVaultError, self).__init__(**kwargs) + self.error = None + + +class KeyVaultErrorException(HttpResponseError): + """Server responsed with exception of type: 'KeyVaultError'. + + :param deserialize: A deserializer + :param response: Server response to be deserialized. + """ + + def __init__(self, response, deserialize, *args): + + model_name = 'KeyVaultError' + self.error = deserialize(model_name, response) + if self.error is None: + self.error = deserialize.dependencies[model_name]() + super(KeyVaultErrorException, self).__init__(response=response) + + +class KeyVerifyParameters(Model): + """The key verify parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. The signing/verification algorithm. For more + information on possible algorithm types, see JsonWebKeySignatureAlgorithm. + Possible values include: 'PS256', 'PS384', 'PS512', 'RS256', 'RS384', + 'RS512', 'RSNULL', 'ES256', 'ES384', 'ES512', 'ECDSA256' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeySignatureAlgorithm + :param digest: Required. The digest used for signing. + :type digest: bytes + :param signature: Required. The signature to be verified. + :type signature: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'digest': {'required': True}, + 'signature': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'digest': {'key': 'digest', 'type': 'base64'}, + 'signature': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeyVerifyParameters, self).__init__(**kwargs) + self.algorithm = kwargs.get('algorithm', None) + self.digest = kwargs.get('digest', None) + self.signature = kwargs.get('signature', None) + + +class KeyVerifyResult(Model): + """The key verify result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: True if the signature is verified, otherwise false. + :vartype value: bool + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(KeyVerifyResult, self).__init__(**kwargs) + self.value = None + + +class LifetimeAction(Model): + """Action and its trigger that will be performed by Key Vault over the + lifetime of a certificate. + + :param trigger: The condition that will execute the action. + :type trigger: ~azure.keyvault.v2016_10_01.models.Trigger + :param action: The action that will be executed. + :type action: ~azure.keyvault.v2016_10_01.models.Action + """ + + _attribute_map = { + 'trigger': {'key': 'trigger', 'type': 'Trigger'}, + 'action': {'key': 'action', 'type': 'Action'}, + } + + def __init__(self, **kwargs): + super(LifetimeAction, self).__init__(**kwargs) + self.trigger = kwargs.get('trigger', None) + self.action = kwargs.get('action', None) + + +class OrganizationDetails(Model): + """Details of the organization of the certificate issuer. + + :param id: Id of the organization. + :type id: str + :param admin_details: Details of the organization administrator. + :type admin_details: + list[~azure.keyvault.v2016_10_01.models.AdministratorDetails] + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'admin_details': {'key': 'admin_details', 'type': '[AdministratorDetails]'}, + } + + def __init__(self, **kwargs): + super(OrganizationDetails, self).__init__(**kwargs) + self.id = kwargs.get('id', None) + self.admin_details = kwargs.get('admin_details', None) + + +class PendingCertificateSigningRequestResult(Model): + """The pending certificate signing request result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The pending certificate signing request as Base64 encoded + string. + :vartype value: str + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(PendingCertificateSigningRequestResult, self).__init__(**kwargs) + self.value = None + + +class SasDefinitionAttributes(Model): + """The SAS definition management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: the enabled state of the object. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionAttributes, self).__init__(**kwargs) + self.enabled = kwargs.get('enabled', None) + self.created = None + self.updated = None + + +class SasDefinitionBundle(Model): + """A SAS definition bundle consists of key vault SAS definition details plus + its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The SAS definition id. + :vartype id: str + :ivar secret_id: Storage account SAS definition secret id. + :vartype secret_id: str + :ivar parameters: The SAS definition metadata in the form of key-value + pairs. + :vartype parameters: dict[str, str] + :ivar attributes: The SAS definition attributes. + :vartype attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'parameters': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'parameters': {'key': 'parameters', 'type': '{str}'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionBundle, self).__init__(**kwargs) + self.id = None + self.secret_id = None + self.parameters = None + self.attributes = None + self.tags = None + + +class SasDefinitionCreateParameters(Model): + """The SAS definition create parameters. + + All required parameters must be populated in order to send to Azure. + + :param parameters: Required. Sas definition creation metadata in the form + of key-value pairs. + :type parameters: dict[str, str] + :param sas_definition_attributes: The attributes of the SAS definition. + :type sas_definition_attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'parameters': {'required': True}, + } + + _attribute_map = { + 'parameters': {'key': 'parameters', 'type': '{str}'}, + 'sas_definition_attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionCreateParameters, self).__init__(**kwargs) + self.parameters = kwargs.get('parameters', None) + self.sas_definition_attributes = kwargs.get('sas_definition_attributes', None) + self.tags = kwargs.get('tags', None) + + +class SasDefinitionItem(Model): + """The SAS definition item containing storage SAS definition metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage SAS identifier. + :vartype id: str + :ivar secret_id: The storage account SAS definition secret id. + :vartype secret_id: str + :ivar attributes: The SAS definition management attributes. + :vartype attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionItem, self).__init__(**kwargs) + self.id = None + self.secret_id = None + self.attributes = None + self.tags = None + + +class SasDefinitionListResult(Model): + """The storage account SAS definition list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of SAS definitions along + with a link to the next page of SAS definitions. + :vartype value: list[~azure.keyvault.v2016_10_01.models.SasDefinitionItem] + :ivar next_link: The URL to get the next set of SAS definitions. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[SasDefinitionItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SasDefinitionUpdateParameters(Model): + """The SAS definition update parameters. + + :param parameters: Sas definition update metadata in the form of key-value + pairs. + :type parameters: dict[str, str] + :param sas_definition_attributes: The attributes of the SAS definition. + :type sas_definition_attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'parameters': {'key': 'parameters', 'type': '{str}'}, + 'sas_definition_attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionUpdateParameters, self).__init__(**kwargs) + self.parameters = kwargs.get('parameters', None) + self.sas_definition_attributes = kwargs.get('sas_definition_attributes', None) + self.tags = kwargs.get('tags', None) + + +class SecretAttributes(Attributes): + """The secret management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for secrets in the current vault. If it contains 'Purgeable', the + secret can be permanently deleted by a privileged user; otherwise, only + the system can purge the secret, at the end of the retention interval. + Possible values include: 'Purgeable', 'Recoverable+Purgeable', + 'Recoverable', 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v2016_10_01.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(SecretAttributes, self).__init__(**kwargs) + self.recovery_level = None + + +class SecretListResult(Model): + """The secret list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of secrets in the key + vault along with a link to the next page of secrets. + :vartype value: list[~azure.keyvault.v2016_10_01.models.SecretItem] + :ivar next_link: The URL to get the next set of secrets. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[SecretItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(SecretListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SecretProperties(Model): + """Properties of the key backing a certificate. + + :param content_type: The media type (MIME type). + :type content_type: str + """ + + _attribute_map = { + 'content_type': {'key': 'contentType', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(SecretProperties, self).__init__(**kwargs) + self.content_type = kwargs.get('content_type', None) + + +class SecretRestoreParameters(Model): + """The secret restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param secret_bundle_backup: Required. The backup blob associated with a + secret bundle. + :type secret_bundle_backup: bytes + """ + + _validation = { + 'secret_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'secret_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(SecretRestoreParameters, self).__init__(**kwargs) + self.secret_bundle_backup = kwargs.get('secret_bundle_backup', None) + + +class SecretSetParameters(Model): + """The secret set parameters. + + All required parameters must be populated in order to send to Azure. + + :param value: Required. The value of the secret. + :type value: str + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: + ~azure.keyvault.v2016_10_01.models.SecretAttributes + """ + + _validation = { + 'value': {'required': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'secret_attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + } + + def __init__(self, **kwargs): + super(SecretSetParameters, self).__init__(**kwargs) + self.value = kwargs.get('value', None) + self.tags = kwargs.get('tags', None) + self.content_type = kwargs.get('content_type', None) + self.secret_attributes = kwargs.get('secret_attributes', None) + + +class SecretUpdateParameters(Model): + """The secret update parameters. + + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: + ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'secret_attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SecretUpdateParameters, self).__init__(**kwargs) + self.content_type = kwargs.get('content_type', None) + self.secret_attributes = kwargs.get('secret_attributes', None) + self.tags = kwargs.get('tags', None) + + +class StorageAccountAttributes(Model): + """The storage account management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: the enabled state of the object. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(StorageAccountAttributes, self).__init__(**kwargs) + self.enabled = kwargs.get('enabled', None) + self.created = None + self.updated = None + + +class StorageAccountCreateParameters(Model): + """The storage account create parameters. + + All required parameters must be populated in order to send to Azure. + + :param resource_id: Required. Storage account resource id. + :type resource_id: str + :param active_key_name: Required. Current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: Required. whether keyvault should manage the + storage account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration specified + in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage account. + :type storage_account_attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'resource_id': {'required': True}, + 'active_key_name': {'required': True}, + 'auto_regenerate_key': {'required': True}, + } + + _attribute_map = { + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'storage_account_attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(StorageAccountCreateParameters, self).__init__(**kwargs) + self.resource_id = kwargs.get('resource_id', None) + self.active_key_name = kwargs.get('active_key_name', None) + self.auto_regenerate_key = kwargs.get('auto_regenerate_key', None) + self.regeneration_period = kwargs.get('regeneration_period', None) + self.storage_account_attributes = kwargs.get('storage_account_attributes', None) + self.tags = kwargs.get('tags', None) + + +class StorageAccountItem(Model): + """The storage account item containing storage account metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Storage identifier. + :vartype id: str + :ivar resource_id: Storage account resource Id. + :vartype resource_id: str + :ivar attributes: The storage account management attributes. + :vartype attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(StorageAccountItem, self).__init__(**kwargs) + self.id = None + self.resource_id = None + self.attributes = None + self.tags = None + + +class StorageAccountRegenerteKeyParameters(Model): + """The storage account key regenerate parameters. + + All required parameters must be populated in order to send to Azure. + + :param key_name: Required. The storage account key name. + :type key_name: str + """ + + _validation = { + 'key_name': {'required': True}, + } + + _attribute_map = { + 'key_name': {'key': 'keyName', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(StorageAccountRegenerteKeyParameters, self).__init__(**kwargs) + self.key_name = kwargs.get('key_name', None) + + +class StorageAccountUpdateParameters(Model): + """The storage account update parameters. + + :param active_key_name: The current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration specified + in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage account. + :type storage_account_attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'storage_account_attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(StorageAccountUpdateParameters, self).__init__(**kwargs) + self.active_key_name = kwargs.get('active_key_name', None) + self.auto_regenerate_key = kwargs.get('auto_regenerate_key', None) + self.regeneration_period = kwargs.get('regeneration_period', None) + self.storage_account_attributes = kwargs.get('storage_account_attributes', None) + self.tags = kwargs.get('tags', None) + + +class StorageBundle(Model): + """A Storage account bundle consists of key vault storage account details plus + its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage account id. + :vartype id: str + :ivar resource_id: The storage account resource id. + :vartype resource_id: str + :ivar active_key_name: The current active storage account key name. + :vartype active_key_name: str + :ivar auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :vartype auto_regenerate_key: bool + :ivar regeneration_period: The key regeneration time duration specified in + ISO-8601 format. + :vartype regeneration_period: str + :ivar attributes: The storage account attributes. + :vartype attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'active_key_name': {'readonly': True}, + 'auto_regenerate_key': {'readonly': True}, + 'regeneration_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(StorageBundle, self).__init__(**kwargs) + self.id = None + self.resource_id = None + self.active_key_name = None + self.auto_regenerate_key = None + self.regeneration_period = None + self.attributes = None + self.tags = None + + +class StorageListResult(Model): + """The storage accounts list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of storage accounts in + the key vault along with a link to the next page of storage accounts. + :vartype value: + list[~azure.keyvault.v2016_10_01.models.StorageAccountItem] + :ivar next_link: The URL to get the next set of storage accounts. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[StorageAccountItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(StorageListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SubjectAlternativeNames(Model): + """The subject alternate names of a X509 object. + + :param emails: Email addresses. + :type emails: list[str] + :param dns_names: Domain names. + :type dns_names: list[str] + :param upns: User principal names. + :type upns: list[str] + """ + + _attribute_map = { + 'emails': {'key': 'emails', 'type': '[str]'}, + 'dns_names': {'key': 'dns_names', 'type': '[str]'}, + 'upns': {'key': 'upns', 'type': '[str]'}, + } + + def __init__(self, **kwargs): + super(SubjectAlternativeNames, self).__init__(**kwargs) + self.emails = kwargs.get('emails', None) + self.dns_names = kwargs.get('dns_names', None) + self.upns = kwargs.get('upns', None) + + +class Trigger(Model): + """A condition to be satisfied for an action to be executed. + + :param lifetime_percentage: Percentage of lifetime at which to trigger. + Value should be between 1 and 99. + :type lifetime_percentage: int + :param days_before_expiry: Days before expiry to attempt renewal. Value + should be between 1 and validity_in_months multiplied by 27. If + validity_in_months is 36, then value should be between 1 and 972 (36 * + 27). + :type days_before_expiry: int + """ + + _validation = { + 'lifetime_percentage': {'maximum': 99, 'minimum': 1}, + } + + _attribute_map = { + 'lifetime_percentage': {'key': 'lifetime_percentage', 'type': 'int'}, + 'days_before_expiry': {'key': 'days_before_expiry', 'type': 'int'}, + } + + def __init__(self, **kwargs): + super(Trigger, self).__init__(**kwargs) + self.lifetime_percentage = kwargs.get('lifetime_percentage', None) + self.days_before_expiry = kwargs.get('days_before_expiry', None) + + +class X509CertificateProperties(Model): + """Properties of the X509 component of a certificate. + + :param subject: The subject name. Should be a valid X509 distinguished + Name. + :type subject: str + :param ekus: The enhanced key usage. + :type ekus: list[str] + :param subject_alternative_names: The subject alternative names. + :type subject_alternative_names: + ~azure.keyvault.v2016_10_01.models.SubjectAlternativeNames + :param key_usage: List of key usages. + :type key_usage: list[str or + ~azure.keyvault.v2016_10_01.models.KeyUsageType] + :param validity_in_months: The duration that the certificate is valid in + months. + :type validity_in_months: int + """ + + _validation = { + 'validity_in_months': {'minimum': 0}, + } + + _attribute_map = { + 'subject': {'key': 'subject', 'type': 'str'}, + 'ekus': {'key': 'ekus', 'type': '[str]'}, + 'subject_alternative_names': {'key': 'sans', 'type': 'SubjectAlternativeNames'}, + 'key_usage': {'key': 'key_usage', 'type': '[str]'}, + 'validity_in_months': {'key': 'validity_months', 'type': 'int'}, + } + + def __init__(self, **kwargs): + super(X509CertificateProperties, self).__init__(**kwargs) + self.subject = kwargs.get('subject', None) + self.ekus = kwargs.get('ekus', None) + self.subject_alternative_names = kwargs.get('subject_alternative_names', None) + self.key_usage = kwargs.get('key_usage', None) + self.validity_in_months = kwargs.get('validity_in_months', None) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/_models_py3.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/_models_py3.py new file mode 100644 index 000000000000..94ec3b96083e --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/models/_models_py3.py @@ -0,0 +1,2764 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from msrest.serialization import Model +from azure.core import HttpResponseError + + +class Action(Model): + """The action that will be executed. + + :param action_type: The type of the action. Possible values include: + 'EmailContacts', 'AutoRenew' + :type action_type: str or ~azure.keyvault.v2016_10_01.models.ActionType + """ + + _attribute_map = { + 'action_type': {'key': 'action_type', 'type': 'ActionType'}, + } + + def __init__(self, *, action_type=None, **kwargs) -> None: + super(Action, self).__init__(**kwargs) + self.action_type = action_type + + +class AdministratorDetails(Model): + """Details of the organization administrator of the certificate issuer. + + :param first_name: First name. + :type first_name: str + :param last_name: Last name. + :type last_name: str + :param email_address: Email address. + :type email_address: str + :param phone: Phone number. + :type phone: str + """ + + _attribute_map = { + 'first_name': {'key': 'first_name', 'type': 'str'}, + 'last_name': {'key': 'last_name', 'type': 'str'}, + 'email_address': {'key': 'email', 'type': 'str'}, + 'phone': {'key': 'phone', 'type': 'str'}, + } + + def __init__(self, *, first_name: str=None, last_name: str=None, email_address: str=None, phone: str=None, **kwargs) -> None: + super(AdministratorDetails, self).__init__(**kwargs) + self.first_name = first_name + self.last_name = last_name + self.email_address = email_address + self.phone = phone + + +class Attributes(Model): + """The object attributes managed by the KeyVault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, *, enabled: bool=None, not_before=None, expires=None, **kwargs) -> None: + super(Attributes, self).__init__(**kwargs) + self.enabled = enabled + self.not_before = not_before + self.expires = expires + self.created = None + self.updated = None + + +class BackupKeyResult(Model): + """The backup key result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up key. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs) -> None: + super(BackupKeyResult, self).__init__(**kwargs) + self.value = None + + +class BackupSecretResult(Model): + """The backup secret result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up secret. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs) -> None: + super(BackupSecretResult, self).__init__(**kwargs) + self.value = None + + +class CertificateAttributes(Attributes): + """The certificate management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for certificates in the current vault. If it contains 'Purgeable', + the certificate can be permanently deleted by a privileged user; + otherwise, only the system can purge the certificate, at the end of the + retention interval. Possible values include: 'Purgeable', + 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v2016_10_01.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, *, enabled: bool=None, not_before=None, expires=None, **kwargs) -> None: + super(CertificateAttributes, self).__init__(enabled=enabled, not_before=not_before, expires=expires, **kwargs) + self.recovery_level = None + + +class CertificateBundle(Model): + """A certificate bundle consists of a certificate (X509) plus its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :ivar kid: The key id. + :vartype kid: str + :ivar sid: The secret id. + :vartype sid: str + :ivar x509_thumbprint: Thumbprint of the certificate. + :vartype x509_thumbprint: bytes + :ivar policy: The management policy. + :vartype policy: ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param cer: CER contents of x509 certificate. + :type cer: bytearray + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs + :type tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'kid': {'readonly': True}, + 'sid': {'readonly': True}, + 'x509_thumbprint': {'readonly': True}, + 'policy': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'sid': {'key': 'sid', 'type': 'str'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'cer': {'key': 'cer', 'type': 'bytearray'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, cer: bytearray=None, content_type: str=None, attributes=None, tags=None, **kwargs) -> None: + super(CertificateBundle, self).__init__(**kwargs) + self.id = None + self.kid = None + self.sid = None + self.x509_thumbprint = None + self.policy = None + self.cer = cer + self.content_type = content_type + self.attributes = attributes + self.tags = tags + + +class CertificateCreateParameters(Model): + """The certificate create parameters. + + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, certificate_policy=None, certificate_attributes=None, tags=None, **kwargs) -> None: + super(CertificateCreateParameters, self).__init__(**kwargs) + self.certificate_policy = certificate_policy + self.certificate_attributes = certificate_attributes + self.tags = tags + + +class CertificateImportParameters(Model): + """The certificate import parameters. + + All required parameters must be populated in order to send to Azure. + + :param base64_encoded_certificate: Required. Base64 encoded representation + of the certificate object to import. This certificate needs to contain the + private key. + :type base64_encoded_certificate: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'base64_encoded_certificate': {'required': True}, + } + + _attribute_map = { + 'base64_encoded_certificate': {'key': 'value', 'type': 'str'}, + 'password': {'key': 'pwd', 'type': 'str'}, + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, base64_encoded_certificate: str, password: str=None, certificate_policy=None, certificate_attributes=None, tags=None, **kwargs) -> None: + super(CertificateImportParameters, self).__init__(**kwargs) + self.base64_encoded_certificate = base64_encoded_certificate + self.password = password + self.certificate_policy = certificate_policy + self.certificate_attributes = certificate_attributes + self.tags = tags + + +class CertificateIssuerItem(Model): + """The certificate issuer item containing certificate issuer metadata. + + :param id: Certificate Identifier. + :type id: str + :param provider: The issuer provider. + :type provider: str + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'provider': {'key': 'provider', 'type': 'str'}, + } + + def __init__(self, *, id: str=None, provider: str=None, **kwargs) -> None: + super(CertificateIssuerItem, self).__init__(**kwargs) + self.id = id + self.provider = provider + + +class CertificateIssuerListResult(Model): + """The certificate issuer list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of certificate issuers + in the key vault along with a link to the next page of certificate + issuers. + :vartype value: + list[~azure.keyvault.v2016_10_01.models.CertificateIssuerItem] + :ivar next_link: The URL to get the next set of certificate issuers. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[CertificateIssuerItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(CertificateIssuerListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class CertificateIssuerSetParameters(Model): + """The certificate issuer set parameters. + + All required parameters must be populated in order to send to Azure. + + :param provider: Required. The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + """ + + _validation = { + 'provider': {'required': True}, + } + + _attribute_map = { + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, *, provider: str, credentials=None, organization_details=None, attributes=None, **kwargs) -> None: + super(CertificateIssuerSetParameters, self).__init__(**kwargs) + self.provider = provider + self.credentials = credentials + self.organization_details = organization_details + self.attributes = attributes + + +class CertificateIssuerUpdateParameters(Model): + """The certificate issuer update parameters. + + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + """ + + _attribute_map = { + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, *, provider: str=None, credentials=None, organization_details=None, attributes=None, **kwargs) -> None: + super(CertificateIssuerUpdateParameters, self).__init__(**kwargs) + self.provider = provider + self.credentials = credentials + self.organization_details = organization_details + self.attributes = attributes + + +class CertificateItem(Model): + """The certificate item containing certificate metadata. + + :param id: Certificate identifier. + :type id: str + :param attributes: The certificate management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param x509_thumbprint: Thumbprint of the certificate. + :type x509_thumbprint: bytes + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + } + + def __init__(self, *, id: str=None, attributes=None, tags=None, x509_thumbprint: bytes=None, **kwargs) -> None: + super(CertificateItem, self).__init__(**kwargs) + self.id = id + self.attributes = attributes + self.tags = tags + self.x509_thumbprint = x509_thumbprint + + +class CertificateListResult(Model): + """The certificate list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of certificates in the + key vault along with a link to the next page of certificates. + :vartype value: list[~azure.keyvault.v2016_10_01.models.CertificateItem] + :ivar next_link: The URL to get the next set of certificates. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[CertificateItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(CertificateListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class CertificateMergeParameters(Model): + """The certificate merge parameters. + + All required parameters must be populated in order to send to Azure. + + :param x509_certificates: Required. The certificate or the certificate + chain to merge. + :type x509_certificates: list[bytearray] + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'x509_certificates': {'required': True}, + } + + _attribute_map = { + 'x509_certificates': {'key': 'x5c', 'type': '[bytearray]'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, x509_certificates, certificate_attributes=None, tags=None, **kwargs) -> None: + super(CertificateMergeParameters, self).__init__(**kwargs) + self.x509_certificates = x509_certificates + self.certificate_attributes = certificate_attributes + self.tags = tags + + +class CertificateOperation(Model): + """A certificate operation is returned in case of asynchronous requests. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :param issuer_parameters: Parameters for the issuer of the X509 component + of a certificate. + :type issuer_parameters: + ~azure.keyvault.v2016_10_01.models.IssuerParameters + :param csr: The certificate signing request (CSR) that is being used in + the certificate operation. + :type csr: bytearray + :param cancellation_requested: Indicates if cancellation was requested on + the certificate operation. + :type cancellation_requested: bool + :param status: Status of the certificate operation. + :type status: str + :param status_details: The status details of the certificate operation. + :type status_details: str + :param error: Error encountered, if any, during the certificate operation. + :type error: ~azure.keyvault.v2016_10_01.models.Error + :param target: Location which contains the result of the certificate + operation. + :type target: str + :param request_id: Identifier for the certificate operation. + :type request_id: str + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'issuer_parameters': {'key': 'issuer', 'type': 'IssuerParameters'}, + 'csr': {'key': 'csr', 'type': 'bytearray'}, + 'cancellation_requested': {'key': 'cancellation_requested', 'type': 'bool'}, + 'status': {'key': 'status', 'type': 'str'}, + 'status_details': {'key': 'status_details', 'type': 'str'}, + 'error': {'key': 'error', 'type': 'Error'}, + 'target': {'key': 'target', 'type': 'str'}, + 'request_id': {'key': 'request_id', 'type': 'str'}, + } + + def __init__(self, *, issuer_parameters=None, csr: bytearray=None, cancellation_requested: bool=None, status: str=None, status_details: str=None, error=None, target: str=None, request_id: str=None, **kwargs) -> None: + super(CertificateOperation, self).__init__(**kwargs) + self.id = None + self.issuer_parameters = issuer_parameters + self.csr = csr + self.cancellation_requested = cancellation_requested + self.status = status + self.status_details = status_details + self.error = error + self.target = target + self.request_id = request_id + + +class CertificateOperationUpdateParameter(Model): + """The certificate operation update parameters. + + All required parameters must be populated in order to send to Azure. + + :param cancellation_requested: Required. Indicates if cancellation was + requested on the certificate operation. + :type cancellation_requested: bool + """ + + _validation = { + 'cancellation_requested': {'required': True}, + } + + _attribute_map = { + 'cancellation_requested': {'key': 'cancellation_requested', 'type': 'bool'}, + } + + def __init__(self, *, cancellation_requested: bool, **kwargs) -> None: + super(CertificateOperationUpdateParameter, self).__init__(**kwargs) + self.cancellation_requested = cancellation_requested + + +class CertificatePolicy(Model): + """Management policy for a certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :param key_properties: Properties of the key backing a certificate. + :type key_properties: ~azure.keyvault.v2016_10_01.models.KeyProperties + :param secret_properties: Properties of the secret backing a certificate. + :type secret_properties: + ~azure.keyvault.v2016_10_01.models.SecretProperties + :param x509_certificate_properties: Properties of the X509 component of a + certificate. + :type x509_certificate_properties: + ~azure.keyvault.v2016_10_01.models.X509CertificateProperties + :param lifetime_actions: Actions that will be performed by Key Vault over + the lifetime of a certificate. + :type lifetime_actions: + list[~azure.keyvault.v2016_10_01.models.LifetimeAction] + :param issuer_parameters: Parameters for the issuer of the X509 component + of a certificate. + :type issuer_parameters: + ~azure.keyvault.v2016_10_01.models.IssuerParameters + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'key_properties': {'key': 'key_props', 'type': 'KeyProperties'}, + 'secret_properties': {'key': 'secret_props', 'type': 'SecretProperties'}, + 'x509_certificate_properties': {'key': 'x509_props', 'type': 'X509CertificateProperties'}, + 'lifetime_actions': {'key': 'lifetime_actions', 'type': '[LifetimeAction]'}, + 'issuer_parameters': {'key': 'issuer', 'type': 'IssuerParameters'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + } + + def __init__(self, *, key_properties=None, secret_properties=None, x509_certificate_properties=None, lifetime_actions=None, issuer_parameters=None, attributes=None, **kwargs) -> None: + super(CertificatePolicy, self).__init__(**kwargs) + self.id = None + self.key_properties = key_properties + self.secret_properties = secret_properties + self.x509_certificate_properties = x509_certificate_properties + self.lifetime_actions = lifetime_actions + self.issuer_parameters = issuer_parameters + self.attributes = attributes + + +class CertificateUpdateParameters(Model): + """The certificate update parameters. + + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, certificate_policy=None, certificate_attributes=None, tags=None, **kwargs) -> None: + super(CertificateUpdateParameters, self).__init__(**kwargs) + self.certificate_policy = certificate_policy + self.certificate_attributes = certificate_attributes + self.tags = tags + + +class Contact(Model): + """The contact information for the vault certificates. + + :param email_address: Email address. + :type email_address: str + :param name: Name. + :type name: str + :param phone: Phone number. + :type phone: str + """ + + _attribute_map = { + 'email_address': {'key': 'email', 'type': 'str'}, + 'name': {'key': 'name', 'type': 'str'}, + 'phone': {'key': 'phone', 'type': 'str'}, + } + + def __init__(self, *, email_address: str=None, name: str=None, phone: str=None, **kwargs) -> None: + super(Contact, self).__init__(**kwargs) + self.email_address = email_address + self.name = name + self.phone = phone + + +class Contacts(Model): + """The contacts for the vault certificates. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Identifier for the contacts collection. + :vartype id: str + :param contact_list: The contact list for the vault certificates. + :type contact_list: list[~azure.keyvault.v2016_10_01.models.Contact] + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'contact_list': {'key': 'contacts', 'type': '[Contact]'}, + } + + def __init__(self, *, contact_list=None, **kwargs) -> None: + super(Contacts, self).__init__(**kwargs) + self.id = None + self.contact_list = contact_list + + +class DeletedCertificateBundle(CertificateBundle): + """A Deleted Certificate consisting of its previous id, attributes and its + tags, as well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :ivar kid: The key id. + :vartype kid: str + :ivar sid: The secret id. + :vartype sid: str + :ivar x509_thumbprint: Thumbprint of the certificate. + :vartype x509_thumbprint: bytes + :ivar policy: The management policy. + :vartype policy: ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param cer: CER contents of x509 certificate. + :type cer: bytearray + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs + :type tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted certificate. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the certificate is scheduled to + be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the certificate was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'kid': {'readonly': True}, + 'sid': {'readonly': True}, + 'x509_thumbprint': {'readonly': True}, + 'policy': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'sid': {'key': 'sid', 'type': 'str'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'cer': {'key': 'cer', 'type': 'bytearray'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, cer: bytearray=None, content_type: str=None, attributes=None, tags=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedCertificateBundle, self).__init__(cer=cer, content_type=content_type, attributes=attributes, tags=tags, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedCertificateItem(CertificateItem): + """The deleted certificate item containing metadata about the deleted + certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Certificate identifier. + :type id: str + :param attributes: The certificate management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param x509_thumbprint: Thumbprint of the certificate. + :type x509_thumbprint: bytes + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted certificate. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the certificate is scheduled to + be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the certificate was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, id: str=None, attributes=None, tags=None, x509_thumbprint: bytes=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedCertificateItem, self).__init__(id=id, attributes=attributes, tags=tags, x509_thumbprint=x509_thumbprint, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedCertificateListResult(Model): + """A list of certificates that have been deleted in this vault. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of deleted certificates + in the vault along with a link to the next page of deleted certificates + :vartype value: + list[~azure.keyvault.v2016_10_01.models.DeletedCertificateItem] + :ivar next_link: The URL to get the next set of deleted certificates. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedCertificateItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(DeletedCertificateListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class KeyBundle(Model): + """A KeyBundle consisting of a WebKey plus its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param key: The Json web key. + :type key: ~azure.keyvault.v2016_10_01.models.JsonWebKey + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, *, key=None, attributes=None, tags=None, **kwargs) -> None: + super(KeyBundle, self).__init__(**kwargs) + self.key = key + self.attributes = attributes + self.tags = tags + self.managed = None + + +class DeletedKeyBundle(KeyBundle): + """A DeletedKeyBundle consisting of a WebKey plus its Attributes and deletion + info. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param key: The Json web key. + :type key: ~azure.keyvault.v2016_10_01.models.JsonWebKey + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted key. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the key is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the key was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, key=None, attributes=None, tags=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedKeyBundle, self).__init__(key=key, attributes=attributes, tags=tags, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class KeyItem(Model): + """The key item containing key metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param kid: Key identifier. + :type kid: str + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, *, kid: str=None, attributes=None, tags=None, **kwargs) -> None: + super(KeyItem, self).__init__(**kwargs) + self.kid = kid + self.attributes = attributes + self.tags = tags + self.managed = None + + +class DeletedKeyItem(KeyItem): + """The deleted key item containing the deleted key metadata and information + about deletion. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param kid: Key identifier. + :type kid: str + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted key. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the key is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the key was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, kid: str=None, attributes=None, tags=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedKeyItem, self).__init__(kid=kid, attributes=attributes, tags=tags, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedKeyListResult(Model): + """A list of keys that have been deleted in this vault. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of deleted keys in the + vault along with a link to the next page of deleted keys + :vartype value: list[~azure.keyvault.v2016_10_01.models.DeletedKeyItem] + :ivar next_link: The URL to get the next set of deleted keys. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedKeyItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(DeletedKeyListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SecretBundle(Model): + """A secret consisting of a value, id and its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param value: The secret value. + :type value: str + :param id: The secret id. + :type id: str + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar kid: If this is a secret backing a KV certificate, then this field + specifies the corresponding key backing the KV certificate. + :vartype kid: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a secret backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'kid': {'readonly': True}, + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'id': {'key': 'id', 'type': 'str'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, *, value: str=None, id: str=None, content_type: str=None, attributes=None, tags=None, **kwargs) -> None: + super(SecretBundle, self).__init__(**kwargs) + self.value = value + self.id = id + self.content_type = content_type + self.attributes = attributes + self.tags = tags + self.kid = None + self.managed = None + + +class DeletedSecretBundle(SecretBundle): + """A Deleted Secret consisting of its previous id, attributes and its tags, as + well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param value: The secret value. + :type value: str + :param id: The secret id. + :type id: str + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar kid: If this is a secret backing a KV certificate, then this field + specifies the corresponding key backing the KV certificate. + :vartype kid: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a secret backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted secret. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the secret is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the secret was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'kid': {'readonly': True}, + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'id': {'key': 'id', 'type': 'str'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, value: str=None, id: str=None, content_type: str=None, attributes=None, tags=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedSecretBundle, self).__init__(value=value, id=id, content_type=content_type, attributes=attributes, tags=tags, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class SecretItem(Model): + """The secret item containing secret metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Secret identifier. + :type id: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, *, id: str=None, attributes=None, tags=None, content_type: str=None, **kwargs) -> None: + super(SecretItem, self).__init__(**kwargs) + self.id = id + self.attributes = attributes + self.tags = tags + self.content_type = content_type + self.managed = None + + +class DeletedSecretItem(SecretItem): + """The deleted secret item containing metadata about the deleted secret. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Secret identifier. + :type id: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted secret. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the secret is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the secret was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, id: str=None, attributes=None, tags=None, content_type: str=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedSecretItem, self).__init__(id=id, attributes=attributes, tags=tags, content_type=content_type, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedSecretListResult(Model): + """The deleted secret list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of the deleted secrets + in the vault along with a link to the next page of deleted secrets + :vartype value: list[~azure.keyvault.v2016_10_01.models.DeletedSecretItem] + :ivar next_link: The URL to get the next set of deleted secrets. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedSecretItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(DeletedSecretListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class Error(Model): + """The key vault server error. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar code: The error code. + :vartype code: str + :ivar message: The error message. + :vartype message: str + :ivar inner_error: + :vartype inner_error: ~azure.keyvault.v2016_10_01.models.Error + """ + + _validation = { + 'code': {'readonly': True}, + 'message': {'readonly': True}, + 'inner_error': {'readonly': True}, + } + + _attribute_map = { + 'code': {'key': 'code', 'type': 'str'}, + 'message': {'key': 'message', 'type': 'str'}, + 'inner_error': {'key': 'innererror', 'type': 'Error'}, + } + + def __init__(self, **kwargs) -> None: + super(Error, self).__init__(**kwargs) + self.code = None + self.message = None + self.inner_error = None + + +class IssuerAttributes(Model): + """The attributes of an issuer managed by the Key Vault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the issuer is enabled. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, *, enabled: bool=None, **kwargs) -> None: + super(IssuerAttributes, self).__init__(**kwargs) + self.enabled = enabled + self.created = None + self.updated = None + + +class IssuerBundle(Model): + """The issuer for Key Vault certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Identifier for the issuer object. + :vartype id: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, *, provider: str=None, credentials=None, organization_details=None, attributes=None, **kwargs) -> None: + super(IssuerBundle, self).__init__(**kwargs) + self.id = None + self.provider = provider + self.credentials = credentials + self.organization_details = organization_details + self.attributes = attributes + + +class IssuerCredentials(Model): + """The credentials to be used for the certificate issuer. + + :param account_id: The user name/account name/account id. + :type account_id: str + :param password: The password/secret/account key. + :type password: str + """ + + _attribute_map = { + 'account_id': {'key': 'account_id', 'type': 'str'}, + 'password': {'key': 'pwd', 'type': 'str'}, + } + + def __init__(self, *, account_id: str=None, password: str=None, **kwargs) -> None: + super(IssuerCredentials, self).__init__(**kwargs) + self.account_id = account_id + self.password = password + + +class IssuerParameters(Model): + """Parameters for the issuer of the X509 component of a certificate. + + :param name: Name of the referenced issuer object or reserved names; for + example, 'Self' or 'Unknown'. + :type name: str + :param certificate_type: Type of certificate to be requested from the + issuer provider. + :type certificate_type: str + """ + + _attribute_map = { + 'name': {'key': 'name', 'type': 'str'}, + 'certificate_type': {'key': 'cty', 'type': 'str'}, + } + + def __init__(self, *, name: str=None, certificate_type: str=None, **kwargs) -> None: + super(IssuerParameters, self).__init__(**kwargs) + self.name = name + self.certificate_type = certificate_type + + +class JsonWebKey(Model): + """As of http://tools.ietf.org/html/draft-ietf-jose-json-web-key-18. + + :param kid: Key identifier. + :type kid: str + :param kty: JsonWebKey key type (kty). Possible values include: 'EC', + 'EC-HSM', 'RSA', 'RSA-HSM', 'oct' + :type kty: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyType + :param key_ops: + :type key_ops: list[str] + :param n: RSA modulus. + :type n: bytes + :param e: RSA public exponent. + :type e: bytes + :param d: RSA private exponent, or the D component of an EC private key. + :type d: bytes + :param dp: RSA private key parameter. + :type dp: bytes + :param dq: RSA private key parameter. + :type dq: bytes + :param qi: RSA private key parameter. + :type qi: bytes + :param p: RSA secret prime. + :type p: bytes + :param q: RSA secret prime, with p < q. + :type q: bytes + :param k: Symmetric key. + :type k: bytes + :param t: HSM Token, used with 'Bring Your Own Key'. + :type t: bytes + :param crv: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'SECP256K1' + :type crv: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyCurveName + :param x: X component of an EC public key. + :type x: bytes + :param y: Y component of an EC public key. + :type y: bytes + """ + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'kty': {'key': 'kty', 'type': 'str'}, + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'n': {'key': 'n', 'type': 'base64'}, + 'e': {'key': 'e', 'type': 'base64'}, + 'd': {'key': 'd', 'type': 'base64'}, + 'dp': {'key': 'dp', 'type': 'base64'}, + 'dq': {'key': 'dq', 'type': 'base64'}, + 'qi': {'key': 'qi', 'type': 'base64'}, + 'p': {'key': 'p', 'type': 'base64'}, + 'q': {'key': 'q', 'type': 'base64'}, + 'k': {'key': 'k', 'type': 'base64'}, + 't': {'key': 'key_hsm', 'type': 'base64'}, + 'crv': {'key': 'crv', 'type': 'str'}, + 'x': {'key': 'x', 'type': 'base64'}, + 'y': {'key': 'y', 'type': 'base64'}, + } + + def __init__(self, *, kid: str=None, kty=None, key_ops=None, n: bytes=None, e: bytes=None, d: bytes=None, dp: bytes=None, dq: bytes=None, qi: bytes=None, p: bytes=None, q: bytes=None, k: bytes=None, t: bytes=None, crv=None, x: bytes=None, y: bytes=None, **kwargs) -> None: + super(JsonWebKey, self).__init__(**kwargs) + self.kid = kid + self.kty = kty + self.key_ops = key_ops + self.n = n + self.e = e + self.d = d + self.dp = dp + self.dq = dq + self.qi = qi + self.p = p + self.q = q + self.k = k + self.t = t + self.crv = crv + self.x = x + self.y = y + + +class KeyAttributes(Attributes): + """The attributes of a key managed by the key vault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for keys in the current vault. If it contains 'Purgeable' the key + can be permanently deleted by a privileged user; otherwise, only the + system can purge the key, at the end of the retention interval. Possible + values include: 'Purgeable', 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v2016_10_01.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, *, enabled: bool=None, not_before=None, expires=None, **kwargs) -> None: + super(KeyAttributes, self).__init__(enabled=enabled, not_before=not_before, expires=expires, **kwargs) + self.recovery_level = None + + +class KeyCreateParameters(Model): + """The key create parameters. + + All required parameters must be populated in order to send to Azure. + + :param kty: Required. The type of key to create. For valid values, see + JsonWebKeyType. Possible values include: 'EC', 'EC-HSM', 'RSA', 'RSA-HSM', + 'oct' + :type kty: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or 4096 + for RSA. + :type key_size: int + :param key_ops: + :type key_ops: list[str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'SECP256K1' + :type curve: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyCurveName + """ + + _validation = { + 'kty': {'required': True, 'min_length': 1}, + } + + _attribute_map = { + 'kty': {'key': 'kty', 'type': 'str'}, + 'key_size': {'key': 'key_size', 'type': 'int'}, + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'curve': {'key': 'crv', 'type': 'str'}, + } + + def __init__(self, *, kty, key_size: int=None, key_ops=None, key_attributes=None, tags=None, curve=None, **kwargs) -> None: + super(KeyCreateParameters, self).__init__(**kwargs) + self.kty = kty + self.key_size = key_size + self.key_ops = key_ops + self.key_attributes = key_attributes + self.tags = tags + self.curve = curve + + +class KeyImportParameters(Model): + """The key import parameters. + + All required parameters must be populated in order to send to Azure. + + :param hsm: Whether to import as a hardware key (HSM) or software key. + :type hsm: bool + :param key: Required. The Json web key + :type key: ~azure.keyvault.v2016_10_01.models.JsonWebKey + :param key_attributes: The key management attributes. + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'key': {'required': True}, + } + + _attribute_map = { + 'hsm': {'key': 'Hsm', 'type': 'bool'}, + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, key, hsm: bool=None, key_attributes=None, tags=None, **kwargs) -> None: + super(KeyImportParameters, self).__init__(**kwargs) + self.hsm = hsm + self.key = key + self.key_attributes = key_attributes + self.tags = tags + + +class KeyListResult(Model): + """The key list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of keys in the key vault + along with a link to the next page of keys. + :vartype value: list[~azure.keyvault.v2016_10_01.models.KeyItem] + :ivar next_link: The URL to get the next set of keys. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[KeyItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(KeyListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class KeyOperationResult(Model): + """The key operation result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar kid: Key identifier + :vartype kid: str + :ivar result: + :vartype result: bytes + """ + + _validation = { + 'kid': {'readonly': True}, + 'result': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'result': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs) -> None: + super(KeyOperationResult, self).__init__(**kwargs) + self.kid = None + self.result = None + + +class KeyOperationsParameters(Model): + """The key operations parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: Required. + :type value: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'value': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, algorithm, value: bytes, **kwargs) -> None: + super(KeyOperationsParameters, self).__init__(**kwargs) + self.algorithm = algorithm + self.value = value + + +class KeyProperties(Model): + """Properties of the key pair backing a certificate. + + :param exportable: Indicates if the private key can be exported. + :type exportable: bool + :param key_type: The key type. + :type key_type: str + :param key_size: The key size in bits. For example: 2048, 3072, or 4096 + for RSA. + :type key_size: int + :param reuse_key: Indicates if the same key pair will be used on + certificate renewal. + :type reuse_key: bool + """ + + _attribute_map = { + 'exportable': {'key': 'exportable', 'type': 'bool'}, + 'key_type': {'key': 'kty', 'type': 'str'}, + 'key_size': {'key': 'key_size', 'type': 'int'}, + 'reuse_key': {'key': 'reuse_key', 'type': 'bool'}, + } + + def __init__(self, *, exportable: bool=None, key_type: str=None, key_size: int=None, reuse_key: bool=None, **kwargs) -> None: + super(KeyProperties, self).__init__(**kwargs) + self.exportable = exportable + self.key_type = key_type + self.key_size = key_size + self.reuse_key = reuse_key + + +class KeyRestoreParameters(Model): + """The key restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param key_bundle_backup: Required. The backup blob associated with a key + bundle. + :type key_bundle_backup: bytes + """ + + _validation = { + 'key_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'key_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, key_bundle_backup: bytes, **kwargs) -> None: + super(KeyRestoreParameters, self).__init__(**kwargs) + self.key_bundle_backup = key_bundle_backup + + +class KeySignParameters(Model): + """The key operations parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. The signing/verification algorithm identifier. + For more information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', 'PS384', + 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', 'ES384', 'ES512', + 'ECDSA256' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeySignatureAlgorithm + :param value: Required. + :type value: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'value': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, algorithm, value: bytes, **kwargs) -> None: + super(KeySignParameters, self).__init__(**kwargs) + self.algorithm = algorithm + self.value = value + + +class KeyUpdateParameters(Model): + """The key update parameters. + + :param key_ops: Json web key operations. For more information on possible + key operations, see JsonWebKeyOperation. + :type key_ops: list[str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, key_ops=None, key_attributes=None, tags=None, **kwargs) -> None: + super(KeyUpdateParameters, self).__init__(**kwargs) + self.key_ops = key_ops + self.key_attributes = key_attributes + self.tags = tags + + +class KeyVaultError(Model): + """The key vault error exception. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar error: + :vartype error: ~azure.keyvault.v2016_10_01.models.Error + """ + + _validation = { + 'error': {'readonly': True}, + } + + _attribute_map = { + 'error': {'key': 'error', 'type': 'Error'}, + } + + def __init__(self, **kwargs) -> None: + super(KeyVaultError, self).__init__(**kwargs) + self.error = None + + +class KeyVaultErrorException(HttpResponseError): + """Server responsed with exception of type: 'KeyVaultError'. + + :param deserialize: A deserializer + :param response: Server response to be deserialized. + """ + + def __init__(self, response, deserialize, *args): + + model_name = 'KeyVaultError' + self.error = deserialize(model_name, response) + if self.error is None: + self.error = deserialize.dependencies[model_name]() + super(KeyVaultErrorException, self).__init__(response=response) + + +class KeyVerifyParameters(Model): + """The key verify parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. The signing/verification algorithm. For more + information on possible algorithm types, see JsonWebKeySignatureAlgorithm. + Possible values include: 'PS256', 'PS384', 'PS512', 'RS256', 'RS384', + 'RS512', 'RSNULL', 'ES256', 'ES384', 'ES512', 'ECDSA256' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeySignatureAlgorithm + :param digest: Required. The digest used for signing. + :type digest: bytes + :param signature: Required. The signature to be verified. + :type signature: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'digest': {'required': True}, + 'signature': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'digest': {'key': 'digest', 'type': 'base64'}, + 'signature': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, algorithm, digest: bytes, signature: bytes, **kwargs) -> None: + super(KeyVerifyParameters, self).__init__(**kwargs) + self.algorithm = algorithm + self.digest = digest + self.signature = signature + + +class KeyVerifyResult(Model): + """The key verify result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: True if the signature is verified, otherwise false. + :vartype value: bool + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'bool'}, + } + + def __init__(self, **kwargs) -> None: + super(KeyVerifyResult, self).__init__(**kwargs) + self.value = None + + +class LifetimeAction(Model): + """Action and its trigger that will be performed by Key Vault over the + lifetime of a certificate. + + :param trigger: The condition that will execute the action. + :type trigger: ~azure.keyvault.v2016_10_01.models.Trigger + :param action: The action that will be executed. + :type action: ~azure.keyvault.v2016_10_01.models.Action + """ + + _attribute_map = { + 'trigger': {'key': 'trigger', 'type': 'Trigger'}, + 'action': {'key': 'action', 'type': 'Action'}, + } + + def __init__(self, *, trigger=None, action=None, **kwargs) -> None: + super(LifetimeAction, self).__init__(**kwargs) + self.trigger = trigger + self.action = action + + +class OrganizationDetails(Model): + """Details of the organization of the certificate issuer. + + :param id: Id of the organization. + :type id: str + :param admin_details: Details of the organization administrator. + :type admin_details: + list[~azure.keyvault.v2016_10_01.models.AdministratorDetails] + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'admin_details': {'key': 'admin_details', 'type': '[AdministratorDetails]'}, + } + + def __init__(self, *, id: str=None, admin_details=None, **kwargs) -> None: + super(OrganizationDetails, self).__init__(**kwargs) + self.id = id + self.admin_details = admin_details + + +class PendingCertificateSigningRequestResult(Model): + """The pending certificate signing request result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The pending certificate signing request as Base64 encoded + string. + :vartype value: str + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(PendingCertificateSigningRequestResult, self).__init__(**kwargs) + self.value = None + + +class SasDefinitionAttributes(Model): + """The SAS definition management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: the enabled state of the object. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, *, enabled: bool=None, **kwargs) -> None: + super(SasDefinitionAttributes, self).__init__(**kwargs) + self.enabled = enabled + self.created = None + self.updated = None + + +class SasDefinitionBundle(Model): + """A SAS definition bundle consists of key vault SAS definition details plus + its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The SAS definition id. + :vartype id: str + :ivar secret_id: Storage account SAS definition secret id. + :vartype secret_id: str + :ivar parameters: The SAS definition metadata in the form of key-value + pairs. + :vartype parameters: dict[str, str] + :ivar attributes: The SAS definition attributes. + :vartype attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'parameters': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'parameters': {'key': 'parameters', 'type': '{str}'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs) -> None: + super(SasDefinitionBundle, self).__init__(**kwargs) + self.id = None + self.secret_id = None + self.parameters = None + self.attributes = None + self.tags = None + + +class SasDefinitionCreateParameters(Model): + """The SAS definition create parameters. + + All required parameters must be populated in order to send to Azure. + + :param parameters: Required. Sas definition creation metadata in the form + of key-value pairs. + :type parameters: dict[str, str] + :param sas_definition_attributes: The attributes of the SAS definition. + :type sas_definition_attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'parameters': {'required': True}, + } + + _attribute_map = { + 'parameters': {'key': 'parameters', 'type': '{str}'}, + 'sas_definition_attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, parameters, sas_definition_attributes=None, tags=None, **kwargs) -> None: + super(SasDefinitionCreateParameters, self).__init__(**kwargs) + self.parameters = parameters + self.sas_definition_attributes = sas_definition_attributes + self.tags = tags + + +class SasDefinitionItem(Model): + """The SAS definition item containing storage SAS definition metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage SAS identifier. + :vartype id: str + :ivar secret_id: The storage account SAS definition secret id. + :vartype secret_id: str + :ivar attributes: The SAS definition management attributes. + :vartype attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs) -> None: + super(SasDefinitionItem, self).__init__(**kwargs) + self.id = None + self.secret_id = None + self.attributes = None + self.tags = None + + +class SasDefinitionListResult(Model): + """The storage account SAS definition list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of SAS definitions along + with a link to the next page of SAS definitions. + :vartype value: list[~azure.keyvault.v2016_10_01.models.SasDefinitionItem] + :ivar next_link: The URL to get the next set of SAS definitions. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[SasDefinitionItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(SasDefinitionListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SasDefinitionUpdateParameters(Model): + """The SAS definition update parameters. + + :param parameters: Sas definition update metadata in the form of key-value + pairs. + :type parameters: dict[str, str] + :param sas_definition_attributes: The attributes of the SAS definition. + :type sas_definition_attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'parameters': {'key': 'parameters', 'type': '{str}'}, + 'sas_definition_attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, parameters=None, sas_definition_attributes=None, tags=None, **kwargs) -> None: + super(SasDefinitionUpdateParameters, self).__init__(**kwargs) + self.parameters = parameters + self.sas_definition_attributes = sas_definition_attributes + self.tags = tags + + +class SecretAttributes(Attributes): + """The secret management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for secrets in the current vault. If it contains 'Purgeable', the + secret can be permanently deleted by a privileged user; otherwise, only + the system can purge the secret, at the end of the retention interval. + Possible values include: 'Purgeable', 'Recoverable+Purgeable', + 'Recoverable', 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v2016_10_01.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, *, enabled: bool=None, not_before=None, expires=None, **kwargs) -> None: + super(SecretAttributes, self).__init__(enabled=enabled, not_before=not_before, expires=expires, **kwargs) + self.recovery_level = None + + +class SecretListResult(Model): + """The secret list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of secrets in the key + vault along with a link to the next page of secrets. + :vartype value: list[~azure.keyvault.v2016_10_01.models.SecretItem] + :ivar next_link: The URL to get the next set of secrets. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[SecretItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(SecretListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SecretProperties(Model): + """Properties of the key backing a certificate. + + :param content_type: The media type (MIME type). + :type content_type: str + """ + + _attribute_map = { + 'content_type': {'key': 'contentType', 'type': 'str'}, + } + + def __init__(self, *, content_type: str=None, **kwargs) -> None: + super(SecretProperties, self).__init__(**kwargs) + self.content_type = content_type + + +class SecretRestoreParameters(Model): + """The secret restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param secret_bundle_backup: Required. The backup blob associated with a + secret bundle. + :type secret_bundle_backup: bytes + """ + + _validation = { + 'secret_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'secret_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, secret_bundle_backup: bytes, **kwargs) -> None: + super(SecretRestoreParameters, self).__init__(**kwargs) + self.secret_bundle_backup = secret_bundle_backup + + +class SecretSetParameters(Model): + """The secret set parameters. + + All required parameters must be populated in order to send to Azure. + + :param value: Required. The value of the secret. + :type value: str + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: + ~azure.keyvault.v2016_10_01.models.SecretAttributes + """ + + _validation = { + 'value': {'required': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'secret_attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + } + + def __init__(self, *, value: str, tags=None, content_type: str=None, secret_attributes=None, **kwargs) -> None: + super(SecretSetParameters, self).__init__(**kwargs) + self.value = value + self.tags = tags + self.content_type = content_type + self.secret_attributes = secret_attributes + + +class SecretUpdateParameters(Model): + """The secret update parameters. + + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: + ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'secret_attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, content_type: str=None, secret_attributes=None, tags=None, **kwargs) -> None: + super(SecretUpdateParameters, self).__init__(**kwargs) + self.content_type = content_type + self.secret_attributes = secret_attributes + self.tags = tags + + +class StorageAccountAttributes(Model): + """The storage account management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: the enabled state of the object. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, *, enabled: bool=None, **kwargs) -> None: + super(StorageAccountAttributes, self).__init__(**kwargs) + self.enabled = enabled + self.created = None + self.updated = None + + +class StorageAccountCreateParameters(Model): + """The storage account create parameters. + + All required parameters must be populated in order to send to Azure. + + :param resource_id: Required. Storage account resource id. + :type resource_id: str + :param active_key_name: Required. Current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: Required. whether keyvault should manage the + storage account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration specified + in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage account. + :type storage_account_attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'resource_id': {'required': True}, + 'active_key_name': {'required': True}, + 'auto_regenerate_key': {'required': True}, + } + + _attribute_map = { + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'storage_account_attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, resource_id: str, active_key_name: str, auto_regenerate_key: bool, regeneration_period: str=None, storage_account_attributes=None, tags=None, **kwargs) -> None: + super(StorageAccountCreateParameters, self).__init__(**kwargs) + self.resource_id = resource_id + self.active_key_name = active_key_name + self.auto_regenerate_key = auto_regenerate_key + self.regeneration_period = regeneration_period + self.storage_account_attributes = storage_account_attributes + self.tags = tags + + +class StorageAccountItem(Model): + """The storage account item containing storage account metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Storage identifier. + :vartype id: str + :ivar resource_id: Storage account resource Id. + :vartype resource_id: str + :ivar attributes: The storage account management attributes. + :vartype attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs) -> None: + super(StorageAccountItem, self).__init__(**kwargs) + self.id = None + self.resource_id = None + self.attributes = None + self.tags = None + + +class StorageAccountRegenerteKeyParameters(Model): + """The storage account key regenerate parameters. + + All required parameters must be populated in order to send to Azure. + + :param key_name: Required. The storage account key name. + :type key_name: str + """ + + _validation = { + 'key_name': {'required': True}, + } + + _attribute_map = { + 'key_name': {'key': 'keyName', 'type': 'str'}, + } + + def __init__(self, *, key_name: str, **kwargs) -> None: + super(StorageAccountRegenerteKeyParameters, self).__init__(**kwargs) + self.key_name = key_name + + +class StorageAccountUpdateParameters(Model): + """The storage account update parameters. + + :param active_key_name: The current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration specified + in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage account. + :type storage_account_attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'storage_account_attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, active_key_name: str=None, auto_regenerate_key: bool=None, regeneration_period: str=None, storage_account_attributes=None, tags=None, **kwargs) -> None: + super(StorageAccountUpdateParameters, self).__init__(**kwargs) + self.active_key_name = active_key_name + self.auto_regenerate_key = auto_regenerate_key + self.regeneration_period = regeneration_period + self.storage_account_attributes = storage_account_attributes + self.tags = tags + + +class StorageBundle(Model): + """A Storage account bundle consists of key vault storage account details plus + its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage account id. + :vartype id: str + :ivar resource_id: The storage account resource id. + :vartype resource_id: str + :ivar active_key_name: The current active storage account key name. + :vartype active_key_name: str + :ivar auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :vartype auto_regenerate_key: bool + :ivar regeneration_period: The key regeneration time duration specified in + ISO-8601 format. + :vartype regeneration_period: str + :ivar attributes: The storage account attributes. + :vartype attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'active_key_name': {'readonly': True}, + 'auto_regenerate_key': {'readonly': True}, + 'regeneration_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs) -> None: + super(StorageBundle, self).__init__(**kwargs) + self.id = None + self.resource_id = None + self.active_key_name = None + self.auto_regenerate_key = None + self.regeneration_period = None + self.attributes = None + self.tags = None + + +class StorageListResult(Model): + """The storage accounts list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of storage accounts in + the key vault along with a link to the next page of storage accounts. + :vartype value: + list[~azure.keyvault.v2016_10_01.models.StorageAccountItem] + :ivar next_link: The URL to get the next set of storage accounts. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[StorageAccountItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(StorageListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SubjectAlternativeNames(Model): + """The subject alternate names of a X509 object. + + :param emails: Email addresses. + :type emails: list[str] + :param dns_names: Domain names. + :type dns_names: list[str] + :param upns: User principal names. + :type upns: list[str] + """ + + _attribute_map = { + 'emails': {'key': 'emails', 'type': '[str]'}, + 'dns_names': {'key': 'dns_names', 'type': '[str]'}, + 'upns': {'key': 'upns', 'type': '[str]'}, + } + + def __init__(self, *, emails=None, dns_names=None, upns=None, **kwargs) -> None: + super(SubjectAlternativeNames, self).__init__(**kwargs) + self.emails = emails + self.dns_names = dns_names + self.upns = upns + + +class Trigger(Model): + """A condition to be satisfied for an action to be executed. + + :param lifetime_percentage: Percentage of lifetime at which to trigger. + Value should be between 1 and 99. + :type lifetime_percentage: int + :param days_before_expiry: Days before expiry to attempt renewal. Value + should be between 1 and validity_in_months multiplied by 27. If + validity_in_months is 36, then value should be between 1 and 972 (36 * + 27). + :type days_before_expiry: int + """ + + _validation = { + 'lifetime_percentage': {'maximum': 99, 'minimum': 1}, + } + + _attribute_map = { + 'lifetime_percentage': {'key': 'lifetime_percentage', 'type': 'int'}, + 'days_before_expiry': {'key': 'days_before_expiry', 'type': 'int'}, + } + + def __init__(self, *, lifetime_percentage: int=None, days_before_expiry: int=None, **kwargs) -> None: + super(Trigger, self).__init__(**kwargs) + self.lifetime_percentage = lifetime_percentage + self.days_before_expiry = days_before_expiry + + +class X509CertificateProperties(Model): + """Properties of the X509 component of a certificate. + + :param subject: The subject name. Should be a valid X509 distinguished + Name. + :type subject: str + :param ekus: The enhanced key usage. + :type ekus: list[str] + :param subject_alternative_names: The subject alternative names. + :type subject_alternative_names: + ~azure.keyvault.v2016_10_01.models.SubjectAlternativeNames + :param key_usage: List of key usages. + :type key_usage: list[str or + ~azure.keyvault.v2016_10_01.models.KeyUsageType] + :param validity_in_months: The duration that the certificate is valid in + months. + :type validity_in_months: int + """ + + _validation = { + 'validity_in_months': {'minimum': 0}, + } + + _attribute_map = { + 'subject': {'key': 'subject', 'type': 'str'}, + 'ekus': {'key': 'ekus', 'type': '[str]'}, + 'subject_alternative_names': {'key': 'sans', 'type': 'SubjectAlternativeNames'}, + 'key_usage': {'key': 'key_usage', 'type': '[str]'}, + 'validity_in_months': {'key': 'validity_months', 'type': 'int'}, + } + + def __init__(self, *, subject: str=None, ekus=None, subject_alternative_names=None, key_usage=None, validity_in_months: int=None, **kwargs) -> None: + super(X509CertificateProperties, self).__init__(**kwargs) + self.subject = subject + self.ekus = ekus + self.subject_alternative_names = subject_alternative_names + self.key_usage = key_usage + self.validity_in_months = validity_in_months diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/operations/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/operations/__init__.py new file mode 100644 index 000000000000..603e37d3ee07 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/operations/__init__.py @@ -0,0 +1,16 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from ._key_vault_client_operations import KeyVaultClientOperationsMixin + +__all__ = [ + 'KeyVaultClientOperationsMixin', +] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/operations/_key_vault_client_operations.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/operations/_key_vault_client_operations.py new file mode 100644 index 000000000000..0ae7fd5fb025 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/operations/_key_vault_client_operations.py @@ -0,0 +1,4475 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from azure.core.exceptions import map_error +from azure.core.paging import ItemPaged +from .. import models +import uuid + + +class KeyVaultClientOperationsMixin(object): + + def create_key(self, vault_base_url, key_name, kty, key_size=None, key_ops=None, key_attributes=None, tags=None, curve=None, cls=None, **kwargs): + """Creates a new key, stores it, then returns key parameters and + attributes to the client. + + The create key operation can be used to create any key type in Azure + Key Vault. If the named key already exists, Azure Key Vault creates a + new version of the key. It requires the keys/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name for the new key. The system will generate + the version name for the new key. + :type key_name: str + :param kty: The type of key to create. For valid values, see + JsonWebKeyType. Possible values include: 'EC', 'EC-HSM', 'RSA', + 'RSA-HSM', 'oct' + :type kty: str or ~azure.keyvault.v2016_10_01.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or + 4096 for RSA. + :type key_size: int + :param key_ops: + :type key_ops: list[str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', + 'P-521', 'SECP256K1' + :type curve: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyCurveName + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyCreateParameters(kty=kty, key_size=key_size, key_ops=key_ops, key_attributes=key_attributes, tags=tags, curve=curve) + + # Construct URL + url = self.create_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyCreateParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + create_key.metadata = {'url': '/keys/{key-name}/create'} + + def import_key(self, vault_base_url, key_name, key, hsm=None, key_attributes=None, tags=None, cls=None, **kwargs): + """Imports an externally created key, stores it, and returns key + parameters and attributes to the client. + + The import key operation may be used to import any key type into an + Azure Key Vault. If the named key already exists, Azure Key Vault + creates a new version of the key. This operation requires the + keys/import permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: Name for the imported key. + :type key_name: str + :param key: The Json web key + :type key: ~azure.keyvault.v2016_10_01.models.JsonWebKey + :param hsm: Whether to import as a hardware key (HSM) or software key. + :type hsm: bool + :param key_attributes: The key management attributes. + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyImportParameters(hsm=hsm, key=key, key_attributes=key_attributes, tags=tags) + + # Construct URL + url = self.import_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyImportParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + import_key.metadata = {'url': '/keys/{key-name}'} + + def delete_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Deletes a key of any type from storage in Azure Key Vault. + + The delete key operation cannot be used to remove individual versions + of a key. This operation removes the cryptographic material associated + with the key, which means the key is not usable for Sign/Verify, + Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the + keys/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key to delete. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedKeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedKeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedKeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_key.metadata = {'url': '/keys/{key-name}'} + + def update_key(self, vault_base_url, key_name, key_version, key_ops=None, key_attributes=None, tags=None, cls=None, **kwargs): + """The update key operation changes specified attributes of a stored key + and can be applied to any key type and key version stored in Azure Key + Vault. + + In order to perform this operation, the key must already exist in the + Key Vault. Note: The cryptographic material of a key itself cannot be + changed. This operation requires the keys/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of key to update. + :type key_name: str + :param key_version: The version of the key to update. + :type key_version: str + :param key_ops: Json web key operations. For more information on + possible key operations, see JsonWebKeyOperation. + :type key_ops: list[str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v2016_10_01.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyUpdateParameters(key_ops=key_ops, key_attributes=key_attributes, tags=tags) + + # Construct URL + url = self.update_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_key.metadata = {'url': '/keys/{key-name}/{key-version}'} + + def get_key(self, vault_base_url, key_name, key_version, cls=None, **kwargs): + """Gets the public part of a stored key. + + The get key operation is applicable to all key types. If the requested + key is symmetric, then no key material is released in the response. + This operation requires the keys/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key to get. + :type key_name: str + :param key_version: Adding the version parameter retrieves a specific + version of a key. + :type key_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_key.metadata = {'url': '/keys/{key-name}/{key-version}'} + + def get_key_versions( + self, vault_base_url, key_name, maxresults=None, cls=None, **kwargs): + """Retrieves a list of individual key versions with the same key name. + + The full key identifier, attributes, and tags are provided in the + response. This operation requires the keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of KeyItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.KeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_key_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('KeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_key_versions.metadata = {'url': '/keys/{key-name}/versions'} + + def get_keys( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """List keys in the specified vault. + + Retrieves a list of the keys in the Key Vault as JSON Web Key + structures that contain the public part of a stored key. The LIST + operation is applicable to all key types, however only the base key + identifier, attributes, and tags are provided in the response. + Individual versions of a key are not listed in the response. This + operation requires the keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of KeyItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.KeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_keys.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('KeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_keys.metadata = {'url': '/keys'} + + def backup_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Requests that a backup of the specified key be downloaded to the + client. + + The Key Backup operation exports a key from Azure Key Vault in a + protected form. Note that this operation does NOT return key material + in a form that can be used outside the Azure Key Vault system, the + returned key material is either protected to a Azure Key Vault HSM or + to Azure Key Vault itself. The intent of this operation is to allow a + client to GENERATE a key in one Azure Key Vault instance, BACKUP the + key, and then RESTORE it into another Azure Key Vault instance. The + BACKUP operation may be used to export, in protected form, any key type + from Azure Key Vault. Individual versions of a key cannot be backed up. + BACKUP / RESTORE can be performed within geographical boundaries only; + meaning that a BACKUP from one geographical area cannot be restored to + another geographical area. For example, a backup from the US + geographical area cannot be restored in an EU geographical area. This + operation requires the key/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupKeyResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.BackupKeyResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupKeyResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_key.metadata = {'url': '/keys/{key-name}/backup'} + + def restore_key(self, vault_base_url, key_bundle_backup, cls=None, **kwargs): + """Restores a backed up key to a vault. + + Imports a previously backed up key into Azure Key Vault, restoring the + key, its key identifier, attributes and access control policies. The + RESTORE operation may be used to import a previously backed up key. + Individual versions of a key cannot be restored. The key is restored in + its entirety with the same key name as it had when it was backed up. If + the key name is not available in the target Key Vault, the RESTORE + operation will be rejected. While the key name is retained during + restore, the final key identifier will change if the key is restored to + a different vault. Restore will restore all versions and preserve + version identifiers. The RESTORE operation is subject to security + constraints: The target Key Vault must be owned by the same Microsoft + Azure Subscription as the source Key Vault The user must have RESTORE + permission in the target Key Vault. This operation requires the + keys/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_bundle_backup: The backup blob associated with a key + bundle. + :type key_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyRestoreParameters(key_bundle_backup=key_bundle_backup) + + # Construct URL + url = self.restore_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_key.metadata = {'url': '/keys/restore'} + + def encrypt(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Encrypts an arbitrary sequence of bytes using an encryption key that is + stored in a key vault. + + The ENCRYPT operation encrypts an arbitrary sequence of bytes using an + encryption key that is stored in Azure Key Vault. Note that the ENCRYPT + operation only supports a single block of data, the size of which is + dependent on the target key and the encryption algorithm to be used. + The ENCRYPT operation is only strictly necessary for symmetric keys + stored in Azure Key Vault since protection with an asymmetric key can + be performed using public portion of the key. This operation is + supported for asymmetric keys as a convenience for callers that have a + key-reference but do not have access to the public key material. This + operation requires the keys/encrypt permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.encrypt.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + encrypt.metadata = {'url': '/keys/{key-name}/{key-version}/encrypt'} + + def decrypt(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Decrypts a single block of encrypted data. + + The DECRYPT operation decrypts a well-formed block of ciphertext using + the target encryption key and specified algorithm. This operation is + the reverse of the ENCRYPT operation; only a single block of data may + be decrypted, the size of this block is dependent on the target key and + the algorithm to be used. The DECRYPT operation applies to asymmetric + and symmetric keys stored in Azure Key Vault since it uses the private + portion of the key. This operation requires the keys/decrypt + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.decrypt.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + decrypt.metadata = {'url': '/keys/{key-name}/{key-version}/decrypt'} + + def sign(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Creates a signature from a digest using the specified key. + + The SIGN operation is applicable to asymmetric and symmetric keys + stored in Azure Key Vault since this operation uses the private portion + of the key. This operation requires the keys/sign permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: The signing/verification algorithm identifier. For + more information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', + 'PS384', 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', + 'ES384', 'ES512', 'ECDSA256' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeySignatureAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeySignParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.sign.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeySignParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + sign.metadata = {'url': '/keys/{key-name}/{key-version}/sign'} + + def verify(self, vault_base_url, key_name, key_version, algorithm, digest, signature, cls=None, **kwargs): + """Verifies a signature using a specified key. + + The VERIFY operation is applicable to symmetric keys stored in Azure + Key Vault. VERIFY is not strictly necessary for asymmetric keys stored + in Azure Key Vault since signature verification can be performed using + the public portion of the key but this operation is supported as a + convenience for callers that only have a key-reference and not the + public portion of the key. This operation requires the keys/verify + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: The signing/verification algorithm. For more + information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', + 'PS384', 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', + 'ES384', 'ES512', 'ECDSA256' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeySignatureAlgorithm + :param digest: The digest used for signing. + :type digest: bytes + :param signature: The signature to be verified. + :type signature: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyVerifyResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyVerifyResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyVerifyParameters(algorithm=algorithm, digest=digest, signature=signature) + + # Construct URL + url = self.verify.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyVerifyParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyVerifyResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + verify.metadata = {'url': '/keys/{key-name}/{key-version}/verify'} + + def wrap_key(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Wraps a symmetric key using a specified key. + + The WRAP operation supports encryption of a symmetric key using a key + encryption key that has previously been stored in an Azure Key Vault. + The WRAP operation is only strictly necessary for symmetric keys stored + in Azure Key Vault since protection with an asymmetric key can be + performed using the public portion of the key. This operation is + supported for asymmetric keys as a convenience for callers that have a + key-reference but do not have access to the public key material. This + operation requires the keys/wrapKey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.wrap_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + wrap_key.metadata = {'url': '/keys/{key-name}/{key-version}/wrapkey'} + + def unwrap_key(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Unwraps a symmetric key using the specified key that was initially used + for wrapping that key. + + The UNWRAP operation supports decryption of a symmetric key using the + target key encryption key. This operation is the reverse of the WRAP + operation. The UNWRAP operation applies to asymmetric and symmetric + keys stored in Azure Key Vault since it uses the private portion of the + key. This operation requires the keys/unwrapKey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v2016_10_01.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.unwrap_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + unwrap_key.metadata = {'url': '/keys/{key-name}/{key-version}/unwrapkey'} + + def get_deleted_keys( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """Lists the deleted keys in the specified vault. + + Retrieves a list of the keys in the Key Vault as JSON Web Key + structures that contain the public part of a deleted key. This + operation includes deletion-specific information. The Get Deleted Keys + operation is applicable for vaults enabled for soft-delete. While the + operation can be invoked on any vault, it will return an error if + invoked on a non soft-delete enabled vault. This operation requires the + keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedKeyItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.DeletedKeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_keys.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('DeletedKeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_deleted_keys.metadata = {'url': '/deletedkeys'} + + def get_deleted_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Gets the public part of a deleted key. + + The Get Deleted Key operation is applicable for soft-delete enabled + vaults. While the operation can be invoked on any vault, it will return + an error if invoked on a non soft-delete enabled vault. This operation + requires the keys/get permission. . + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedKeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedKeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedKeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_key.metadata = {'url': '/deletedkeys/{key-name}'} + + def purge_deleted_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Permanently deletes the specified key. + + The Purge Deleted Key operation is applicable for soft-delete enabled + vaults. While the operation can be invoked on any vault, it will return + an error if invoked on a non soft-delete enabled vault. This operation + requires the keys/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_key.metadata = {'url': '/deletedkeys/{key-name}'} + + def recover_deleted_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Recovers the deleted key to its latest version. + + The Recover Deleted Key operation is applicable for deleted keys in + soft-delete enabled vaults. It recovers the deleted key back to its + latest version under /keys. An attempt to recover an non-deleted key + will return an error. Consider this the inverse of the delete operation + on soft-delete enabled vaults. This operation requires the keys/recover + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the deleted key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_key.metadata = {'url': '/deletedkeys/{key-name}/recover'} + + def set_secret(self, vault_base_url, secret_name, value, tags=None, content_type=None, secret_attributes=None, cls=None, **kwargs): + """Sets a secret in a specified key vault. + + The SET operation adds a secret to the Azure Key Vault. If the named + secret already exists, Azure Key Vault creates a new version of that + secret. This operation requires the secrets/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param value: The value of the secret. + :type value: str + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: + ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretSetParameters(value=value, tags=tags, content_type=content_type, secret_attributes=secret_attributes) + + # Construct URL + url = self.set_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretSetParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_secret.metadata = {'url': '/secrets/{secret-name}'} + + def delete_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Deletes a secret from a specified key vault. + + The DELETE operation applies to any secret stored in Azure Key Vault. + DELETE cannot be applied to an individual version of a secret. This + operation requires the secrets/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedSecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_secret.metadata = {'url': '/secrets/{secret-name}'} + + def update_secret(self, vault_base_url, secret_name, secret_version, content_type=None, secret_attributes=None, tags=None, cls=None, **kwargs): + """Updates the attributes associated with a specified secret in a given + key vault. + + The UPDATE operation changes specified attributes of an existing stored + secret. Attributes that are not specified in the request are left + unchanged. The value of a secret itself cannot be changed. This + operation requires the secrets/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param secret_version: The version of the secret. + :type secret_version: str + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: + ~azure.keyvault.v2016_10_01.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretUpdateParameters(content_type=content_type, secret_attributes=secret_attributes, tags=tags) + + # Construct URL + url = self.update_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str'), + 'secret-version': self._serialize.url("secret_version", secret_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} + + def get_secret(self, vault_base_url, secret_name, secret_version, cls=None, **kwargs): + """Get a specified secret from a given key vault. + + The GET operation is applicable to any secret stored in Azure Key + Vault. This operation requires the secrets/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param secret_version: The version of the secret. + :type secret_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str'), + 'secret-version': self._serialize.url("secret_version", secret_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} + + def get_secrets( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """List secrets in a specified key vault. + + The Get Secrets operation is applicable to the entire vault. However, + only the base secret identifier and its attributes are provided in the + response. Individual secret versions are not listed in the response. + This operation requires the secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified, the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SecretItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.SecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_secrets.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('SecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_secrets.metadata = {'url': '/secrets'} + + def get_secret_versions( + self, vault_base_url, secret_name, maxresults=None, cls=None, **kwargs): + """List all versions of the specified secret. + + The full secret identifier and attributes are provided in the response. + No values are returned for the secrets. This operations requires the + secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified, the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SecretItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.SecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_secret_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('SecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_secret_versions.metadata = {'url': '/secrets/{secret-name}/versions'} + + def get_deleted_secrets( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """Lists deleted secrets for the specified vault. + + The Get Deleted Secrets operation returns the secrets that have been + deleted for a vault enabled for soft-delete. This operation requires + the secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedSecretItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.DeletedSecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_secrets.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('DeletedSecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_deleted_secrets.metadata = {'url': '/deletedsecrets'} + + def get_deleted_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Gets the specified deleted secret. + + The Get Deleted Secret operation returns the specified deleted secret + along with its attributes. This operation requires the secrets/get + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedSecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}'} + + def purge_deleted_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Permanently deletes the specified secret. + + The purge deleted secret operation removes the secret permanently, + without the possibility of recovery. This operation can only be enabled + on a soft-delete enabled vault. This operation requires the + secrets/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}'} + + def recover_deleted_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Recovers the deleted secret to the latest version. + + Recovers the deleted secret in the specified vault. This operation can + only be performed on a soft-delete enabled vault. This operation + requires the secrets/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the deleted secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}/recover'} + + def backup_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Backs up the specified secret. + + Requests that a backup of the specified secret be downloaded to the + client. All versions of the secret will be downloaded. This operation + requires the secrets/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupSecretResult or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.BackupSecretResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupSecretResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_secret.metadata = {'url': '/secrets/{secret-name}/backup'} + + def restore_secret(self, vault_base_url, secret_bundle_backup, cls=None, **kwargs): + """Restores a backed up secret to a vault. + + Restores a backed up secret, and all its versions, to a vault. This + operation requires the secrets/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_bundle_backup: The backup blob associated with a secret + bundle. + :type secret_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretRestoreParameters(secret_bundle_backup=secret_bundle_backup) + + # Construct URL + url = self.restore_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_secret.metadata = {'url': '/secrets/restore'} + + def get_certificates( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """List certificates in a specified key vault. + + The GetCertificates operation returns the set of certificates resources + in the specified key vault. This operation requires the + certificates/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.CertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificates.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('CertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_certificates.metadata = {'url': '/certificates'} + + def delete_certificate(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Deletes a certificate from a specified key vault. + + Deletes all versions of a certificate object along with its associated + policy. Delete certificate cannot be used to remove individual versions + of a certificate object. This operation requires the + certificates/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedCertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedCertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedCertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate.metadata = {'url': '/certificates/{certificate-name}'} + + def set_certificate_contacts(self, vault_base_url, contact_list=None, cls=None, **kwargs): + """Sets the certificate contacts for the specified key vault. + + Sets the certificate contacts for the specified key vault. This + operation requires the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param contact_list: The contact list for the vault certificates. + :type contact_list: list[~azure.keyvault.v2016_10_01.models.Contact] + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + contacts = models.Contacts(contact_list=contact_list) + + # Construct URL + url = self.set_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(contacts, 'Contacts') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + def get_certificate_contacts(self, vault_base_url, cls=None, **kwargs): + """Lists the certificate contacts for a specified key vault. + + The GetCertificateContacts operation returns the set of certificate + contact resources in the specified key vault. This operation requires + the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + def delete_certificate_contacts(self, vault_base_url, cls=None, **kwargs): + """Deletes the certificate contacts for a specified key vault. + + Deletes the certificate contacts for a specified key vault certificate. + This operation requires the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + def get_certificate_issuers( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """List certificate issuers for a specified key vault. + + The GetCertificateIssuers operation returns the set of certificate + issuer resources in the specified key vault. This operation requires + the certificates/manageissuers/getissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateIssuerItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.CertificateIssuerItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificate_issuers.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('CertificateIssuerListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_certificate_issuers.metadata = {'url': '/certificates/issuers'} + + def set_certificate_issuer(self, vault_base_url, issuer_name, provider, credentials=None, organization_details=None, attributes=None, cls=None, **kwargs): + """Sets the specified certificate issuer. + + The SetCertificateIssuer operation adds or updates the specified + certificate issuer. This operation requires the certificates/setissuers + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: + ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided + to the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameter = models.CertificateIssuerSetParameters(provider=provider, credentials=credentials, organization_details=organization_details, attributes=attributes) + + # Construct URL + url = self.set_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameter, 'CertificateIssuerSetParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + def update_certificate_issuer(self, vault_base_url, issuer_name, provider=None, credentials=None, organization_details=None, attributes=None, cls=None, **kwargs): + """Updates the specified certificate issuer. + + The UpdateCertificateIssuer operation performs an update on the + specified certificate issuer entity. This operation requires the + certificates/setissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: + ~azure.keyvault.v2016_10_01.models.IssuerCredentials + :param organization_details: Details of the organization as provided + to the issuer. + :type organization_details: + ~azure.keyvault.v2016_10_01.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v2016_10_01.models.IssuerAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameter = models.CertificateIssuerUpdateParameters(provider=provider, credentials=credentials, organization_details=organization_details, attributes=attributes) + + # Construct URL + url = self.update_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameter, 'CertificateIssuerUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + def get_certificate_issuer(self, vault_base_url, issuer_name, cls=None, **kwargs): + """Lists the specified certificate issuer. + + The GetCertificateIssuer operation returns the specified certificate + issuer resources in the specified key vault. This operation requires + the certificates/manageissuers/getissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + def delete_certificate_issuer(self, vault_base_url, issuer_name, cls=None, **kwargs): + """Deletes the specified certificate issuer. + + The DeleteCertificateIssuer operation permanently removes the specified + certificate issuer from the vault. This operation requires the + certificates/manageissuers/deleteissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + def create_certificate(self, vault_base_url, certificate_name, certificate_policy=None, certificate_attributes=None, tags=None, cls=None, **kwargs): + """Creates a new certificate. + + If this is the first version, the certificate resource is created. This + operation requires the certificates/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateCreateParameters(certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.create_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateCreateParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [202]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 202: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + create_certificate.metadata = {'url': '/certificates/{certificate-name}/create'} + + def import_certificate(self, vault_base_url, certificate_name, base64_encoded_certificate, password=None, certificate_policy=None, certificate_attributes=None, tags=None, cls=None, **kwargs): + """Imports a certificate into a specified key vault. + + Imports an existing valid certificate, containing a private key, into + Azure Key Vault. The certificate to be imported can be in either PFX or + PEM format. If the certificate is in PEM format the PEM file must + contain the key as well as x509 certificates. This operation requires + the certificates/import permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param base64_encoded_certificate: Base64 encoded representation of + the certificate object to import. This certificate needs to contain + the private key. + :type base64_encoded_certificate: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateImportParameters(base64_encoded_certificate=base64_encoded_certificate, password=password, certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.import_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateImportParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + import_certificate.metadata = {'url': '/certificates/{certificate-name}/import'} + + def get_certificate_versions( + self, vault_base_url, certificate_name, maxresults=None, cls=None, **kwargs): + """List the versions of a certificate. + + The GetCertificateVersions operation returns the versions of a + certificate in the specified key vault. This operation requires the + certificates/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.CertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificate_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('CertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_certificate_versions.metadata = {'url': '/certificates/{certificate-name}/versions'} + + def get_certificate_policy(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Lists the policy for a certificate. + + The GetCertificatePolicy operation returns the specified certificate + policy resources in the specified key vault. This operation requires + the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in a given key + vault. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificatePolicy or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_policy.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificatePolicy', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_policy.metadata = {'url': '/certificates/{certificate-name}/policy'} + + def update_certificate_policy(self, vault_base_url, certificate_name, certificate_policy, cls=None, **kwargs): + """Updates the policy for a certificate. + + Set specified members in the certificate policy. Leave others as null. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given + vault. + :type certificate_name: str + :param certificate_policy: The policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificatePolicy or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.update_certificate_policy.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(certificate_policy, 'CertificatePolicy') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificatePolicy', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_policy.metadata = {'url': '/certificates/{certificate-name}/policy'} + + def update_certificate(self, vault_base_url, certificate_name, certificate_version, certificate_policy=None, certificate_attributes=None, tags=None, cls=None, **kwargs): + """Updates the specified attributes associated with the given certificate. + + The UpdateCertificate operation applies the specified update on the + given certificate; the only elements updated are the certificate's + attributes. This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given key + vault. + :type certificate_name: str + :param certificate_version: The version of the certificate. + :type certificate_version: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v2016_10_01.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateUpdateParameters(certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.update_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str'), + 'certificate-version': self._serialize.url("certificate_version", certificate_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate.metadata = {'url': '/certificates/{certificate-name}/{certificate-version}'} + + def get_certificate(self, vault_base_url, certificate_name, certificate_version, cls=None, **kwargs): + """Gets information about a certificate. + + Gets information about a specific certificate. This operation requires + the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given + vault. + :type certificate_name: str + :param certificate_version: The version of the certificate. + :type certificate_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str'), + 'certificate-version': self._serialize.url("certificate_version", certificate_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate.metadata = {'url': '/certificates/{certificate-name}/{certificate-version}'} + + def update_certificate_operation(self, vault_base_url, certificate_name, cancellation_requested, cls=None, **kwargs): + """Updates a certificate operation. + + Updates a certificate creation operation that is already in progress. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param cancellation_requested: Indicates if cancellation was requested + on the certificate operation. + :type cancellation_requested: bool + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + certificate_operation = models.CertificateOperationUpdateParameter(cancellation_requested=cancellation_requested) + + # Construct URL + url = self.update_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(certificate_operation, 'CertificateOperationUpdateParameter') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + def get_certificate_operation(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Gets the creation operation of a certificate. + + Gets the creation operation associated with a specified certificate. + This operation requires the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + def delete_certificate_operation(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Deletes the creation operation for a specific certificate. + + Deletes the creation operation for a specified certificate that is in + the process of being created. The certificate is no longer created. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + def merge_certificate(self, vault_base_url, certificate_name, x509_certificates, certificate_attributes=None, tags=None, cls=None, **kwargs): + """Merges a certificate or a certificate chain with a key pair existing on + the server. + + The MergeCertificate operation performs the merging of a certificate or + certificate chain with a key pair currently available in the service. + This operation requires the certificates/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param x509_certificates: The certificate or the certificate chain to + merge. + :type x509_certificates: list[bytearray] + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v2016_10_01.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateMergeParameters(x509_certificates=x509_certificates, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.merge_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateMergeParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [201]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 201: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + merge_certificate.metadata = {'url': '/certificates/{certificate-name}/pending/merge'} + + def get_deleted_certificates( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """Lists the deleted certificates in the specified vault currently + available for recovery. + + The GetDeletedCertificates operation retrieves the certificates in the + current vault which are in a deleted state and ready for recovery or + purging. This operation includes deletion-specific information. This + operation requires the certificates/get/list permission. This operation + can only be enabled on soft-delete enabled vaults. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedCertificateItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.DeletedCertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_certificates.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('DeletedCertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_deleted_certificates.metadata = {'url': '/deletedcertificates'} + + def get_deleted_certificate(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Retrieves information about the specified deleted certificate. + + The GetDeletedCertificate operation retrieves the deleted certificate + information plus its attributes, such as retention interval, scheduled + permanent deletion and the current deletion recovery level. This + operation requires the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedCertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.DeletedCertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedCertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}'} + + def purge_deleted_certificate(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Permanently deletes the specified deleted certificate. + + The PurgeDeletedCertificate operation performs an irreversible deletion + of the specified certificate, without possibility for recovery. The + operation is not available if the recovery level does not specify + 'Purgeable'. This operation requires the certificate/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}'} + + def recover_deleted_certificate(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Recovers the deleted certificate back to its current version under + /certificates. + + The RecoverDeletedCertificate operation performs the reversal of the + Delete operation. The operation is applicable in vaults enabled for + soft-delete, and must be issued during the retention interval + (available in the deleted certificate's attributes). This operation + requires the certificates/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the deleted certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}/recover'} + + def get_storage_accounts( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """List storage accounts managed by the specified key vault. This + operation requires the storage/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of StorageAccountItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.StorageAccountItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_storage_accounts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('StorageListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_storage_accounts.metadata = {'url': '/storage'} + + def delete_storage_account(self, vault_base_url, storage_account_name, cls=None, **kwargs): + """Deletes a storage account. This operation requires the storage/delete + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + def get_storage_account(self, vault_base_url, storage_account_name, cls=None, **kwargs): + """Gets information about a specified storage account. This operation + requires the storage/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + def set_storage_account(self, vault_base_url, storage_account_name, resource_id, active_key_name, auto_regenerate_key, regeneration_period=None, storage_account_attributes=None, tags=None, cls=None, **kwargs): + """Creates or updates a new storage account. This operation requires the + storage/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param resource_id: Storage account resource id. + :type resource_id: str + :param active_key_name: Current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration + specified in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage + account. + :type storage_account_attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountCreateParameters(resource_id=resource_id, active_key_name=active_key_name, auto_regenerate_key=auto_regenerate_key, regeneration_period=regeneration_period, storage_account_attributes=storage_account_attributes, tags=tags) + + # Construct URL + url = self.set_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountCreateParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + def update_storage_account(self, vault_base_url, storage_account_name, active_key_name=None, auto_regenerate_key=None, regeneration_period=None, storage_account_attributes=None, tags=None, cls=None, **kwargs): + """Updates the specified attributes associated with the given storage + account. This operation requires the storage/set/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param active_key_name: The current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration + specified in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage + account. + :type storage_account_attributes: + ~azure.keyvault.v2016_10_01.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountUpdateParameters(active_key_name=active_key_name, auto_regenerate_key=auto_regenerate_key, regeneration_period=regeneration_period, storage_account_attributes=storage_account_attributes, tags=tags) + + # Construct URL + url = self.update_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + def regenerate_storage_account_key(self, vault_base_url, storage_account_name, key_name, cls=None, **kwargs): + """Regenerates the specified key value for the given storage account. This + operation requires the storage/regeneratekey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param key_name: The storage account key name. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountRegenerteKeyParameters(key_name=key_name) + + # Construct URL + url = self.regenerate_storage_account_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountRegenerteKeyParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + regenerate_storage_account_key.metadata = {'url': '/storage/{storage-account-name}/regeneratekey'} + + def get_sas_definitions( + self, vault_base_url, storage_account_name, maxresults=None, cls=None, **kwargs): + """List storage SAS definitions for the given storage account. This + operation requires the storage/listsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SasDefinitionItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v2016_10_01.models.SasDefinitionItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_sas_definitions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('SasDefinitionListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_sas_definitions.metadata = {'url': '/storage/{storage-account-name}/sas'} + + def delete_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, cls=None, **kwargs): + """Deletes a SAS definition from a specified storage account. This + operation requires the storage/deletesas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + def get_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, cls=None, **kwargs): + """Gets information about a SAS definition for the specified storage + account. This operation requires the storage/getsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + def set_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, parameters, sas_definition_attributes=None, tags=None, cls=None, **kwargs): + """Creates or updates a new SAS definition for the specified storage + account. This operation requires the storage/setsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param parameters: Sas definition creation metadata in the form of + key-value pairs. + :type parameters: dict[str, str] + :param sas_definition_attributes: The attributes of the SAS + definition. + :type sas_definition_attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters1 = models.SasDefinitionCreateParameters(parameters=parameters, sas_definition_attributes=sas_definition_attributes, tags=tags) + + # Construct URL + url = self.set_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters1, 'SasDefinitionCreateParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + def update_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, parameters=None, sas_definition_attributes=None, tags=None, cls=None, **kwargs): + """Updates the specified attributes associated with the given SAS + definition. This operation requires the storage/setsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param parameters: Sas definition update metadata in the form of + key-value pairs. + :type parameters: dict[str, str] + :param sas_definition_attributes: The attributes of the SAS + definition. + :type sas_definition_attributes: + ~azure.keyvault.v2016_10_01.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v2016_10_01.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters1 = models.SasDefinitionUpdateParameters(parameters=parameters, sas_definition_attributes=sas_definition_attributes, tags=tags) + + # Construct URL + url = self.update_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters1, 'SasDefinitionUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/version.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/version.py new file mode 100644 index 000000000000..20ba78005d47 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v2016_10_01/version.py @@ -0,0 +1,13 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +VERSION = "2016-10-01" + diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/__init__.py new file mode 100644 index 000000000000..e913d4cf6c46 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/__init__.py @@ -0,0 +1,18 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from ._key_vault_client import KeyVaultClient +__all__ = ['KeyVaultClient'] + +from .version import VERSION + +__version__ = VERSION + diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/_configuration.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/_configuration.py new file mode 100644 index 000000000000..28cf75e3d2b4 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/_configuration.py @@ -0,0 +1,48 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- +from azure.core.configuration import Configuration, ConnectionConfiguration +from azure.core.pipeline import policies + +from .version import VERSION + + +class KeyVaultClientConfiguration(Configuration): + """Configuration for KeyVaultClient + Note that all parameters used to create this instance are saved as instance + attributes. + + :param credentials: Credentials needed for the client to connect to Azure. + :type credentials: :mod:`A msrestazure Credentials + object` + """ + + def __init__(self, credentials, **kwargs): + + if credentials is None: + raise ValueError("Parameter 'credentials' must not be None.") + + super(KeyVaultClientConfiguration, self).__init__(**kwargs) + self._configure(**kwargs) + + self.user_agent_policy.add_user_agent('azsdk-python-azure-keyvault/{}'.format(VERSION)) + self.generate_client_request_id = True + + self.credentials = credentials + + def _configure(self, **kwargs): + self.connection = ConnectionConfiguration(**kwargs) + self.user_agent_policy = policies.UserAgentPolicy(**kwargs) + self.headers_policy = policies.HeadersPolicy(**kwargs) + self.proxy_policy = policies.ProxyPolicy(**kwargs) + self.logging_policy = policies.NetworkTraceLoggingPolicy(**kwargs) + self.retry_policy = policies.RetryPolicy(**kwargs) + self.custom_hook_policy = policies.CustomHookPolicy(**kwargs) + self.redirect_policy = policies.RedirectPolicy(**kwargs) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/_key_vault_client.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/_key_vault_client.py new file mode 100644 index 000000000000..a1a1eb19328b --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/_key_vault_client.py @@ -0,0 +1,46 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from azure.core import PipelineClient +from msrest import Serializer, Deserializer + +from ._configuration import KeyVaultClientConfiguration +from .operations import KeyVaultClientOperationsMixin +from . import models + + +class KeyVaultClient(KeyVaultClientOperationsMixin): + """The key vault client performs cryptographic key operations and vault operations against the Key Vault service. + + + :param credentials: Credentials needed for the client to connect to Azure. + :type credentials: :mod:`A msrestazure Credentials + object` + """ + + def __init__( + self, credentials, **kwargs): + + base_url = '{vaultBaseUrl}' + self._config = KeyVaultClientConfiguration(credentials, **kwargs) + self._client = PipelineClient(base_url=base_url, config=self._config, **kwargs) + + client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)} + self.api_version = '7.0' + self._serialize = Serializer(client_models) + self._deserialize = Deserializer(client_models) + + + def __enter__(self): + self._client.__enter__() + return self + def __exit__(self, *exc_details): + self._client.__exit__(*exc_details) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/__init__.py new file mode 100644 index 000000000000..fb2e6c3866fd --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/__init__.py @@ -0,0 +1,13 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from ._key_vault_client_async import KeyVaultClient +__all__ = ['KeyVaultClient'] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/_configuration_async.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/_configuration_async.py new file mode 100644 index 000000000000..a61d9eeff444 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/_configuration_async.py @@ -0,0 +1,47 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- +from azure.core.configuration import Configuration, ConnectionConfiguration +from azure.core.pipeline import policies + +from ..version import VERSION + + +class KeyVaultClientConfiguration(Configuration): + """Configuration for KeyVaultClient + Note that all parameters used to create this instance are saved as instance + attributes. + + :param credentials: Credentials needed for the client to connect to Azure. + :type credentials: :mod:`A msrestazure Credentials + object` + """ + + def __init__(self, credentials, **kwargs): + + if credentials is None: + raise ValueError("Parameter 'credentials' must not be None.") + + super(KeyVaultClientConfiguration, self).__init__(**kwargs) + self._configure(**kwargs) + + self.user_agent_policy.add_user_agent('azsdk-python-azure-keyvault/{}'.format(VERSION)) + self.generate_client_request_id = True + + self.credentials = credentials + + def _configure(self, **kwargs): + self.connection = ConnectionConfiguration(**kwargs) + self.user_agent_policy = policies.UserAgentPolicy(**kwargs) + self.headers_policy = policies.HeadersPolicy(**kwargs) + self.proxy_policy = policies.ProxyPolicy(**kwargs) + self.logging_policy = policies.NetworkTraceLoggingPolicy(**kwargs) + self.retry_policy = policies.AsyncRetryPolicy(**kwargs) + self.redirect_policy = policies.AsyncRedirectPolicy(**kwargs) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/_key_vault_client_async.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/_key_vault_client_async.py new file mode 100644 index 000000000000..482d6336ab1a --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/_key_vault_client_async.py @@ -0,0 +1,46 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from azure.core import AsyncPipelineClient +from msrest import Serializer, Deserializer + +from ._configuration_async import KeyVaultClientConfiguration +from .operations_async import KeyVaultClientOperationsMixin +from .. import models + + +class KeyVaultClient(KeyVaultClientOperationsMixin): + """The key vault client performs cryptographic key operations and vault operations against the Key Vault service. + + + :param credentials: Credentials needed for the client to connect to Azure. + :type credentials: :mod:`A msrestazure Credentials + object` + """ + + def __init__( + self, credentials, **kwargs): + + base_url = '{vaultBaseUrl}' + self._config = KeyVaultClientConfiguration(credentials, **kwargs) + self._client = AsyncPipelineClient(base_url=base_url, config=self._config, **kwargs) + + client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)} + self.api_version = '7.0' + self._serialize = Serializer(client_models) + self._deserialize = Deserializer(client_models) + + + async def __aenter__(self): + await self._client.__aenter__() + return self + async def __aexit__(self, *exc_details): + await self._client.__aexit__(*exc_details) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/operations_async/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/operations_async/__init__.py new file mode 100644 index 000000000000..771a17ceb80d --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/operations_async/__init__.py @@ -0,0 +1,16 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from ._key_vault_client_operations_async import KeyVaultClientOperationsMixin + +__all__ = [ + 'KeyVaultClientOperationsMixin', +] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/operations_async/_key_vault_client_operations_async.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/operations_async/_key_vault_client_operations_async.py new file mode 100644 index 000000000000..08e45c2b44a7 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/aio/operations_async/_key_vault_client_operations_async.py @@ -0,0 +1,5163 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from azure.core.exceptions import map_error +from azure.core.async_paging import AsyncItemPaged, AsyncList +from ... import models +import uuid + + +class KeyVaultClientOperationsMixin: + + async def create_key(self, vault_base_url, key_name, kty, key_size=None, key_ops=None, key_attributes=None, tags=None, curve=None, *, cls=None, **kwargs): + """Creates a new key, stores it, then returns key parameters and + attributes to the client. + + The create key operation can be used to create any key type in Azure + Key Vault. If the named key already exists, Azure Key Vault creates a + new version of the key. It requires the keys/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name for the new key. The system will generate + the version name for the new key. + :type key_name: str + :param kty: The type of key to create. For valid values, see + JsonWebKeyType. Possible values include: 'EC', 'EC-HSM', 'RSA', + 'RSA-HSM', 'oct' + :type kty: str or ~azure.keyvault.v7_0.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or + 4096 for RSA. + :type key_size: int + :param key_ops: + :type key_ops: list[str or + ~azure.keyvault.v7_0.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', + 'P-521', 'P-256K' + :type curve: str or ~azure.keyvault.v7_0.models.JsonWebKeyCurveName + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyCreateParameters(kty=kty, key_size=key_size, key_ops=key_ops, key_attributes=key_attributes, tags=tags, curve=curve) + + # Construct URL + url = self.create_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyCreateParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + create_key.metadata = {'url': '/keys/{key-name}/create'} + + async def import_key(self, vault_base_url, key_name, key, hsm=None, key_attributes=None, tags=None, *, cls=None, **kwargs): + """Imports an externally created key, stores it, and returns key + parameters and attributes to the client. + + The import key operation may be used to import any key type into an + Azure Key Vault. If the named key already exists, Azure Key Vault + creates a new version of the key. This operation requires the + keys/import permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: Name for the imported key. + :type key_name: str + :param key: The Json web key + :type key: ~azure.keyvault.v7_0.models.JsonWebKey + :param hsm: Whether to import as a hardware key (HSM) or software key. + :type hsm: bool + :param key_attributes: The key management attributes. + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyImportParameters(hsm=hsm, key=key, key_attributes=key_attributes, tags=tags) + + # Construct URL + url = self.import_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyImportParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + import_key.metadata = {'url': '/keys/{key-name}'} + + async def delete_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Deletes a key of any type from storage in Azure Key Vault. + + The delete key operation cannot be used to remove individual versions + of a key. This operation removes the cryptographic material associated + with the key, which means the key is not usable for Sign/Verify, + Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the + keys/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key to delete. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedKeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedKeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedKeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_key.metadata = {'url': '/keys/{key-name}'} + + async def update_key(self, vault_base_url, key_name, key_version, key_ops=None, key_attributes=None, tags=None, *, cls=None, **kwargs): + """The update key operation changes specified attributes of a stored key + and can be applied to any key type and key version stored in Azure Key + Vault. + + In order to perform this operation, the key must already exist in the + Key Vault. Note: The cryptographic material of a key itself cannot be + changed. This operation requires the keys/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of key to update. + :type key_name: str + :param key_version: The version of the key to update. + :type key_version: str + :param key_ops: Json web key operations. For more information on + possible key operations, see JsonWebKeyOperation. + :type key_ops: list[str or + ~azure.keyvault.v7_0.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyUpdateParameters(key_ops=key_ops, key_attributes=key_attributes, tags=tags) + + # Construct URL + url = self.update_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_key.metadata = {'url': '/keys/{key-name}/{key-version}'} + + async def get_key(self, vault_base_url, key_name, key_version, *, cls=None, **kwargs): + """Gets the public part of a stored key. + + The get key operation is applicable to all key types. If the requested + key is symmetric, then no key material is released in the response. + This operation requires the keys/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key to get. + :type key_name: str + :param key_version: Adding the version parameter retrieves a specific + version of a key. + :type key_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_key.metadata = {'url': '/keys/{key-name}/{key-version}'} + + def get_key_versions( + self, vault_base_url, key_name, maxresults=None, *, cls=None, **kwargs): + """Retrieves a list of individual key versions with the same key name. + + The full key identifier, attributes, and tags are provided in the + response. This operation requires the keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of KeyItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.KeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_key_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('KeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_key_versions.metadata = {'url': '/keys/{key-name}/versions'} + + def get_keys( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """List keys in the specified vault. + + Retrieves a list of the keys in the Key Vault as JSON Web Key + structures that contain the public part of a stored key. The LIST + operation is applicable to all key types, however only the base key + identifier, attributes, and tags are provided in the response. + Individual versions of a key are not listed in the response. This + operation requires the keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of KeyItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.KeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_keys.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('KeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_keys.metadata = {'url': '/keys'} + + async def backup_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Requests that a backup of the specified key be downloaded to the + client. + + The Key Backup operation exports a key from Azure Key Vault in a + protected form. Note that this operation does NOT return key material + in a form that can be used outside the Azure Key Vault system, the + returned key material is either protected to a Azure Key Vault HSM or + to Azure Key Vault itself. The intent of this operation is to allow a + client to GENERATE a key in one Azure Key Vault instance, BACKUP the + key, and then RESTORE it into another Azure Key Vault instance. The + BACKUP operation may be used to export, in protected form, any key type + from Azure Key Vault. Individual versions of a key cannot be backed up. + BACKUP / RESTORE can be performed within geographical boundaries only; + meaning that a BACKUP from one geographical area cannot be restored to + another geographical area. For example, a backup from the US + geographical area cannot be restored in an EU geographical area. This + operation requires the key/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupKeyResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.BackupKeyResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupKeyResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_key.metadata = {'url': '/keys/{key-name}/backup'} + + async def restore_key(self, vault_base_url, key_bundle_backup, *, cls=None, **kwargs): + """Restores a backed up key to a vault. + + Imports a previously backed up key into Azure Key Vault, restoring the + key, its key identifier, attributes and access control policies. The + RESTORE operation may be used to import a previously backed up key. + Individual versions of a key cannot be restored. The key is restored in + its entirety with the same key name as it had when it was backed up. If + the key name is not available in the target Key Vault, the RESTORE + operation will be rejected. While the key name is retained during + restore, the final key identifier will change if the key is restored to + a different vault. Restore will restore all versions and preserve + version identifiers. The RESTORE operation is subject to security + constraints: The target Key Vault must be owned by the same Microsoft + Azure Subscription as the source Key Vault The user must have RESTORE + permission in the target Key Vault. This operation requires the + keys/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_bundle_backup: The backup blob associated with a key + bundle. + :type key_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyRestoreParameters(key_bundle_backup=key_bundle_backup) + + # Construct URL + url = self.restore_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_key.metadata = {'url': '/keys/restore'} + + async def encrypt(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Encrypts an arbitrary sequence of bytes using an encryption key that is + stored in a key vault. + + The ENCRYPT operation encrypts an arbitrary sequence of bytes using an + encryption key that is stored in Azure Key Vault. Note that the ENCRYPT + operation only supports a single block of data, the size of which is + dependent on the target key and the encryption algorithm to be used. + The ENCRYPT operation is only strictly necessary for symmetric keys + stored in Azure Key Vault since protection with an asymmetric key can + be performed using public portion of the key. This operation is + supported for asymmetric keys as a convenience for callers that have a + key-reference but do not have access to the public key material. This + operation requires the keys/encrypt permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.encrypt.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + encrypt.metadata = {'url': '/keys/{key-name}/{key-version}/encrypt'} + + async def decrypt(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Decrypts a single block of encrypted data. + + The DECRYPT operation decrypts a well-formed block of ciphertext using + the target encryption key and specified algorithm. This operation is + the reverse of the ENCRYPT operation; only a single block of data may + be decrypted, the size of this block is dependent on the target key and + the algorithm to be used. The DECRYPT operation applies to asymmetric + and symmetric keys stored in Azure Key Vault since it uses the private + portion of the key. This operation requires the keys/decrypt + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.decrypt.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + decrypt.metadata = {'url': '/keys/{key-name}/{key-version}/decrypt'} + + async def sign(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Creates a signature from a digest using the specified key. + + The SIGN operation is applicable to asymmetric and symmetric keys + stored in Azure Key Vault since this operation uses the private portion + of the key. This operation requires the keys/sign permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: The signing/verification algorithm identifier. For + more information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', + 'PS384', 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', + 'ES384', 'ES512', 'ES256K' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeySignatureAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeySignParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.sign.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeySignParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + sign.metadata = {'url': '/keys/{key-name}/{key-version}/sign'} + + async def verify(self, vault_base_url, key_name, key_version, algorithm, digest, signature, *, cls=None, **kwargs): + """Verifies a signature using a specified key. + + The VERIFY operation is applicable to symmetric keys stored in Azure + Key Vault. VERIFY is not strictly necessary for asymmetric keys stored + in Azure Key Vault since signature verification can be performed using + the public portion of the key but this operation is supported as a + convenience for callers that only have a key-reference and not the + public portion of the key. This operation requires the keys/verify + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: The signing/verification algorithm. For more + information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', + 'PS384', 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', + 'ES384', 'ES512', 'ES256K' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeySignatureAlgorithm + :param digest: The digest used for signing. + :type digest: bytes + :param signature: The signature to be verified. + :type signature: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyVerifyResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyVerifyResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyVerifyParameters(algorithm=algorithm, digest=digest, signature=signature) + + # Construct URL + url = self.verify.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyVerifyParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyVerifyResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + verify.metadata = {'url': '/keys/{key-name}/{key-version}/verify'} + + async def wrap_key(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Wraps a symmetric key using a specified key. + + The WRAP operation supports encryption of a symmetric key using a key + encryption key that has previously been stored in an Azure Key Vault. + The WRAP operation is only strictly necessary for symmetric keys stored + in Azure Key Vault since protection with an asymmetric key can be + performed using the public portion of the key. This operation is + supported for asymmetric keys as a convenience for callers that have a + key-reference but do not have access to the public key material. This + operation requires the keys/wrapKey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.wrap_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + wrap_key.metadata = {'url': '/keys/{key-name}/{key-version}/wrapkey'} + + async def unwrap_key(self, vault_base_url, key_name, key_version, algorithm, value, *, cls=None, **kwargs): + """Unwraps a symmetric key using the specified key that was initially used + for wrapping that key. + + The UNWRAP operation supports decryption of a symmetric key using the + target key encryption key. This operation is the reverse of the WRAP + operation. The UNWRAP operation applies to asymmetric and symmetric + keys stored in Azure Key Vault since it uses the private portion of the + key. This operation requires the keys/unwrapKey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.unwrap_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + unwrap_key.metadata = {'url': '/keys/{key-name}/{key-version}/unwrapkey'} + + def get_deleted_keys( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """Lists the deleted keys in the specified vault. + + Retrieves a list of the keys in the Key Vault as JSON Web Key + structures that contain the public part of a deleted key. This + operation includes deletion-specific information. The Get Deleted Keys + operation is applicable for vaults enabled for soft-delete. While the + operation can be invoked on any vault, it will return an error if + invoked on a non soft-delete enabled vault. This operation requires the + keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedKeyItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.DeletedKeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_keys.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('DeletedKeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_deleted_keys.metadata = {'url': '/deletedkeys'} + + async def get_deleted_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Gets the public part of a deleted key. + + The Get Deleted Key operation is applicable for soft-delete enabled + vaults. While the operation can be invoked on any vault, it will return + an error if invoked on a non soft-delete enabled vault. This operation + requires the keys/get permission. . + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedKeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedKeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedKeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_key.metadata = {'url': '/deletedkeys/{key-name}'} + + async def purge_deleted_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Permanently deletes the specified key. + + The Purge Deleted Key operation is applicable for soft-delete enabled + vaults. While the operation can be invoked on any vault, it will return + an error if invoked on a non soft-delete enabled vault. This operation + requires the keys/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_key.metadata = {'url': '/deletedkeys/{key-name}'} + + async def recover_deleted_key(self, vault_base_url, key_name, *, cls=None, **kwargs): + """Recovers the deleted key to its latest version. + + The Recover Deleted Key operation is applicable for deleted keys in + soft-delete enabled vaults. It recovers the deleted key back to its + latest version under /keys. An attempt to recover an non-deleted key + will return an error. Consider this the inverse of the delete operation + on soft-delete enabled vaults. This operation requires the keys/recover + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the deleted key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_key.metadata = {'url': '/deletedkeys/{key-name}/recover'} + + async def set_secret(self, vault_base_url, secret_name, value, tags=None, content_type=None, secret_attributes=None, *, cls=None, **kwargs): + """Sets a secret in a specified key vault. + + The SET operation adds a secret to the Azure Key Vault. If the named + secret already exists, Azure Key Vault creates a new version of that + secret. This operation requires the secrets/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param value: The value of the secret. + :type value: str + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretSetParameters(value=value, tags=tags, content_type=content_type, secret_attributes=secret_attributes) + + # Construct URL + url = self.set_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretSetParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_secret.metadata = {'url': '/secrets/{secret-name}'} + + async def delete_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Deletes a secret from a specified key vault. + + The DELETE operation applies to any secret stored in Azure Key Vault. + DELETE cannot be applied to an individual version of a secret. This + operation requires the secrets/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedSecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_secret.metadata = {'url': '/secrets/{secret-name}'} + + async def update_secret(self, vault_base_url, secret_name, secret_version, content_type=None, secret_attributes=None, tags=None, *, cls=None, **kwargs): + """Updates the attributes associated with a specified secret in a given + key vault. + + The UPDATE operation changes specified attributes of an existing stored + secret. Attributes that are not specified in the request are left + unchanged. The value of a secret itself cannot be changed. This + operation requires the secrets/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param secret_version: The version of the secret. + :type secret_version: str + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretUpdateParameters(content_type=content_type, secret_attributes=secret_attributes, tags=tags) + + # Construct URL + url = self.update_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str'), + 'secret-version': self._serialize.url("secret_version", secret_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} + + async def get_secret(self, vault_base_url, secret_name, secret_version, *, cls=None, **kwargs): + """Get a specified secret from a given key vault. + + The GET operation is applicable to any secret stored in Azure Key + Vault. This operation requires the secrets/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param secret_version: The version of the secret. + :type secret_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str'), + 'secret-version': self._serialize.url("secret_version", secret_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} + + def get_secrets( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """List secrets in a specified key vault. + + The Get Secrets operation is applicable to the entire vault. However, + only the base secret identifier and its attributes are provided in the + response. Individual secret versions are not listed in the response. + This operation requires the secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified, the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SecretItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.SecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_secrets.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('SecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_secrets.metadata = {'url': '/secrets'} + + def get_secret_versions( + self, vault_base_url, secret_name, maxresults=None, *, cls=None, **kwargs): + """List all versions of the specified secret. + + The full secret identifier and attributes are provided in the response. + No values are returned for the secrets. This operations requires the + secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified, the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SecretItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.SecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_secret_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('SecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_secret_versions.metadata = {'url': '/secrets/{secret-name}/versions'} + + def get_deleted_secrets( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """Lists deleted secrets for the specified vault. + + The Get Deleted Secrets operation returns the secrets that have been + deleted for a vault enabled for soft-delete. This operation requires + the secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedSecretItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.DeletedSecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_secrets.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('DeletedSecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_deleted_secrets.metadata = {'url': '/deletedsecrets'} + + async def get_deleted_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Gets the specified deleted secret. + + The Get Deleted Secret operation returns the specified deleted secret + along with its attributes. This operation requires the secrets/get + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedSecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}'} + + async def purge_deleted_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Permanently deletes the specified secret. + + The purge deleted secret operation removes the secret permanently, + without the possibility of recovery. This operation can only be enabled + on a soft-delete enabled vault. This operation requires the + secrets/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}'} + + async def recover_deleted_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Recovers the deleted secret to the latest version. + + Recovers the deleted secret in the specified vault. This operation can + only be performed on a soft-delete enabled vault. This operation + requires the secrets/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the deleted secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}/recover'} + + async def backup_secret(self, vault_base_url, secret_name, *, cls=None, **kwargs): + """Backs up the specified secret. + + Requests that a backup of the specified secret be downloaded to the + client. All versions of the secret will be downloaded. This operation + requires the secrets/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupSecretResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.BackupSecretResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupSecretResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_secret.metadata = {'url': '/secrets/{secret-name}/backup'} + + async def restore_secret(self, vault_base_url, secret_bundle_backup, *, cls=None, **kwargs): + """Restores a backed up secret to a vault. + + Restores a backed up secret, and all its versions, to a vault. This + operation requires the secrets/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_bundle_backup: The backup blob associated with a secret + bundle. + :type secret_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretRestoreParameters(secret_bundle_backup=secret_bundle_backup) + + # Construct URL + url = self.restore_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_secret.metadata = {'url': '/secrets/restore'} + + def get_certificates( + self, vault_base_url, maxresults=None, include_pending=None, *, cls=None, **kwargs): + """List certificates in a specified key vault. + + The GetCertificates operation returns the set of certificates resources + in the specified key vault. This operation requires the + certificates/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :param include_pending: Specifies whether to include certificates + which are not completely provisioned. + :type include_pending: bool + :return: An iterator like instance of CertificateItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.CertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificates.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + if include_pending is not None: + query_parameters['includePending'] = self._serialize.query("include_pending", include_pending, 'bool') + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('CertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_certificates.metadata = {'url': '/certificates'} + + async def delete_certificate(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Deletes a certificate from a specified key vault. + + Deletes all versions of a certificate object along with its associated + policy. Delete certificate cannot be used to remove individual versions + of a certificate object. This operation requires the + certificates/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedCertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedCertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedCertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate.metadata = {'url': '/certificates/{certificate-name}'} + + async def set_certificate_contacts(self, vault_base_url, contact_list=None, *, cls=None, **kwargs): + """Sets the certificate contacts for the specified key vault. + + Sets the certificate contacts for the specified key vault. This + operation requires the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param contact_list: The contact list for the vault certificates. + :type contact_list: list[~azure.keyvault.v7_0.models.Contact] + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + contacts = models.Contacts(contact_list=contact_list) + + # Construct URL + url = self.set_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(contacts, 'Contacts') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + async def get_certificate_contacts(self, vault_base_url, *, cls=None, **kwargs): + """Lists the certificate contacts for a specified key vault. + + The GetCertificateContacts operation returns the set of certificate + contact resources in the specified key vault. This operation requires + the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + async def delete_certificate_contacts(self, vault_base_url, *, cls=None, **kwargs): + """Deletes the certificate contacts for a specified key vault. + + Deletes the certificate contacts for a specified key vault certificate. + This operation requires the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + def get_certificate_issuers( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """List certificate issuers for a specified key vault. + + The GetCertificateIssuers operation returns the set of certificate + issuer resources in the specified key vault. This operation requires + the certificates/manageissuers/getissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateIssuerItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.CertificateIssuerItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificate_issuers.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('CertificateIssuerListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_certificate_issuers.metadata = {'url': '/certificates/issuers'} + + async def set_certificate_issuer(self, vault_base_url, issuer_name, provider, credentials=None, organization_details=None, attributes=None, *, cls=None, **kwargs): + """Sets the specified certificate issuer. + + The SetCertificateIssuer operation adds or updates the specified + certificate issuer. This operation requires the certificates/setissuers + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided + to the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameter = models.CertificateIssuerSetParameters(provider=provider, credentials=credentials, organization_details=organization_details, attributes=attributes) + + # Construct URL + url = self.set_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameter, 'CertificateIssuerSetParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + async def update_certificate_issuer(self, vault_base_url, issuer_name, provider=None, credentials=None, organization_details=None, attributes=None, *, cls=None, **kwargs): + """Updates the specified certificate issuer. + + The UpdateCertificateIssuer operation performs an update on the + specified certificate issuer entity. This operation requires the + certificates/setissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided + to the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameter = models.CertificateIssuerUpdateParameters(provider=provider, credentials=credentials, organization_details=organization_details, attributes=attributes) + + # Construct URL + url = self.update_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameter, 'CertificateIssuerUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + async def get_certificate_issuer(self, vault_base_url, issuer_name, *, cls=None, **kwargs): + """Lists the specified certificate issuer. + + The GetCertificateIssuer operation returns the specified certificate + issuer resources in the specified key vault. This operation requires + the certificates/manageissuers/getissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + async def delete_certificate_issuer(self, vault_base_url, issuer_name, *, cls=None, **kwargs): + """Deletes the specified certificate issuer. + + The DeleteCertificateIssuer operation permanently removes the specified + certificate issuer from the vault. This operation requires the + certificates/manageissuers/deleteissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + async def create_certificate(self, vault_base_url, certificate_name, certificate_policy=None, certificate_attributes=None, tags=None, *, cls=None, **kwargs): + """Creates a new certificate. + + If this is the first version, the certificate resource is created. This + operation requires the certificates/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateCreateParameters(certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.create_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateCreateParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [202]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 202: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + create_certificate.metadata = {'url': '/certificates/{certificate-name}/create'} + + async def import_certificate(self, vault_base_url, certificate_name, base64_encoded_certificate, password=None, certificate_policy=None, certificate_attributes=None, tags=None, *, cls=None, **kwargs): + """Imports a certificate into a specified key vault. + + Imports an existing valid certificate, containing a private key, into + Azure Key Vault. The certificate to be imported can be in either PFX or + PEM format. If the certificate is in PEM format the PEM file must + contain the key as well as x509 certificates. This operation requires + the certificates/import permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param base64_encoded_certificate: Base64 encoded representation of + the certificate object to import. This certificate needs to contain + the private key. + :type base64_encoded_certificate: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateImportParameters(base64_encoded_certificate=base64_encoded_certificate, password=password, certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.import_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateImportParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + import_certificate.metadata = {'url': '/certificates/{certificate-name}/import'} + + def get_certificate_versions( + self, vault_base_url, certificate_name, maxresults=None, *, cls=None, **kwargs): + """List the versions of a certificate. + + The GetCertificateVersions operation returns the versions of a + certificate in the specified key vault. This operation requires the + certificates/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.CertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificate_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('CertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_certificate_versions.metadata = {'url': '/certificates/{certificate-name}/versions'} + + async def get_certificate_policy(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Lists the policy for a certificate. + + The GetCertificatePolicy operation returns the specified certificate + policy resources in the specified key vault. This operation requires + the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in a given key + vault. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificatePolicy or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificatePolicy + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_policy.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificatePolicy', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_policy.metadata = {'url': '/certificates/{certificate-name}/policy'} + + async def update_certificate_policy(self, vault_base_url, certificate_name, certificate_policy, *, cls=None, **kwargs): + """Updates the policy for a certificate. + + Set specified members in the certificate policy. Leave others as null. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given + vault. + :type certificate_name: str + :param certificate_policy: The policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v7_0.models.CertificatePolicy + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificatePolicy or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificatePolicy + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.update_certificate_policy.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(certificate_policy, 'CertificatePolicy') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificatePolicy', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_policy.metadata = {'url': '/certificates/{certificate-name}/policy'} + + async def update_certificate(self, vault_base_url, certificate_name, certificate_version, certificate_policy=None, certificate_attributes=None, tags=None, *, cls=None, **kwargs): + """Updates the specified attributes associated with the given certificate. + + The UpdateCertificate operation applies the specified update on the + given certificate; the only elements updated are the certificate's + attributes. This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given key + vault. + :type certificate_name: str + :param certificate_version: The version of the certificate. + :type certificate_version: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateUpdateParameters(certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.update_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str'), + 'certificate-version': self._serialize.url("certificate_version", certificate_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate.metadata = {'url': '/certificates/{certificate-name}/{certificate-version}'} + + async def get_certificate(self, vault_base_url, certificate_name, certificate_version, *, cls=None, **kwargs): + """Gets information about a certificate. + + Gets information about a specific certificate. This operation requires + the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given + vault. + :type certificate_name: str + :param certificate_version: The version of the certificate. + :type certificate_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str'), + 'certificate-version': self._serialize.url("certificate_version", certificate_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate.metadata = {'url': '/certificates/{certificate-name}/{certificate-version}'} + + async def update_certificate_operation(self, vault_base_url, certificate_name, cancellation_requested, *, cls=None, **kwargs): + """Updates a certificate operation. + + Updates a certificate creation operation that is already in progress. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param cancellation_requested: Indicates if cancellation was requested + on the certificate operation. + :type cancellation_requested: bool + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + certificate_operation = models.CertificateOperationUpdateParameter(cancellation_requested=cancellation_requested) + + # Construct URL + url = self.update_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(certificate_operation, 'CertificateOperationUpdateParameter') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + async def get_certificate_operation(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Gets the creation operation of a certificate. + + Gets the creation operation associated with a specified certificate. + This operation requires the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + async def delete_certificate_operation(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Deletes the creation operation for a specific certificate. + + Deletes the creation operation for a specified certificate that is in + the process of being created. The certificate is no longer created. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + async def merge_certificate(self, vault_base_url, certificate_name, x509_certificates, certificate_attributes=None, tags=None, *, cls=None, **kwargs): + """Merges a certificate or a certificate chain with a key pair existing on + the server. + + The MergeCertificate operation performs the merging of a certificate or + certificate chain with a key pair currently available in the service. + This operation requires the certificates/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param x509_certificates: The certificate or the certificate chain to + merge. + :type x509_certificates: list[bytearray] + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateMergeParameters(x509_certificates=x509_certificates, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.merge_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateMergeParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [201]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 201: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + merge_certificate.metadata = {'url': '/certificates/{certificate-name}/pending/merge'} + + async def backup_certificate(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Backs up the specified certificate. + + Requests that a backup of the specified certificate be downloaded to + the client. All versions of the certificate will be downloaded. This + operation requires the certificates/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupCertificateResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.BackupCertificateResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupCertificateResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_certificate.metadata = {'url': '/certificates/{certificate-name}/backup'} + + async def restore_certificate(self, vault_base_url, certificate_bundle_backup, *, cls=None, **kwargs): + """Restores a backed up certificate to a vault. + + Restores a backed up certificate, and all its versions, to a vault. + This operation requires the certificates/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_bundle_backup: The backup blob associated with a + certificate bundle. + :type certificate_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateRestoreParameters(certificate_bundle_backup=certificate_bundle_backup) + + # Construct URL + url = self.restore_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_certificate.metadata = {'url': '/certificates/restore'} + + def get_deleted_certificates( + self, vault_base_url, maxresults=None, include_pending=None, *, cls=None, **kwargs): + """Lists the deleted certificates in the specified vault currently + available for recovery. + + The GetDeletedCertificates operation retrieves the certificates in the + current vault which are in a deleted state and ready for recovery or + purging. This operation includes deletion-specific information. This + operation requires the certificates/get/list permission. This operation + can only be enabled on soft-delete enabled vaults. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :param include_pending: Specifies whether to include certificates + which are not completely provisioned. + :type include_pending: bool + :return: An iterator like instance of DeletedCertificateItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.DeletedCertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_certificates.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + if include_pending is not None: + query_parameters['includePending'] = self._serialize.query("include_pending", include_pending, 'bool') + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('DeletedCertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_deleted_certificates.metadata = {'url': '/deletedcertificates'} + + async def get_deleted_certificate(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Retrieves information about the specified deleted certificate. + + The GetDeletedCertificate operation retrieves the deleted certificate + information plus its attributes, such as retention interval, scheduled + permanent deletion and the current deletion recovery level. This + operation requires the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedCertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedCertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedCertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}'} + + async def purge_deleted_certificate(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Permanently deletes the specified deleted certificate. + + The PurgeDeletedCertificate operation performs an irreversible deletion + of the specified certificate, without possibility for recovery. The + operation is not available if the recovery level does not specify + 'Purgeable'. This operation requires the certificate/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}'} + + async def recover_deleted_certificate(self, vault_base_url, certificate_name, *, cls=None, **kwargs): + """Recovers the deleted certificate back to its current version under + /certificates. + + The RecoverDeletedCertificate operation performs the reversal of the + Delete operation. The operation is applicable in vaults enabled for + soft-delete, and must be issued during the retention interval + (available in the deleted certificate's attributes). This operation + requires the certificates/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the deleted certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}/recover'} + + def get_storage_accounts( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """List storage accounts managed by the specified key vault. This + operation requires the storage/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of StorageAccountItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.StorageAccountItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_storage_accounts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('StorageListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_storage_accounts.metadata = {'url': '/storage'} + + def get_deleted_storage_accounts( + self, vault_base_url, maxresults=None, *, cls=None, **kwargs): + """Lists deleted storage accounts for the specified vault. + + The Get Deleted Storage Accounts operation returns the storage accounts + that have been deleted for a vault enabled for soft-delete. This + operation requires the storage/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedStorageAccountItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.DeletedStorageAccountItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_storage_accounts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('DeletedStorageListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_deleted_storage_accounts.metadata = {'url': '/deletedstorage'} + + async def get_deleted_storage_account(self, vault_base_url, storage_account_name, *, cls=None, **kwargs): + """Gets the specified deleted storage account. + + The Get Deleted Storage Account operation returns the specified deleted + storage account along with its attributes. This operation requires the + storage/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedStorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedStorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedStorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_storage_account.metadata = {'url': '/deletedstorage/{storage-account-name}'} + + async def purge_deleted_storage_account(self, vault_base_url, storage_account_name, *, cls=None, **kwargs): + """Permanently deletes the specified storage account. + + The purge deleted storage account operation removes the secret + permanently, without the possibility of recovery. This operation can + only be performed on a soft-delete enabled vault. This operation + requires the storage/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_storage_account.metadata = {'url': '/deletedstorage/{storage-account-name}'} + + async def recover_deleted_storage_account(self, vault_base_url, storage_account_name, *, cls=None, **kwargs): + """Recovers the deleted storage account. + + Recovers the deleted storage account in the specified vault. This + operation can only be performed on a soft-delete enabled vault. This + operation requires the storage/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_storage_account.metadata = {'url': '/deletedstorage/{storage-account-name}/recover'} + + async def backup_storage_account(self, vault_base_url, storage_account_name, *, cls=None, **kwargs): + """Backs up the specified storage account. + + Requests that a backup of the specified storage account be downloaded + to the client. This operation requires the storage/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupStorageResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.BackupStorageResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupStorageResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_storage_account.metadata = {'url': '/storage/{storage-account-name}/backup'} + + async def restore_storage_account(self, vault_base_url, storage_bundle_backup, *, cls=None, **kwargs): + """Restores a backed up storage account to a vault. + + Restores a backed up storage account to a vault. This operation + requires the storage/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_bundle_backup: The backup blob associated with a + storage account. + :type storage_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageRestoreParameters(storage_bundle_backup=storage_bundle_backup) + + # Construct URL + url = self.restore_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_storage_account.metadata = {'url': '/storage/restore'} + + async def delete_storage_account(self, vault_base_url, storage_account_name, *, cls=None, **kwargs): + """Deletes a storage account. This operation requires the storage/delete + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedStorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedStorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedStorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + async def get_storage_account(self, vault_base_url, storage_account_name, *, cls=None, **kwargs): + """Gets information about a specified storage account. This operation + requires the storage/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + async def set_storage_account(self, vault_base_url, storage_account_name, resource_id, active_key_name, auto_regenerate_key, regeneration_period=None, storage_account_attributes=None, tags=None, *, cls=None, **kwargs): + """Creates or updates a new storage account. This operation requires the + storage/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param resource_id: Storage account resource id. + :type resource_id: str + :param active_key_name: Current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration + specified in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage + account. + :type storage_account_attributes: + ~azure.keyvault.v7_0.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountCreateParameters(resource_id=resource_id, active_key_name=active_key_name, auto_regenerate_key=auto_regenerate_key, regeneration_period=regeneration_period, storage_account_attributes=storage_account_attributes, tags=tags) + + # Construct URL + url = self.set_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountCreateParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + async def update_storage_account(self, vault_base_url, storage_account_name, active_key_name=None, auto_regenerate_key=None, regeneration_period=None, storage_account_attributes=None, tags=None, *, cls=None, **kwargs): + """Updates the specified attributes associated with the given storage + account. This operation requires the storage/set/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param active_key_name: The current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration + specified in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage + account. + :type storage_account_attributes: + ~azure.keyvault.v7_0.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountUpdateParameters(active_key_name=active_key_name, auto_regenerate_key=auto_regenerate_key, regeneration_period=regeneration_period, storage_account_attributes=storage_account_attributes, tags=tags) + + # Construct URL + url = self.update_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + async def regenerate_storage_account_key(self, vault_base_url, storage_account_name, key_name, *, cls=None, **kwargs): + """Regenerates the specified key value for the given storage account. This + operation requires the storage/regeneratekey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param key_name: The storage account key name. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountRegenerteKeyParameters(key_name=key_name) + + # Construct URL + url = self.regenerate_storage_account_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountRegenerteKeyParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + regenerate_storage_account_key.metadata = {'url': '/storage/{storage-account-name}/regeneratekey'} + + def get_sas_definitions( + self, vault_base_url, storage_account_name, maxresults=None, *, cls=None, **kwargs): + """List storage SAS definitions for the given storage account. This + operation requires the storage/listsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SasDefinitionItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.SasDefinitionItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_sas_definitions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('SasDefinitionListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_sas_definitions.metadata = {'url': '/storage/{storage-account-name}/sas'} + + def get_deleted_sas_definitions( + self, vault_base_url, storage_account_name, maxresults=None, *, cls=None, **kwargs): + """Lists deleted SAS definitions for the specified vault and storage + account. + + The Get Deleted Sas Definitions operation returns the SAS definitions + that have been deleted for a vault enabled for soft-delete. This + operation requires the storage/listsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedSasDefinitionItem + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.keyvault.v7_0.models.DeletedSasDefinitionItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_sas_definitions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + async def extract_data_async(response): + deserialized = self._deserialize('DeletedSasDefinitionListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, AsyncList(list_of_elem) + + async def get_next_async(next_link=None): + request = prepare_request(next_link) + + pipeline_response = await self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return AsyncItemPaged( + get_next_async, extract_data_async + ) + get_deleted_sas_definitions.metadata = {'url': '/deletedstorage/{storage-account-name}/sas'} + + async def get_deleted_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, *, cls=None, **kwargs): + """Gets the specified deleted sas definition. + + The Get Deleted SAS Definition operation returns the specified deleted + SAS definition along with its attributes. This operation requires the + storage/getsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedSasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_sas_definition.metadata = {'url': '/deletedstorage/{storage-account-name}/sas/{sas-definition-name}'} + + async def recover_deleted_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, *, cls=None, **kwargs): + """Recovers the deleted SAS definition. + + Recovers the deleted SAS definition for the specified storage account. + This operation can only be performed on a soft-delete enabled vault. + This operation requires the storage/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_sas_definition.metadata = {'url': '/deletedstorage/{storage-account-name}/sas/{sas-definition-name}/recover'} + + async def delete_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, *, cls=None, **kwargs): + """Deletes a SAS definition from a specified storage account. This + operation requires the storage/deletesas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedSasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + async def get_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, *, cls=None, **kwargs): + """Gets information about a SAS definition for the specified storage + account. This operation requires the storage/getsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + async def set_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, template_uri, sas_type, validity_period, sas_definition_attributes=None, tags=None, *, cls=None, **kwargs): + """Creates or updates a new SAS definition for the specified storage + account. This operation requires the storage/setsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will + have the same properties as the template. + :type template_uri: str + :param sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :type sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :param validity_period: The validity period of SAS tokens created + according to the SAS definition. + :type validity_period: str + :param sas_definition_attributes: The attributes of the SAS + definition. + :type sas_definition_attributes: + ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SasDefinitionCreateParameters(template_uri=template_uri, sas_type=sas_type, validity_period=validity_period, sas_definition_attributes=sas_definition_attributes, tags=tags) + + # Construct URL + url = self.set_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SasDefinitionCreateParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + async def update_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, template_uri=None, sas_type=None, validity_period=None, sas_definition_attributes=None, tags=None, *, cls=None, **kwargs): + """Updates the specified attributes associated with the given SAS + definition. This operation requires the storage/setsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will + have the same properties as the template. + :type template_uri: str + :param sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :type sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :param validity_period: The validity period of SAS tokens created + according to the SAS definition. + :type validity_period: str + :param sas_definition_attributes: The attributes of the SAS + definition. + :type sas_definition_attributes: + ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SasDefinitionUpdateParameters(template_uri=template_uri, sas_type=sas_type, validity_period=validity_period, sas_definition_attributes=sas_definition_attributes, tags=tags) + + # Construct URL + url = self.update_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SasDefinitionUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = await self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/__init__.py new file mode 100644 index 000000000000..5e72f49a73f6 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/__init__.py @@ -0,0 +1,303 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +try: + from ._models_py3 import Action + from ._models_py3 import AdministratorDetails + from ._models_py3 import Attributes + from ._models_py3 import BackupCertificateResult + from ._models_py3 import BackupKeyResult + from ._models_py3 import BackupSecretResult + from ._models_py3 import BackupStorageResult + from ._models_py3 import CertificateAttributes + from ._models_py3 import CertificateBundle + from ._models_py3 import CertificateCreateParameters + from ._models_py3 import CertificateImportParameters + from ._models_py3 import CertificateIssuerItem + from ._models_py3 import CertificateIssuerListResult + from ._models_py3 import CertificateIssuerSetParameters + from ._models_py3 import CertificateIssuerUpdateParameters + from ._models_py3 import CertificateItem + from ._models_py3 import CertificateListResult + from ._models_py3 import CertificateMergeParameters + from ._models_py3 import CertificateOperation + from ._models_py3 import CertificateOperationUpdateParameter + from ._models_py3 import CertificatePolicy + from ._models_py3 import CertificateRestoreParameters + from ._models_py3 import CertificateUpdateParameters + from ._models_py3 import Contact + from ._models_py3 import Contacts + from ._models_py3 import DeletedCertificateBundle + from ._models_py3 import DeletedCertificateItem + from ._models_py3 import DeletedCertificateListResult + from ._models_py3 import DeletedKeyBundle + from ._models_py3 import DeletedKeyItem + from ._models_py3 import DeletedKeyListResult + from ._models_py3 import DeletedSasDefinitionBundle + from ._models_py3 import DeletedSasDefinitionItem + from ._models_py3 import DeletedSasDefinitionListResult + from ._models_py3 import DeletedSecretBundle + from ._models_py3 import DeletedSecretItem + from ._models_py3 import DeletedSecretListResult + from ._models_py3 import DeletedStorageAccountItem + from ._models_py3 import DeletedStorageBundle + from ._models_py3 import DeletedStorageListResult + from ._models_py3 import Error + from ._models_py3 import IssuerAttributes + from ._models_py3 import IssuerBundle + from ._models_py3 import IssuerCredentials + from ._models_py3 import IssuerParameters + from ._models_py3 import JsonWebKey + from ._models_py3 import KeyAttributes + from ._models_py3 import KeyBundle + from ._models_py3 import KeyCreateParameters + from ._models_py3 import KeyImportParameters + from ._models_py3 import KeyItem + from ._models_py3 import KeyListResult + from ._models_py3 import KeyOperationResult + from ._models_py3 import KeyOperationsParameters + from ._models_py3 import KeyProperties + from ._models_py3 import KeyRestoreParameters + from ._models_py3 import KeySignParameters + from ._models_py3 import KeyUpdateParameters + from ._models_py3 import KeyVaultError, KeyVaultErrorException + from ._models_py3 import KeyVerifyParameters + from ._models_py3 import KeyVerifyResult + from ._models_py3 import LifetimeAction + from ._models_py3 import OrganizationDetails + from ._models_py3 import PendingCertificateSigningRequestResult + from ._models_py3 import SasDefinitionAttributes + from ._models_py3 import SasDefinitionBundle + from ._models_py3 import SasDefinitionCreateParameters + from ._models_py3 import SasDefinitionItem + from ._models_py3 import SasDefinitionListResult + from ._models_py3 import SasDefinitionUpdateParameters + from ._models_py3 import SecretAttributes + from ._models_py3 import SecretBundle + from ._models_py3 import SecretItem + from ._models_py3 import SecretListResult + from ._models_py3 import SecretProperties + from ._models_py3 import SecretRestoreParameters + from ._models_py3 import SecretSetParameters + from ._models_py3 import SecretUpdateParameters + from ._models_py3 import StorageAccountAttributes + from ._models_py3 import StorageAccountCreateParameters + from ._models_py3 import StorageAccountItem + from ._models_py3 import StorageAccountRegenerteKeyParameters + from ._models_py3 import StorageAccountUpdateParameters + from ._models_py3 import StorageBundle + from ._models_py3 import StorageListResult + from ._models_py3 import StorageRestoreParameters + from ._models_py3 import SubjectAlternativeNames + from ._models_py3 import Trigger + from ._models_py3 import X509CertificateProperties +except (SyntaxError, ImportError): + from ._models import Action + from ._models import AdministratorDetails + from ._models import Attributes + from ._models import BackupCertificateResult + from ._models import BackupKeyResult + from ._models import BackupSecretResult + from ._models import BackupStorageResult + from ._models import CertificateAttributes + from ._models import CertificateBundle + from ._models import CertificateCreateParameters + from ._models import CertificateImportParameters + from ._models import CertificateIssuerItem + from ._models import CertificateIssuerListResult + from ._models import CertificateIssuerSetParameters + from ._models import CertificateIssuerUpdateParameters + from ._models import CertificateItem + from ._models import CertificateListResult + from ._models import CertificateMergeParameters + from ._models import CertificateOperation + from ._models import CertificateOperationUpdateParameter + from ._models import CertificatePolicy + from ._models import CertificateRestoreParameters + from ._models import CertificateUpdateParameters + from ._models import Contact + from ._models import Contacts + from ._models import DeletedCertificateBundle + from ._models import DeletedCertificateItem + from ._models import DeletedCertificateListResult + from ._models import DeletedKeyBundle + from ._models import DeletedKeyItem + from ._models import DeletedKeyListResult + from ._models import DeletedSasDefinitionBundle + from ._models import DeletedSasDefinitionItem + from ._models import DeletedSasDefinitionListResult + from ._models import DeletedSecretBundle + from ._models import DeletedSecretItem + from ._models import DeletedSecretListResult + from ._models import DeletedStorageAccountItem + from ._models import DeletedStorageBundle + from ._models import DeletedStorageListResult + from ._models import Error + from ._models import IssuerAttributes + from ._models import IssuerBundle + from ._models import IssuerCredentials + from ._models import IssuerParameters + from ._models import JsonWebKey + from ._models import KeyAttributes + from ._models import KeyBundle + from ._models import KeyCreateParameters + from ._models import KeyImportParameters + from ._models import KeyItem + from ._models import KeyListResult + from ._models import KeyOperationResult + from ._models import KeyOperationsParameters + from ._models import KeyProperties + from ._models import KeyRestoreParameters + from ._models import KeySignParameters + from ._models import KeyUpdateParameters + from ._models import KeyVaultError, KeyVaultErrorException + from ._models import KeyVerifyParameters + from ._models import KeyVerifyResult + from ._models import LifetimeAction + from ._models import OrganizationDetails + from ._models import PendingCertificateSigningRequestResult + from ._models import SasDefinitionAttributes + from ._models import SasDefinitionBundle + from ._models import SasDefinitionCreateParameters + from ._models import SasDefinitionItem + from ._models import SasDefinitionListResult + from ._models import SasDefinitionUpdateParameters + from ._models import SecretAttributes + from ._models import SecretBundle + from ._models import SecretItem + from ._models import SecretListResult + from ._models import SecretProperties + from ._models import SecretRestoreParameters + from ._models import SecretSetParameters + from ._models import SecretUpdateParameters + from ._models import StorageAccountAttributes + from ._models import StorageAccountCreateParameters + from ._models import StorageAccountItem + from ._models import StorageAccountRegenerteKeyParameters + from ._models import StorageAccountUpdateParameters + from ._models import StorageBundle + from ._models import StorageListResult + from ._models import StorageRestoreParameters + from ._models import SubjectAlternativeNames + from ._models import Trigger + from ._models import X509CertificateProperties +from ._key_vault_client_enums import ( + JsonWebKeyType, + JsonWebKeyCurveName, + DeletionRecoveryLevel, + KeyUsageType, + ActionType, + JsonWebKeyOperation, + JsonWebKeyEncryptionAlgorithm, + JsonWebKeySignatureAlgorithm, + SasTokenType, +) + +__all__ = [ + 'Action', + 'AdministratorDetails', + 'Attributes', + 'BackupCertificateResult', + 'BackupKeyResult', + 'BackupSecretResult', + 'BackupStorageResult', + 'CertificateAttributes', + 'CertificateBundle', + 'CertificateCreateParameters', + 'CertificateImportParameters', + 'CertificateIssuerItem', + 'CertificateIssuerListResult', + 'CertificateIssuerSetParameters', + 'CertificateIssuerUpdateParameters', + 'CertificateItem', + 'CertificateListResult', + 'CertificateMergeParameters', + 'CertificateOperation', + 'CertificateOperationUpdateParameter', + 'CertificatePolicy', + 'CertificateRestoreParameters', + 'CertificateUpdateParameters', + 'Contact', + 'Contacts', + 'DeletedCertificateBundle', + 'DeletedCertificateItem', + 'DeletedCertificateListResult', + 'DeletedKeyBundle', + 'DeletedKeyItem', + 'DeletedKeyListResult', + 'DeletedSasDefinitionBundle', + 'DeletedSasDefinitionItem', + 'DeletedSasDefinitionListResult', + 'DeletedSecretBundle', + 'DeletedSecretItem', + 'DeletedSecretListResult', + 'DeletedStorageAccountItem', + 'DeletedStorageBundle', + 'DeletedStorageListResult', + 'Error', + 'IssuerAttributes', + 'IssuerBundle', + 'IssuerCredentials', + 'IssuerParameters', + 'JsonWebKey', + 'KeyAttributes', + 'KeyBundle', + 'KeyCreateParameters', + 'KeyImportParameters', + 'KeyItem', + 'KeyListResult', + 'KeyOperationResult', + 'KeyOperationsParameters', + 'KeyProperties', + 'KeyRestoreParameters', + 'KeySignParameters', + 'KeyUpdateParameters', + 'KeyVaultError', 'KeyVaultErrorException', + 'KeyVerifyParameters', + 'KeyVerifyResult', + 'LifetimeAction', + 'OrganizationDetails', + 'PendingCertificateSigningRequestResult', + 'SasDefinitionAttributes', + 'SasDefinitionBundle', + 'SasDefinitionCreateParameters', + 'SasDefinitionItem', + 'SasDefinitionListResult', + 'SasDefinitionUpdateParameters', + 'SecretAttributes', + 'SecretBundle', + 'SecretItem', + 'SecretListResult', + 'SecretProperties', + 'SecretRestoreParameters', + 'SecretSetParameters', + 'SecretUpdateParameters', + 'StorageAccountAttributes', + 'StorageAccountCreateParameters', + 'StorageAccountItem', + 'StorageAccountRegenerteKeyParameters', + 'StorageAccountUpdateParameters', + 'StorageBundle', + 'StorageListResult', + 'StorageRestoreParameters', + 'SubjectAlternativeNames', + 'Trigger', + 'X509CertificateProperties', + 'JsonWebKeyType', + 'JsonWebKeyCurveName', + 'DeletionRecoveryLevel', + 'KeyUsageType', + 'ActionType', + 'JsonWebKeyOperation', + 'JsonWebKeyEncryptionAlgorithm', + 'JsonWebKeySignatureAlgorithm', + 'SasTokenType', +] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/_key_vault_client_enums.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/_key_vault_client_enums.py new file mode 100644 index 000000000000..046a304e990a --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/_key_vault_client_enums.py @@ -0,0 +1,94 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from enum import Enum + + +class JsonWebKeyType(str, Enum): + + ec = "EC" #: Elliptic Curve. + ec_hsm = "EC-HSM" #: Elliptic Curve with a private key which is not exportable from the HSM. + rsa = "RSA" #: RSA (https://tools.ietf.org/html/rfc3447) + rsa_hsm = "RSA-HSM" #: RSA with a private key which is not exportable from the HSM. + oct = "oct" #: Octet sequence (used to represent symmetric keys) + + +class JsonWebKeyCurveName(str, Enum): + + p_256 = "P-256" #: The NIST P-256 elliptic curve, AKA SECG curve SECP256R1. + p_384 = "P-384" #: The NIST P-384 elliptic curve, AKA SECG curve SECP384R1. + p_521 = "P-521" #: The NIST P-521 elliptic curve, AKA SECG curve SECP521R1. + p_256_k = "P-256K" #: The SECG SECP256K1 elliptic curve. + + +class DeletionRecoveryLevel(str, Enum): + + purgeable = "Purgeable" + recoverable_purgeable = "Recoverable+Purgeable" + recoverable = "Recoverable" + recoverable_protected_subscription = "Recoverable+ProtectedSubscription" + + +class KeyUsageType(str, Enum): + + digital_signature = "digitalSignature" + non_repudiation = "nonRepudiation" + key_encipherment = "keyEncipherment" + data_encipherment = "dataEncipherment" + key_agreement = "keyAgreement" + key_cert_sign = "keyCertSign" + c_rl_sign = "cRLSign" + encipher_only = "encipherOnly" + decipher_only = "decipherOnly" + + +class ActionType(str, Enum): + + email_contacts = "EmailContacts" + auto_renew = "AutoRenew" + + +class JsonWebKeyOperation(str, Enum): + + encrypt = "encrypt" + decrypt = "decrypt" + sign = "sign" + verify = "verify" + wrap_key = "wrapKey" + unwrap_key = "unwrapKey" + + +class JsonWebKeyEncryptionAlgorithm(str, Enum): + + rsa_oaep = "RSA-OAEP" + rsa_oaep_256 = "RSA-OAEP-256" + rsa1_5 = "RSA1_5" + + +class JsonWebKeySignatureAlgorithm(str, Enum): + + ps256 = "PS256" #: RSASSA-PSS using SHA-256 and MGF1 with SHA-256, as described in https://tools.ietf.org/html/rfc7518 + ps384 = "PS384" #: RSASSA-PSS using SHA-384 and MGF1 with SHA-384, as described in https://tools.ietf.org/html/rfc7518 + ps512 = "PS512" #: RSASSA-PSS using SHA-512 and MGF1 with SHA-512, as described in https://tools.ietf.org/html/rfc7518 + rs256 = "RS256" #: RSASSA-PKCS1-v1_5 using SHA-256, as described in https://tools.ietf.org/html/rfc7518 + rs384 = "RS384" #: RSASSA-PKCS1-v1_5 using SHA-384, as described in https://tools.ietf.org/html/rfc7518 + rs512 = "RS512" #: RSASSA-PKCS1-v1_5 using SHA-512, as described in https://tools.ietf.org/html/rfc7518 + rsnull = "RSNULL" #: Reserved + es256 = "ES256" #: ECDSA using P-256 and SHA-256, as described in https://tools.ietf.org/html/rfc7518. + es384 = "ES384" #: ECDSA using P-384 and SHA-384, as described in https://tools.ietf.org/html/rfc7518 + es512 = "ES512" #: ECDSA using P-521 and SHA-512, as described in https://tools.ietf.org/html/rfc7518 + es256_k = "ES256K" #: ECDSA using P-256K and SHA-256, as described in https://tools.ietf.org/html/rfc7518 + + +class SasTokenType(str, Enum): + + account = "account" + service = "service" diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/_models.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/_models.py new file mode 100644 index 000000000000..8b8ed5a83d62 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/_models.py @@ -0,0 +1,3208 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from msrest.serialization import Model +from azure.core import HttpResponseError + + +class Action(Model): + """The action that will be executed. + + :param action_type: The type of the action. Possible values include: + 'EmailContacts', 'AutoRenew' + :type action_type: str or ~azure.keyvault.v7_0.models.ActionType + """ + + _attribute_map = { + 'action_type': {'key': 'action_type', 'type': 'ActionType'}, + } + + def __init__(self, **kwargs): + super(Action, self).__init__(**kwargs) + self.action_type = kwargs.get('action_type', None) + + +class AdministratorDetails(Model): + """Details of the organization administrator of the certificate issuer. + + :param first_name: First name. + :type first_name: str + :param last_name: Last name. + :type last_name: str + :param email_address: Email address. + :type email_address: str + :param phone: Phone number. + :type phone: str + """ + + _attribute_map = { + 'first_name': {'key': 'first_name', 'type': 'str'}, + 'last_name': {'key': 'last_name', 'type': 'str'}, + 'email_address': {'key': 'email', 'type': 'str'}, + 'phone': {'key': 'phone', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(AdministratorDetails, self).__init__(**kwargs) + self.first_name = kwargs.get('first_name', None) + self.last_name = kwargs.get('last_name', None) + self.email_address = kwargs.get('email_address', None) + self.phone = kwargs.get('phone', None) + + +class Attributes(Model): + """The object attributes managed by the KeyVault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(Attributes, self).__init__(**kwargs) + self.enabled = kwargs.get('enabled', None) + self.not_before = kwargs.get('not_before', None) + self.expires = kwargs.get('expires', None) + self.created = None + self.updated = None + + +class BackupCertificateResult(Model): + """The backup certificate result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up certificate. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(BackupCertificateResult, self).__init__(**kwargs) + self.value = None + + +class BackupKeyResult(Model): + """The backup key result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up key. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(BackupKeyResult, self).__init__(**kwargs) + self.value = None + + +class BackupSecretResult(Model): + """The backup secret result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up secret. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(BackupSecretResult, self).__init__(**kwargs) + self.value = None + + +class BackupStorageResult(Model): + """The backup storage result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up storage account. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(BackupStorageResult, self).__init__(**kwargs) + self.value = None + + +class CertificateAttributes(Attributes): + """The certificate management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for certificates in the current vault. If it contains 'Purgeable', + the certificate can be permanently deleted by a privileged user; + otherwise, only the system can purge the certificate, at the end of the + retention interval. Possible values include: 'Purgeable', + 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateAttributes, self).__init__(**kwargs) + self.recovery_level = None + + +class CertificateBundle(Model): + """A certificate bundle consists of a certificate (X509) plus its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :ivar kid: The key id. + :vartype kid: str + :ivar sid: The secret id. + :vartype sid: str + :ivar x509_thumbprint: Thumbprint of the certificate. + :vartype x509_thumbprint: bytes + :ivar policy: The management policy. + :vartype policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param cer: CER contents of x509 certificate. + :type cer: bytearray + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs + :type tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'kid': {'readonly': True}, + 'sid': {'readonly': True}, + 'x509_thumbprint': {'readonly': True}, + 'policy': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'sid': {'key': 'sid', 'type': 'str'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'cer': {'key': 'cer', 'type': 'bytearray'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateBundle, self).__init__(**kwargs) + self.id = None + self.kid = None + self.sid = None + self.x509_thumbprint = None + self.policy = None + self.cer = kwargs.get('cer', None) + self.content_type = kwargs.get('content_type', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + + +class CertificateCreateParameters(Model): + """The certificate create parameters. + + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateCreateParameters, self).__init__(**kwargs) + self.certificate_policy = kwargs.get('certificate_policy', None) + self.certificate_attributes = kwargs.get('certificate_attributes', None) + self.tags = kwargs.get('tags', None) + + +class CertificateImportParameters(Model): + """The certificate import parameters. + + All required parameters must be populated in order to send to Azure. + + :param base64_encoded_certificate: Required. Base64 encoded representation + of the certificate object to import. This certificate needs to contain the + private key. + :type base64_encoded_certificate: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'base64_encoded_certificate': {'required': True}, + } + + _attribute_map = { + 'base64_encoded_certificate': {'key': 'value', 'type': 'str'}, + 'password': {'key': 'pwd', 'type': 'str'}, + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateImportParameters, self).__init__(**kwargs) + self.base64_encoded_certificate = kwargs.get('base64_encoded_certificate', None) + self.password = kwargs.get('password', None) + self.certificate_policy = kwargs.get('certificate_policy', None) + self.certificate_attributes = kwargs.get('certificate_attributes', None) + self.tags = kwargs.get('tags', None) + + +class CertificateIssuerItem(Model): + """The certificate issuer item containing certificate issuer metadata. + + :param id: Certificate Identifier. + :type id: str + :param provider: The issuer provider. + :type provider: str + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'provider': {'key': 'provider', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateIssuerItem, self).__init__(**kwargs) + self.id = kwargs.get('id', None) + self.provider = kwargs.get('provider', None) + + +class CertificateIssuerListResult(Model): + """The certificate issuer list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of certificate issuers + in the key vault along with a link to the next page of certificate + issuers. + :vartype value: list[~azure.keyvault.v7_0.models.CertificateIssuerItem] + :ivar next_link: The URL to get the next set of certificate issuers. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[CertificateIssuerItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateIssuerListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class CertificateIssuerSetParameters(Model): + """The certificate issuer set parameters. + + All required parameters must be populated in order to send to Azure. + + :param provider: Required. The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + """ + + _validation = { + 'provider': {'required': True}, + } + + _attribute_map = { + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, **kwargs): + super(CertificateIssuerSetParameters, self).__init__(**kwargs) + self.provider = kwargs.get('provider', None) + self.credentials = kwargs.get('credentials', None) + self.organization_details = kwargs.get('organization_details', None) + self.attributes = kwargs.get('attributes', None) + + +class CertificateIssuerUpdateParameters(Model): + """The certificate issuer update parameters. + + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + """ + + _attribute_map = { + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, **kwargs): + super(CertificateIssuerUpdateParameters, self).__init__(**kwargs) + self.provider = kwargs.get('provider', None) + self.credentials = kwargs.get('credentials', None) + self.organization_details = kwargs.get('organization_details', None) + self.attributes = kwargs.get('attributes', None) + + +class CertificateItem(Model): + """The certificate item containing certificate metadata. + + :param id: Certificate identifier. + :type id: str + :param attributes: The certificate management attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param x509_thumbprint: Thumbprint of the certificate. + :type x509_thumbprint: bytes + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(CertificateItem, self).__init__(**kwargs) + self.id = kwargs.get('id', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.x509_thumbprint = kwargs.get('x509_thumbprint', None) + + +class CertificateListResult(Model): + """The certificate list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of certificates in the + key vault along with a link to the next page of certificates. + :vartype value: list[~azure.keyvault.v7_0.models.CertificateItem] + :ivar next_link: The URL to get the next set of certificates. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[CertificateItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class CertificateMergeParameters(Model): + """The certificate merge parameters. + + All required parameters must be populated in order to send to Azure. + + :param x509_certificates: Required. The certificate or the certificate + chain to merge. + :type x509_certificates: list[bytearray] + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'x509_certificates': {'required': True}, + } + + _attribute_map = { + 'x509_certificates': {'key': 'x5c', 'type': '[bytearray]'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateMergeParameters, self).__init__(**kwargs) + self.x509_certificates = kwargs.get('x509_certificates', None) + self.certificate_attributes = kwargs.get('certificate_attributes', None) + self.tags = kwargs.get('tags', None) + + +class CertificateOperation(Model): + """A certificate operation is returned in case of asynchronous requests. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :param issuer_parameters: Parameters for the issuer of the X509 component + of a certificate. + :type issuer_parameters: ~azure.keyvault.v7_0.models.IssuerParameters + :param csr: The certificate signing request (CSR) that is being used in + the certificate operation. + :type csr: bytearray + :param cancellation_requested: Indicates if cancellation was requested on + the certificate operation. + :type cancellation_requested: bool + :param status: Status of the certificate operation. + :type status: str + :param status_details: The status details of the certificate operation. + :type status_details: str + :param error: Error encountered, if any, during the certificate operation. + :type error: ~azure.keyvault.v7_0.models.Error + :param target: Location which contains the result of the certificate + operation. + :type target: str + :param request_id: Identifier for the certificate operation. + :type request_id: str + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'issuer_parameters': {'key': 'issuer', 'type': 'IssuerParameters'}, + 'csr': {'key': 'csr', 'type': 'bytearray'}, + 'cancellation_requested': {'key': 'cancellation_requested', 'type': 'bool'}, + 'status': {'key': 'status', 'type': 'str'}, + 'status_details': {'key': 'status_details', 'type': 'str'}, + 'error': {'key': 'error', 'type': 'Error'}, + 'target': {'key': 'target', 'type': 'str'}, + 'request_id': {'key': 'request_id', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(CertificateOperation, self).__init__(**kwargs) + self.id = None + self.issuer_parameters = kwargs.get('issuer_parameters', None) + self.csr = kwargs.get('csr', None) + self.cancellation_requested = kwargs.get('cancellation_requested', None) + self.status = kwargs.get('status', None) + self.status_details = kwargs.get('status_details', None) + self.error = kwargs.get('error', None) + self.target = kwargs.get('target', None) + self.request_id = kwargs.get('request_id', None) + + +class CertificateOperationUpdateParameter(Model): + """The certificate operation update parameters. + + All required parameters must be populated in order to send to Azure. + + :param cancellation_requested: Required. Indicates if cancellation was + requested on the certificate operation. + :type cancellation_requested: bool + """ + + _validation = { + 'cancellation_requested': {'required': True}, + } + + _attribute_map = { + 'cancellation_requested': {'key': 'cancellation_requested', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(CertificateOperationUpdateParameter, self).__init__(**kwargs) + self.cancellation_requested = kwargs.get('cancellation_requested', None) + + +class CertificatePolicy(Model): + """Management policy for a certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :param key_properties: Properties of the key backing a certificate. + :type key_properties: ~azure.keyvault.v7_0.models.KeyProperties + :param secret_properties: Properties of the secret backing a certificate. + :type secret_properties: ~azure.keyvault.v7_0.models.SecretProperties + :param x509_certificate_properties: Properties of the X509 component of a + certificate. + :type x509_certificate_properties: + ~azure.keyvault.v7_0.models.X509CertificateProperties + :param lifetime_actions: Actions that will be performed by Key Vault over + the lifetime of a certificate. + :type lifetime_actions: list[~azure.keyvault.v7_0.models.LifetimeAction] + :param issuer_parameters: Parameters for the issuer of the X509 component + of a certificate. + :type issuer_parameters: ~azure.keyvault.v7_0.models.IssuerParameters + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'key_properties': {'key': 'key_props', 'type': 'KeyProperties'}, + 'secret_properties': {'key': 'secret_props', 'type': 'SecretProperties'}, + 'x509_certificate_properties': {'key': 'x509_props', 'type': 'X509CertificateProperties'}, + 'lifetime_actions': {'key': 'lifetime_actions', 'type': '[LifetimeAction]'}, + 'issuer_parameters': {'key': 'issuer', 'type': 'IssuerParameters'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + } + + def __init__(self, **kwargs): + super(CertificatePolicy, self).__init__(**kwargs) + self.id = None + self.key_properties = kwargs.get('key_properties', None) + self.secret_properties = kwargs.get('secret_properties', None) + self.x509_certificate_properties = kwargs.get('x509_certificate_properties', None) + self.lifetime_actions = kwargs.get('lifetime_actions', None) + self.issuer_parameters = kwargs.get('issuer_parameters', None) + self.attributes = kwargs.get('attributes', None) + + +class CertificateRestoreParameters(Model): + """The certificate restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param certificate_bundle_backup: Required. The backup blob associated + with a certificate bundle. + :type certificate_bundle_backup: bytes + """ + + _validation = { + 'certificate_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'certificate_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(CertificateRestoreParameters, self).__init__(**kwargs) + self.certificate_bundle_backup = kwargs.get('certificate_bundle_backup', None) + + +class CertificateUpdateParameters(Model): + """The certificate update parameters. + + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(CertificateUpdateParameters, self).__init__(**kwargs) + self.certificate_policy = kwargs.get('certificate_policy', None) + self.certificate_attributes = kwargs.get('certificate_attributes', None) + self.tags = kwargs.get('tags', None) + + +class Contact(Model): + """The contact information for the vault certificates. + + :param email_address: Email address. + :type email_address: str + :param name: Name. + :type name: str + :param phone: Phone number. + :type phone: str + """ + + _attribute_map = { + 'email_address': {'key': 'email', 'type': 'str'}, + 'name': {'key': 'name', 'type': 'str'}, + 'phone': {'key': 'phone', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(Contact, self).__init__(**kwargs) + self.email_address = kwargs.get('email_address', None) + self.name = kwargs.get('name', None) + self.phone = kwargs.get('phone', None) + + +class Contacts(Model): + """The contacts for the vault certificates. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Identifier for the contacts collection. + :vartype id: str + :param contact_list: The contact list for the vault certificates. + :type contact_list: list[~azure.keyvault.v7_0.models.Contact] + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'contact_list': {'key': 'contacts', 'type': '[Contact]'}, + } + + def __init__(self, **kwargs): + super(Contacts, self).__init__(**kwargs) + self.id = None + self.contact_list = kwargs.get('contact_list', None) + + +class DeletedCertificateBundle(CertificateBundle): + """A Deleted Certificate consisting of its previous id, attributes and its + tags, as well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :ivar kid: The key id. + :vartype kid: str + :ivar sid: The secret id. + :vartype sid: str + :ivar x509_thumbprint: Thumbprint of the certificate. + :vartype x509_thumbprint: bytes + :ivar policy: The management policy. + :vartype policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param cer: CER contents of x509 certificate. + :type cer: bytearray + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs + :type tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted certificate. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the certificate is scheduled to + be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the certificate was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'kid': {'readonly': True}, + 'sid': {'readonly': True}, + 'x509_thumbprint': {'readonly': True}, + 'policy': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'sid': {'key': 'sid', 'type': 'str'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'cer': {'key': 'cer', 'type': 'bytearray'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedCertificateBundle, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedCertificateItem(CertificateItem): + """The deleted certificate item containing metadata about the deleted + certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Certificate identifier. + :type id: str + :param attributes: The certificate management attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param x509_thumbprint: Thumbprint of the certificate. + :type x509_thumbprint: bytes + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted certificate. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the certificate is scheduled to + be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the certificate was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedCertificateItem, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedCertificateListResult(Model): + """A list of certificates that have been deleted in this vault. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of deleted certificates + in the vault along with a link to the next page of deleted certificates + :vartype value: list[~azure.keyvault.v7_0.models.DeletedCertificateItem] + :ivar next_link: The URL to get the next set of deleted certificates. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedCertificateItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(DeletedCertificateListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class KeyBundle(Model): + """A KeyBundle consisting of a WebKey plus its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param key: The Json web key. + :type key: ~azure.keyvault.v7_0.models.JsonWebKey + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(KeyBundle, self).__init__(**kwargs) + self.key = kwargs.get('key', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.managed = None + + +class DeletedKeyBundle(KeyBundle): + """A DeletedKeyBundle consisting of a WebKey plus its Attributes and deletion + info. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param key: The Json web key. + :type key: ~azure.keyvault.v7_0.models.JsonWebKey + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted key. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the key is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the key was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedKeyBundle, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class KeyItem(Model): + """The key item containing key metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param kid: Key identifier. + :type kid: str + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(KeyItem, self).__init__(**kwargs) + self.kid = kwargs.get('kid', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.managed = None + + +class DeletedKeyItem(KeyItem): + """The deleted key item containing the deleted key metadata and information + about deletion. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param kid: Key identifier. + :type kid: str + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted key. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the key is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the key was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedKeyItem, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedKeyListResult(Model): + """A list of keys that have been deleted in this vault. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of deleted keys in the + vault along with a link to the next page of deleted keys + :vartype value: list[~azure.keyvault.v7_0.models.DeletedKeyItem] + :ivar next_link: The URL to get the next set of deleted keys. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedKeyItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(DeletedKeyListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SasDefinitionBundle(Model): + """A SAS definition bundle consists of key vault SAS definition details plus + its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The SAS definition id. + :vartype id: str + :ivar secret_id: Storage account SAS definition secret id. + :vartype secret_id: str + :ivar template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will have + the same properties as the template. + :vartype template_uri: str + :ivar sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :vartype sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :ivar validity_period: The validity period of SAS tokens created according + to the SAS definition. + :vartype validity_period: str + :ivar attributes: The SAS definition attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'template_uri': {'readonly': True}, + 'sas_type': {'readonly': True}, + 'validity_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'template_uri': {'key': 'templateUri', 'type': 'str'}, + 'sas_type': {'key': 'sasType', 'type': 'str'}, + 'validity_period': {'key': 'validityPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionBundle, self).__init__(**kwargs) + self.id = None + self.secret_id = None + self.template_uri = None + self.sas_type = None + self.validity_period = None + self.attributes = None + self.tags = None + + +class DeletedSasDefinitionBundle(SasDefinitionBundle): + """A deleted SAS definition bundle consisting of its previous id, attributes + and its tags, as well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The SAS definition id. + :vartype id: str + :ivar secret_id: Storage account SAS definition secret id. + :vartype secret_id: str + :ivar template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will have + the same properties as the template. + :vartype template_uri: str + :ivar sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :vartype sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :ivar validity_period: The validity period of SAS tokens created according + to the SAS definition. + :vartype validity_period: str + :ivar attributes: The SAS definition attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted SAS definition. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the SAS definition is scheduled + to be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the SAS definition was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'template_uri': {'readonly': True}, + 'sas_type': {'readonly': True}, + 'validity_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'template_uri': {'key': 'templateUri', 'type': 'str'}, + 'sas_type': {'key': 'sasType', 'type': 'str'}, + 'validity_period': {'key': 'validityPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedSasDefinitionBundle, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class SasDefinitionItem(Model): + """The SAS definition item containing storage SAS definition metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage SAS identifier. + :vartype id: str + :ivar secret_id: The storage account SAS definition secret id. + :vartype secret_id: str + :ivar attributes: The SAS definition management attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionItem, self).__init__(**kwargs) + self.id = None + self.secret_id = None + self.attributes = None + self.tags = None + + +class DeletedSasDefinitionItem(SasDefinitionItem): + """The deleted SAS definition item containing metadata about the deleted SAS + definition. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage SAS identifier. + :vartype id: str + :ivar secret_id: The storage account SAS definition secret id. + :vartype secret_id: str + :ivar attributes: The SAS definition management attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted SAS definition. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the SAS definition is scheduled + to be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the SAS definition was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedSasDefinitionItem, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedSasDefinitionListResult(Model): + """The deleted SAS definition list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of the deleted SAS + definitions in the vault along with a link to the next page of deleted sas + definitions + :vartype value: list[~azure.keyvault.v7_0.models.DeletedSasDefinitionItem] + :ivar next_link: The URL to get the next set of deleted SAS definitions. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedSasDefinitionItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(DeletedSasDefinitionListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SecretBundle(Model): + """A secret consisting of a value, id and its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param value: The secret value. + :type value: str + :param id: The secret id. + :type id: str + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar kid: If this is a secret backing a KV certificate, then this field + specifies the corresponding key backing the KV certificate. + :vartype kid: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a secret backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'kid': {'readonly': True}, + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'id': {'key': 'id', 'type': 'str'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(SecretBundle, self).__init__(**kwargs) + self.value = kwargs.get('value', None) + self.id = kwargs.get('id', None) + self.content_type = kwargs.get('content_type', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.kid = None + self.managed = None + + +class DeletedSecretBundle(SecretBundle): + """A Deleted Secret consisting of its previous id, attributes and its tags, as + well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param value: The secret value. + :type value: str + :param id: The secret id. + :type id: str + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar kid: If this is a secret backing a KV certificate, then this field + specifies the corresponding key backing the KV certificate. + :vartype kid: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a secret backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted secret. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the secret is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the secret was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'kid': {'readonly': True}, + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'id': {'key': 'id', 'type': 'str'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedSecretBundle, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class SecretItem(Model): + """The secret item containing secret metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Secret identifier. + :type id: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(SecretItem, self).__init__(**kwargs) + self.id = kwargs.get('id', None) + self.attributes = kwargs.get('attributes', None) + self.tags = kwargs.get('tags', None) + self.content_type = kwargs.get('content_type', None) + self.managed = None + + +class DeletedSecretItem(SecretItem): + """The deleted secret item containing metadata about the deleted secret. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Secret identifier. + :type id: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted secret. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the secret is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the secret was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedSecretItem, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedSecretListResult(Model): + """The deleted secret list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of the deleted secrets + in the vault along with a link to the next page of deleted secrets + :vartype value: list[~azure.keyvault.v7_0.models.DeletedSecretItem] + :ivar next_link: The URL to get the next set of deleted secrets. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedSecretItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(DeletedSecretListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class StorageAccountItem(Model): + """The storage account item containing storage account metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Storage identifier. + :vartype id: str + :ivar resource_id: Storage account resource Id. + :vartype resource_id: str + :ivar attributes: The storage account management attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(StorageAccountItem, self).__init__(**kwargs) + self.id = None + self.resource_id = None + self.attributes = None + self.tags = None + + +class DeletedStorageAccountItem(StorageAccountItem): + """The deleted storage account item containing metadata about the deleted + storage account. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Storage identifier. + :vartype id: str + :ivar resource_id: Storage account resource Id. + :vartype resource_id: str + :ivar attributes: The storage account management attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted storage account. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the storage account is scheduled + to be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the storage account was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedStorageAccountItem, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class StorageBundle(Model): + """A Storage account bundle consists of key vault storage account details plus + its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage account id. + :vartype id: str + :ivar resource_id: The storage account resource id. + :vartype resource_id: str + :ivar active_key_name: The current active storage account key name. + :vartype active_key_name: str + :ivar auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :vartype auto_regenerate_key: bool + :ivar regeneration_period: The key regeneration time duration specified in + ISO-8601 format. + :vartype regeneration_period: str + :ivar attributes: The storage account attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'active_key_name': {'readonly': True}, + 'auto_regenerate_key': {'readonly': True}, + 'regeneration_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(StorageBundle, self).__init__(**kwargs) + self.id = None + self.resource_id = None + self.active_key_name = None + self.auto_regenerate_key = None + self.regeneration_period = None + self.attributes = None + self.tags = None + + +class DeletedStorageBundle(StorageBundle): + """A deleted storage account bundle consisting of its previous id, attributes + and its tags, as well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage account id. + :vartype id: str + :ivar resource_id: The storage account resource id. + :vartype resource_id: str + :ivar active_key_name: The current active storage account key name. + :vartype active_key_name: str + :ivar auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :vartype auto_regenerate_key: bool + :ivar regeneration_period: The key regeneration time duration specified in + ISO-8601 format. + :vartype regeneration_period: str + :ivar attributes: The storage account attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted storage account. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the storage account is scheduled + to be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the storage account was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'active_key_name': {'readonly': True}, + 'auto_regenerate_key': {'readonly': True}, + 'regeneration_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(DeletedStorageBundle, self).__init__(**kwargs) + self.recovery_id = kwargs.get('recovery_id', None) + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedStorageListResult(Model): + """The deleted storage account list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of the deleted storage + accounts in the vault along with a link to the next page of deleted + storage accounts + :vartype value: + list[~azure.keyvault.v7_0.models.DeletedStorageAccountItem] + :ivar next_link: The URL to get the next set of deleted storage accounts. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedStorageAccountItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(DeletedStorageListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class Error(Model): + """The key vault server error. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar code: The error code. + :vartype code: str + :ivar message: The error message. + :vartype message: str + :ivar inner_error: + :vartype inner_error: ~azure.keyvault.v7_0.models.Error + """ + + _validation = { + 'code': {'readonly': True}, + 'message': {'readonly': True}, + 'inner_error': {'readonly': True}, + } + + _attribute_map = { + 'code': {'key': 'code', 'type': 'str'}, + 'message': {'key': 'message', 'type': 'str'}, + 'inner_error': {'key': 'innererror', 'type': 'Error'}, + } + + def __init__(self, **kwargs): + super(Error, self).__init__(**kwargs) + self.code = None + self.message = None + self.inner_error = None + + +class IssuerAttributes(Model): + """The attributes of an issuer managed by the Key Vault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the issuer is enabled. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, **kwargs): + super(IssuerAttributes, self).__init__(**kwargs) + self.enabled = kwargs.get('enabled', None) + self.created = None + self.updated = None + + +class IssuerBundle(Model): + """The issuer for Key Vault certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Identifier for the issuer object. + :vartype id: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, **kwargs): + super(IssuerBundle, self).__init__(**kwargs) + self.id = None + self.provider = kwargs.get('provider', None) + self.credentials = kwargs.get('credentials', None) + self.organization_details = kwargs.get('organization_details', None) + self.attributes = kwargs.get('attributes', None) + + +class IssuerCredentials(Model): + """The credentials to be used for the certificate issuer. + + :param account_id: The user name/account name/account id. + :type account_id: str + :param password: The password/secret/account key. + :type password: str + """ + + _attribute_map = { + 'account_id': {'key': 'account_id', 'type': 'str'}, + 'password': {'key': 'pwd', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(IssuerCredentials, self).__init__(**kwargs) + self.account_id = kwargs.get('account_id', None) + self.password = kwargs.get('password', None) + + +class IssuerParameters(Model): + """Parameters for the issuer of the X509 component of a certificate. + + :param name: Name of the referenced issuer object or reserved names; for + example, 'Self' or 'Unknown'. + :type name: str + :param certificate_type: Type of certificate to be requested from the + issuer provider. + :type certificate_type: str + :param certificate_transparency: Indicates if the certificates generated + under this policy should be published to certificate transparency logs. + :type certificate_transparency: bool + """ + + _attribute_map = { + 'name': {'key': 'name', 'type': 'str'}, + 'certificate_type': {'key': 'cty', 'type': 'str'}, + 'certificate_transparency': {'key': 'cert_transparency', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(IssuerParameters, self).__init__(**kwargs) + self.name = kwargs.get('name', None) + self.certificate_type = kwargs.get('certificate_type', None) + self.certificate_transparency = kwargs.get('certificate_transparency', None) + + +class JsonWebKey(Model): + """As of http://tools.ietf.org/html/draft-ietf-jose-json-web-key-18. + + :param kid: Key identifier. + :type kid: str + :param kty: JsonWebKey Key Type (kty), as defined in + https://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms-40. + Possible values include: 'EC', 'EC-HSM', 'RSA', 'RSA-HSM', 'oct' + :type kty: str or ~azure.keyvault.v7_0.models.JsonWebKeyType + :param key_ops: + :type key_ops: list[str] + :param n: RSA modulus. + :type n: bytes + :param e: RSA public exponent. + :type e: bytes + :param d: RSA private exponent, or the D component of an EC private key. + :type d: bytes + :param dp: RSA private key parameter. + :type dp: bytes + :param dq: RSA private key parameter. + :type dq: bytes + :param qi: RSA private key parameter. + :type qi: bytes + :param p: RSA secret prime. + :type p: bytes + :param q: RSA secret prime, with p < q. + :type q: bytes + :param k: Symmetric key. + :type k: bytes + :param t: HSM Token, used with 'Bring Your Own Key'. + :type t: bytes + :param crv: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'P-256K' + :type crv: str or ~azure.keyvault.v7_0.models.JsonWebKeyCurveName + :param x: X component of an EC public key. + :type x: bytes + :param y: Y component of an EC public key. + :type y: bytes + """ + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'kty': {'key': 'kty', 'type': 'str'}, + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'n': {'key': 'n', 'type': 'base64'}, + 'e': {'key': 'e', 'type': 'base64'}, + 'd': {'key': 'd', 'type': 'base64'}, + 'dp': {'key': 'dp', 'type': 'base64'}, + 'dq': {'key': 'dq', 'type': 'base64'}, + 'qi': {'key': 'qi', 'type': 'base64'}, + 'p': {'key': 'p', 'type': 'base64'}, + 'q': {'key': 'q', 'type': 'base64'}, + 'k': {'key': 'k', 'type': 'base64'}, + 't': {'key': 'key_hsm', 'type': 'base64'}, + 'crv': {'key': 'crv', 'type': 'str'}, + 'x': {'key': 'x', 'type': 'base64'}, + 'y': {'key': 'y', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(JsonWebKey, self).__init__(**kwargs) + self.kid = kwargs.get('kid', None) + self.kty = kwargs.get('kty', None) + self.key_ops = kwargs.get('key_ops', None) + self.n = kwargs.get('n', None) + self.e = kwargs.get('e', None) + self.d = kwargs.get('d', None) + self.dp = kwargs.get('dp', None) + self.dq = kwargs.get('dq', None) + self.qi = kwargs.get('qi', None) + self.p = kwargs.get('p', None) + self.q = kwargs.get('q', None) + self.k = kwargs.get('k', None) + self.t = kwargs.get('t', None) + self.crv = kwargs.get('crv', None) + self.x = kwargs.get('x', None) + self.y = kwargs.get('y', None) + + +class KeyAttributes(Attributes): + """The attributes of a key managed by the key vault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for keys in the current vault. If it contains 'Purgeable' the key + can be permanently deleted by a privileged user; otherwise, only the + system can purge the key, at the end of the retention interval. Possible + values include: 'Purgeable', 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(KeyAttributes, self).__init__(**kwargs) + self.recovery_level = None + + +class KeyCreateParameters(Model): + """The key create parameters. + + All required parameters must be populated in order to send to Azure. + + :param kty: Required. The type of key to create. For valid values, see + JsonWebKeyType. Possible values include: 'EC', 'EC-HSM', 'RSA', 'RSA-HSM', + 'oct' + :type kty: str or ~azure.keyvault.v7_0.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or 4096 + for RSA. + :type key_size: int + :param key_ops: + :type key_ops: list[str or + ~azure.keyvault.v7_0.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'P-256K' + :type curve: str or ~azure.keyvault.v7_0.models.JsonWebKeyCurveName + """ + + _validation = { + 'kty': {'required': True, 'min_length': 1}, + } + + _attribute_map = { + 'kty': {'key': 'kty', 'type': 'str'}, + 'key_size': {'key': 'key_size', 'type': 'int'}, + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'curve': {'key': 'crv', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(KeyCreateParameters, self).__init__(**kwargs) + self.kty = kwargs.get('kty', None) + self.key_size = kwargs.get('key_size', None) + self.key_ops = kwargs.get('key_ops', None) + self.key_attributes = kwargs.get('key_attributes', None) + self.tags = kwargs.get('tags', None) + self.curve = kwargs.get('curve', None) + + +class KeyImportParameters(Model): + """The key import parameters. + + All required parameters must be populated in order to send to Azure. + + :param hsm: Whether to import as a hardware key (HSM) or software key. + :type hsm: bool + :param key: Required. The Json web key + :type key: ~azure.keyvault.v7_0.models.JsonWebKey + :param key_attributes: The key management attributes. + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'key': {'required': True}, + } + + _attribute_map = { + 'hsm': {'key': 'Hsm', 'type': 'bool'}, + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(KeyImportParameters, self).__init__(**kwargs) + self.hsm = kwargs.get('hsm', None) + self.key = kwargs.get('key', None) + self.key_attributes = kwargs.get('key_attributes', None) + self.tags = kwargs.get('tags', None) + + +class KeyListResult(Model): + """The key list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of keys in the key vault + along with a link to the next page of keys. + :vartype value: list[~azure.keyvault.v7_0.models.KeyItem] + :ivar next_link: The URL to get the next set of keys. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[KeyItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(KeyListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class KeyOperationResult(Model): + """The key operation result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar kid: Key identifier + :vartype kid: str + :ivar result: + :vartype result: bytes + """ + + _validation = { + 'kid': {'readonly': True}, + 'result': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'result': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeyOperationResult, self).__init__(**kwargs) + self.kid = None + self.result = None + + +class KeyOperationsParameters(Model): + """The key operations parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: Required. + :type value: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'value': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeyOperationsParameters, self).__init__(**kwargs) + self.algorithm = kwargs.get('algorithm', None) + self.value = kwargs.get('value', None) + + +class KeyProperties(Model): + """Properties of the key pair backing a certificate. + + :param exportable: Indicates if the private key can be exported. + :type exportable: bool + :param key_type: The type of key pair to be used for the certificate. + Possible values include: 'EC', 'EC-HSM', 'RSA', 'RSA-HSM', 'oct' + :type key_type: str or ~azure.keyvault.v7_0.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or 4096 + for RSA. + :type key_size: int + :param reuse_key: Indicates if the same key pair will be used on + certificate renewal. + :type reuse_key: bool + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'P-256K' + :type curve: str or ~azure.keyvault.v7_0.models.JsonWebKeyCurveName + """ + + _attribute_map = { + 'exportable': {'key': 'exportable', 'type': 'bool'}, + 'key_type': {'key': 'kty', 'type': 'str'}, + 'key_size': {'key': 'key_size', 'type': 'int'}, + 'reuse_key': {'key': 'reuse_key', 'type': 'bool'}, + 'curve': {'key': 'crv', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(KeyProperties, self).__init__(**kwargs) + self.exportable = kwargs.get('exportable', None) + self.key_type = kwargs.get('key_type', None) + self.key_size = kwargs.get('key_size', None) + self.reuse_key = kwargs.get('reuse_key', None) + self.curve = kwargs.get('curve', None) + + +class KeyRestoreParameters(Model): + """The key restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param key_bundle_backup: Required. The backup blob associated with a key + bundle. + :type key_bundle_backup: bytes + """ + + _validation = { + 'key_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'key_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeyRestoreParameters, self).__init__(**kwargs) + self.key_bundle_backup = kwargs.get('key_bundle_backup', None) + + +class KeySignParameters(Model): + """The key operations parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. The signing/verification algorithm identifier. + For more information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', 'PS384', + 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', 'ES384', 'ES512', + 'ES256K' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeySignatureAlgorithm + :param value: Required. + :type value: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'value': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeySignParameters, self).__init__(**kwargs) + self.algorithm = kwargs.get('algorithm', None) + self.value = kwargs.get('value', None) + + +class KeyUpdateParameters(Model): + """The key update parameters. + + :param key_ops: Json web key operations. For more information on possible + key operations, see JsonWebKeyOperation. + :type key_ops: list[str or + ~azure.keyvault.v7_0.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(KeyUpdateParameters, self).__init__(**kwargs) + self.key_ops = kwargs.get('key_ops', None) + self.key_attributes = kwargs.get('key_attributes', None) + self.tags = kwargs.get('tags', None) + + +class KeyVaultError(Model): + """The key vault error exception. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar error: + :vartype error: ~azure.keyvault.v7_0.models.Error + """ + + _validation = { + 'error': {'readonly': True}, + } + + _attribute_map = { + 'error': {'key': 'error', 'type': 'Error'}, + } + + def __init__(self, **kwargs): + super(KeyVaultError, self).__init__(**kwargs) + self.error = None + + +class KeyVaultErrorException(HttpResponseError): + """Server responsed with exception of type: 'KeyVaultError'. + + :param deserialize: A deserializer + :param response: Server response to be deserialized. + """ + + def __init__(self, response, deserialize, *args): + + model_name = 'KeyVaultError' + self.error = deserialize(model_name, response) + if self.error is None: + self.error = deserialize.dependencies[model_name]() + super(KeyVaultErrorException, self).__init__(response=response) + + +class KeyVerifyParameters(Model): + """The key verify parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. The signing/verification algorithm. For more + information on possible algorithm types, see JsonWebKeySignatureAlgorithm. + Possible values include: 'PS256', 'PS384', 'PS512', 'RS256', 'RS384', + 'RS512', 'RSNULL', 'ES256', 'ES384', 'ES512', 'ES256K' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeySignatureAlgorithm + :param digest: Required. The digest used for signing. + :type digest: bytes + :param signature: Required. The signature to be verified. + :type signature: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'digest': {'required': True}, + 'signature': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'digest': {'key': 'digest', 'type': 'base64'}, + 'signature': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(KeyVerifyParameters, self).__init__(**kwargs) + self.algorithm = kwargs.get('algorithm', None) + self.digest = kwargs.get('digest', None) + self.signature = kwargs.get('signature', None) + + +class KeyVerifyResult(Model): + """The key verify result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: True if the signature is verified, otherwise false. + :vartype value: bool + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(KeyVerifyResult, self).__init__(**kwargs) + self.value = None + + +class LifetimeAction(Model): + """Action and its trigger that will be performed by Key Vault over the + lifetime of a certificate. + + :param trigger: The condition that will execute the action. + :type trigger: ~azure.keyvault.v7_0.models.Trigger + :param action: The action that will be executed. + :type action: ~azure.keyvault.v7_0.models.Action + """ + + _attribute_map = { + 'trigger': {'key': 'trigger', 'type': 'Trigger'}, + 'action': {'key': 'action', 'type': 'Action'}, + } + + def __init__(self, **kwargs): + super(LifetimeAction, self).__init__(**kwargs) + self.trigger = kwargs.get('trigger', None) + self.action = kwargs.get('action', None) + + +class OrganizationDetails(Model): + """Details of the organization of the certificate issuer. + + :param id: Id of the organization. + :type id: str + :param admin_details: Details of the organization administrator. + :type admin_details: + list[~azure.keyvault.v7_0.models.AdministratorDetails] + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'admin_details': {'key': 'admin_details', 'type': '[AdministratorDetails]'}, + } + + def __init__(self, **kwargs): + super(OrganizationDetails, self).__init__(**kwargs) + self.id = kwargs.get('id', None) + self.admin_details = kwargs.get('admin_details', None) + + +class PendingCertificateSigningRequestResult(Model): + """The pending certificate signing request result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The pending certificate signing request as Base64 encoded + string. + :vartype value: str + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(PendingCertificateSigningRequestResult, self).__init__(**kwargs) + self.value = None + + +class SasDefinitionAttributes(Model): + """The SAS definition management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: the enabled state of the object. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for SAS definitions in the current vault. If it contains + 'Purgeable' the SAS definition can be permanently deleted by a privileged + user; otherwise, only the system can purge the SAS definition, at the end + of the retention interval. Possible values include: 'Purgeable', + 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionAttributes, self).__init__(**kwargs) + self.enabled = kwargs.get('enabled', None) + self.created = None + self.updated = None + self.recovery_level = None + + +class SasDefinitionCreateParameters(Model): + """The SAS definition create parameters. + + All required parameters must be populated in order to send to Azure. + + :param template_uri: Required. The SAS definition token template signed + with an arbitrary key. Tokens created according to the SAS definition + will have the same properties as the template. + :type template_uri: str + :param sas_type: Required. The type of SAS token the SAS definition will + create. Possible values include: 'account', 'service' + :type sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :param validity_period: Required. The validity period of SAS tokens + created according to the SAS definition. + :type validity_period: str + :param sas_definition_attributes: The attributes of the SAS definition. + :type sas_definition_attributes: + ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'template_uri': {'required': True}, + 'sas_type': {'required': True}, + 'validity_period': {'required': True}, + } + + _attribute_map = { + 'template_uri': {'key': 'templateUri', 'type': 'str'}, + 'sas_type': {'key': 'sasType', 'type': 'str'}, + 'validity_period': {'key': 'validityPeriod', 'type': 'str'}, + 'sas_definition_attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionCreateParameters, self).__init__(**kwargs) + self.template_uri = kwargs.get('template_uri', None) + self.sas_type = kwargs.get('sas_type', None) + self.validity_period = kwargs.get('validity_period', None) + self.sas_definition_attributes = kwargs.get('sas_definition_attributes', None) + self.tags = kwargs.get('tags', None) + + +class SasDefinitionListResult(Model): + """The storage account SAS definition list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of SAS definitions along + with a link to the next page of SAS definitions. + :vartype value: list[~azure.keyvault.v7_0.models.SasDefinitionItem] + :ivar next_link: The URL to get the next set of SAS definitions. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[SasDefinitionItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SasDefinitionUpdateParameters(Model): + """The SAS definition update parameters. + + :param template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will have + the same properties as the template. + :type template_uri: str + :param sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :type sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :param validity_period: The validity period of SAS tokens created + according to the SAS definition. + :type validity_period: str + :param sas_definition_attributes: The attributes of the SAS definition. + :type sas_definition_attributes: + ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'template_uri': {'key': 'templateUri', 'type': 'str'}, + 'sas_type': {'key': 'sasType', 'type': 'str'}, + 'validity_period': {'key': 'validityPeriod', 'type': 'str'}, + 'sas_definition_attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SasDefinitionUpdateParameters, self).__init__(**kwargs) + self.template_uri = kwargs.get('template_uri', None) + self.sas_type = kwargs.get('sas_type', None) + self.validity_period = kwargs.get('validity_period', None) + self.sas_definition_attributes = kwargs.get('sas_definition_attributes', None) + self.tags = kwargs.get('tags', None) + + +class SecretAttributes(Attributes): + """The secret management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for secrets in the current vault. If it contains 'Purgeable', the + secret can be permanently deleted by a privileged user; otherwise, only + the system can purge the secret, at the end of the retention interval. + Possible values include: 'Purgeable', 'Recoverable+Purgeable', + 'Recoverable', 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(SecretAttributes, self).__init__(**kwargs) + self.recovery_level = None + + +class SecretListResult(Model): + """The secret list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of secrets in the key + vault along with a link to the next page of secrets. + :vartype value: list[~azure.keyvault.v7_0.models.SecretItem] + :ivar next_link: The URL to get the next set of secrets. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[SecretItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(SecretListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SecretProperties(Model): + """Properties of the key backing a certificate. + + :param content_type: The media type (MIME type). + :type content_type: str + """ + + _attribute_map = { + 'content_type': {'key': 'contentType', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(SecretProperties, self).__init__(**kwargs) + self.content_type = kwargs.get('content_type', None) + + +class SecretRestoreParameters(Model): + """The secret restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param secret_bundle_backup: Required. The backup blob associated with a + secret bundle. + :type secret_bundle_backup: bytes + """ + + _validation = { + 'secret_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'secret_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(SecretRestoreParameters, self).__init__(**kwargs) + self.secret_bundle_backup = kwargs.get('secret_bundle_backup', None) + + +class SecretSetParameters(Model): + """The secret set parameters. + + All required parameters must be populated in order to send to Azure. + + :param value: Required. The value of the secret. + :type value: str + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: ~azure.keyvault.v7_0.models.SecretAttributes + """ + + _validation = { + 'value': {'required': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'secret_attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + } + + def __init__(self, **kwargs): + super(SecretSetParameters, self).__init__(**kwargs) + self.value = kwargs.get('value', None) + self.tags = kwargs.get('tags', None) + self.content_type = kwargs.get('content_type', None) + self.secret_attributes = kwargs.get('secret_attributes', None) + + +class SecretUpdateParameters(Model): + """The secret update parameters. + + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'secret_attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(SecretUpdateParameters, self).__init__(**kwargs) + self.content_type = kwargs.get('content_type', None) + self.secret_attributes = kwargs.get('secret_attributes', None) + self.tags = kwargs.get('tags', None) + + +class StorageAccountAttributes(Model): + """The storage account management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: the enabled state of the object. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for storage accounts in the current vault. If it contains + 'Purgeable' the storage account can be permanently deleted by a privileged + user; otherwise, only the system can purge the storage account, at the end + of the retention interval. Possible values include: 'Purgeable', + 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(StorageAccountAttributes, self).__init__(**kwargs) + self.enabled = kwargs.get('enabled', None) + self.created = None + self.updated = None + self.recovery_level = None + + +class StorageAccountCreateParameters(Model): + """The storage account create parameters. + + All required parameters must be populated in order to send to Azure. + + :param resource_id: Required. Storage account resource id. + :type resource_id: str + :param active_key_name: Required. Current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: Required. whether keyvault should manage the + storage account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration specified + in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage account. + :type storage_account_attributes: + ~azure.keyvault.v7_0.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'resource_id': {'required': True}, + 'active_key_name': {'required': True}, + 'auto_regenerate_key': {'required': True}, + } + + _attribute_map = { + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'storage_account_attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(StorageAccountCreateParameters, self).__init__(**kwargs) + self.resource_id = kwargs.get('resource_id', None) + self.active_key_name = kwargs.get('active_key_name', None) + self.auto_regenerate_key = kwargs.get('auto_regenerate_key', None) + self.regeneration_period = kwargs.get('regeneration_period', None) + self.storage_account_attributes = kwargs.get('storage_account_attributes', None) + self.tags = kwargs.get('tags', None) + + +class StorageAccountRegenerteKeyParameters(Model): + """The storage account key regenerate parameters. + + All required parameters must be populated in order to send to Azure. + + :param key_name: Required. The storage account key name. + :type key_name: str + """ + + _validation = { + 'key_name': {'required': True}, + } + + _attribute_map = { + 'key_name': {'key': 'keyName', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(StorageAccountRegenerteKeyParameters, self).__init__(**kwargs) + self.key_name = kwargs.get('key_name', None) + + +class StorageAccountUpdateParameters(Model): + """The storage account update parameters. + + :param active_key_name: The current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration specified + in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage account. + :type storage_account_attributes: + ~azure.keyvault.v7_0.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'storage_account_attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs): + super(StorageAccountUpdateParameters, self).__init__(**kwargs) + self.active_key_name = kwargs.get('active_key_name', None) + self.auto_regenerate_key = kwargs.get('auto_regenerate_key', None) + self.regeneration_period = kwargs.get('regeneration_period', None) + self.storage_account_attributes = kwargs.get('storage_account_attributes', None) + self.tags = kwargs.get('tags', None) + + +class StorageListResult(Model): + """The storage accounts list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of storage accounts in + the key vault along with a link to the next page of storage accounts. + :vartype value: list[~azure.keyvault.v7_0.models.StorageAccountItem] + :ivar next_link: The URL to get the next set of storage accounts. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[StorageAccountItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs): + super(StorageListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class StorageRestoreParameters(Model): + """The secret restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param storage_bundle_backup: Required. The backup blob associated with a + storage account. + :type storage_bundle_backup: bytes + """ + + _validation = { + 'storage_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'storage_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs): + super(StorageRestoreParameters, self).__init__(**kwargs) + self.storage_bundle_backup = kwargs.get('storage_bundle_backup', None) + + +class SubjectAlternativeNames(Model): + """The subject alternate names of a X509 object. + + :param emails: Email addresses. + :type emails: list[str] + :param dns_names: Domain names. + :type dns_names: list[str] + :param upns: User principal names. + :type upns: list[str] + """ + + _attribute_map = { + 'emails': {'key': 'emails', 'type': '[str]'}, + 'dns_names': {'key': 'dns_names', 'type': '[str]'}, + 'upns': {'key': 'upns', 'type': '[str]'}, + } + + def __init__(self, **kwargs): + super(SubjectAlternativeNames, self).__init__(**kwargs) + self.emails = kwargs.get('emails', None) + self.dns_names = kwargs.get('dns_names', None) + self.upns = kwargs.get('upns', None) + + +class Trigger(Model): + """A condition to be satisfied for an action to be executed. + + :param lifetime_percentage: Percentage of lifetime at which to trigger. + Value should be between 1 and 99. + :type lifetime_percentage: int + :param days_before_expiry: Days before expiry to attempt renewal. Value + should be between 1 and validity_in_months multiplied by 27. If + validity_in_months is 36, then value should be between 1 and 972 (36 * + 27). + :type days_before_expiry: int + """ + + _validation = { + 'lifetime_percentage': {'maximum': 99, 'minimum': 1}, + } + + _attribute_map = { + 'lifetime_percentage': {'key': 'lifetime_percentage', 'type': 'int'}, + 'days_before_expiry': {'key': 'days_before_expiry', 'type': 'int'}, + } + + def __init__(self, **kwargs): + super(Trigger, self).__init__(**kwargs) + self.lifetime_percentage = kwargs.get('lifetime_percentage', None) + self.days_before_expiry = kwargs.get('days_before_expiry', None) + + +class X509CertificateProperties(Model): + """Properties of the X509 component of a certificate. + + :param subject: The subject name. Should be a valid X509 distinguished + Name. + :type subject: str + :param ekus: The enhanced key usage. + :type ekus: list[str] + :param subject_alternative_names: The subject alternative names. + :type subject_alternative_names: + ~azure.keyvault.v7_0.models.SubjectAlternativeNames + :param key_usage: List of key usages. + :type key_usage: list[str or ~azure.keyvault.v7_0.models.KeyUsageType] + :param validity_in_months: The duration that the certificate is valid in + months. + :type validity_in_months: int + """ + + _validation = { + 'validity_in_months': {'minimum': 0}, + } + + _attribute_map = { + 'subject': {'key': 'subject', 'type': 'str'}, + 'ekus': {'key': 'ekus', 'type': '[str]'}, + 'subject_alternative_names': {'key': 'sans', 'type': 'SubjectAlternativeNames'}, + 'key_usage': {'key': 'key_usage', 'type': '[str]'}, + 'validity_in_months': {'key': 'validity_months', 'type': 'int'}, + } + + def __init__(self, **kwargs): + super(X509CertificateProperties, self).__init__(**kwargs) + self.subject = kwargs.get('subject', None) + self.ekus = kwargs.get('ekus', None) + self.subject_alternative_names = kwargs.get('subject_alternative_names', None) + self.key_usage = kwargs.get('key_usage', None) + self.validity_in_months = kwargs.get('validity_in_months', None) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/_models_py3.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/_models_py3.py new file mode 100644 index 000000000000..59e6f039d4b6 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/models/_models_py3.py @@ -0,0 +1,3208 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from msrest.serialization import Model +from azure.core import HttpResponseError + + +class Action(Model): + """The action that will be executed. + + :param action_type: The type of the action. Possible values include: + 'EmailContacts', 'AutoRenew' + :type action_type: str or ~azure.keyvault.v7_0.models.ActionType + """ + + _attribute_map = { + 'action_type': {'key': 'action_type', 'type': 'ActionType'}, + } + + def __init__(self, *, action_type=None, **kwargs) -> None: + super(Action, self).__init__(**kwargs) + self.action_type = action_type + + +class AdministratorDetails(Model): + """Details of the organization administrator of the certificate issuer. + + :param first_name: First name. + :type first_name: str + :param last_name: Last name. + :type last_name: str + :param email_address: Email address. + :type email_address: str + :param phone: Phone number. + :type phone: str + """ + + _attribute_map = { + 'first_name': {'key': 'first_name', 'type': 'str'}, + 'last_name': {'key': 'last_name', 'type': 'str'}, + 'email_address': {'key': 'email', 'type': 'str'}, + 'phone': {'key': 'phone', 'type': 'str'}, + } + + def __init__(self, *, first_name: str=None, last_name: str=None, email_address: str=None, phone: str=None, **kwargs) -> None: + super(AdministratorDetails, self).__init__(**kwargs) + self.first_name = first_name + self.last_name = last_name + self.email_address = email_address + self.phone = phone + + +class Attributes(Model): + """The object attributes managed by the KeyVault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, *, enabled: bool=None, not_before=None, expires=None, **kwargs) -> None: + super(Attributes, self).__init__(**kwargs) + self.enabled = enabled + self.not_before = not_before + self.expires = expires + self.created = None + self.updated = None + + +class BackupCertificateResult(Model): + """The backup certificate result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up certificate. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs) -> None: + super(BackupCertificateResult, self).__init__(**kwargs) + self.value = None + + +class BackupKeyResult(Model): + """The backup key result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up key. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs) -> None: + super(BackupKeyResult, self).__init__(**kwargs) + self.value = None + + +class BackupSecretResult(Model): + """The backup secret result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up secret. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs) -> None: + super(BackupSecretResult, self).__init__(**kwargs) + self.value = None + + +class BackupStorageResult(Model): + """The backup storage result, containing the backup blob. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The backup blob containing the backed up storage account. + :vartype value: bytes + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs) -> None: + super(BackupStorageResult, self).__init__(**kwargs) + self.value = None + + +class CertificateAttributes(Attributes): + """The certificate management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for certificates in the current vault. If it contains 'Purgeable', + the certificate can be permanently deleted by a privileged user; + otherwise, only the system can purge the certificate, at the end of the + retention interval. Possible values include: 'Purgeable', + 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, *, enabled: bool=None, not_before=None, expires=None, **kwargs) -> None: + super(CertificateAttributes, self).__init__(enabled=enabled, not_before=not_before, expires=expires, **kwargs) + self.recovery_level = None + + +class CertificateBundle(Model): + """A certificate bundle consists of a certificate (X509) plus its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :ivar kid: The key id. + :vartype kid: str + :ivar sid: The secret id. + :vartype sid: str + :ivar x509_thumbprint: Thumbprint of the certificate. + :vartype x509_thumbprint: bytes + :ivar policy: The management policy. + :vartype policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param cer: CER contents of x509 certificate. + :type cer: bytearray + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs + :type tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'kid': {'readonly': True}, + 'sid': {'readonly': True}, + 'x509_thumbprint': {'readonly': True}, + 'policy': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'sid': {'key': 'sid', 'type': 'str'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'cer': {'key': 'cer', 'type': 'bytearray'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, cer: bytearray=None, content_type: str=None, attributes=None, tags=None, **kwargs) -> None: + super(CertificateBundle, self).__init__(**kwargs) + self.id = None + self.kid = None + self.sid = None + self.x509_thumbprint = None + self.policy = None + self.cer = cer + self.content_type = content_type + self.attributes = attributes + self.tags = tags + + +class CertificateCreateParameters(Model): + """The certificate create parameters. + + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, certificate_policy=None, certificate_attributes=None, tags=None, **kwargs) -> None: + super(CertificateCreateParameters, self).__init__(**kwargs) + self.certificate_policy = certificate_policy + self.certificate_attributes = certificate_attributes + self.tags = tags + + +class CertificateImportParameters(Model): + """The certificate import parameters. + + All required parameters must be populated in order to send to Azure. + + :param base64_encoded_certificate: Required. Base64 encoded representation + of the certificate object to import. This certificate needs to contain the + private key. + :type base64_encoded_certificate: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'base64_encoded_certificate': {'required': True}, + } + + _attribute_map = { + 'base64_encoded_certificate': {'key': 'value', 'type': 'str'}, + 'password': {'key': 'pwd', 'type': 'str'}, + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, base64_encoded_certificate: str, password: str=None, certificate_policy=None, certificate_attributes=None, tags=None, **kwargs) -> None: + super(CertificateImportParameters, self).__init__(**kwargs) + self.base64_encoded_certificate = base64_encoded_certificate + self.password = password + self.certificate_policy = certificate_policy + self.certificate_attributes = certificate_attributes + self.tags = tags + + +class CertificateIssuerItem(Model): + """The certificate issuer item containing certificate issuer metadata. + + :param id: Certificate Identifier. + :type id: str + :param provider: The issuer provider. + :type provider: str + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'provider': {'key': 'provider', 'type': 'str'}, + } + + def __init__(self, *, id: str=None, provider: str=None, **kwargs) -> None: + super(CertificateIssuerItem, self).__init__(**kwargs) + self.id = id + self.provider = provider + + +class CertificateIssuerListResult(Model): + """The certificate issuer list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of certificate issuers + in the key vault along with a link to the next page of certificate + issuers. + :vartype value: list[~azure.keyvault.v7_0.models.CertificateIssuerItem] + :ivar next_link: The URL to get the next set of certificate issuers. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[CertificateIssuerItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(CertificateIssuerListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class CertificateIssuerSetParameters(Model): + """The certificate issuer set parameters. + + All required parameters must be populated in order to send to Azure. + + :param provider: Required. The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + """ + + _validation = { + 'provider': {'required': True}, + } + + _attribute_map = { + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, *, provider: str, credentials=None, organization_details=None, attributes=None, **kwargs) -> None: + super(CertificateIssuerSetParameters, self).__init__(**kwargs) + self.provider = provider + self.credentials = credentials + self.organization_details = organization_details + self.attributes = attributes + + +class CertificateIssuerUpdateParameters(Model): + """The certificate issuer update parameters. + + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + """ + + _attribute_map = { + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, *, provider: str=None, credentials=None, organization_details=None, attributes=None, **kwargs) -> None: + super(CertificateIssuerUpdateParameters, self).__init__(**kwargs) + self.provider = provider + self.credentials = credentials + self.organization_details = organization_details + self.attributes = attributes + + +class CertificateItem(Model): + """The certificate item containing certificate metadata. + + :param id: Certificate identifier. + :type id: str + :param attributes: The certificate management attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param x509_thumbprint: Thumbprint of the certificate. + :type x509_thumbprint: bytes + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + } + + def __init__(self, *, id: str=None, attributes=None, tags=None, x509_thumbprint: bytes=None, **kwargs) -> None: + super(CertificateItem, self).__init__(**kwargs) + self.id = id + self.attributes = attributes + self.tags = tags + self.x509_thumbprint = x509_thumbprint + + +class CertificateListResult(Model): + """The certificate list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of certificates in the + key vault along with a link to the next page of certificates. + :vartype value: list[~azure.keyvault.v7_0.models.CertificateItem] + :ivar next_link: The URL to get the next set of certificates. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[CertificateItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(CertificateListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class CertificateMergeParameters(Model): + """The certificate merge parameters. + + All required parameters must be populated in order to send to Azure. + + :param x509_certificates: Required. The certificate or the certificate + chain to merge. + :type x509_certificates: list[bytearray] + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'x509_certificates': {'required': True}, + } + + _attribute_map = { + 'x509_certificates': {'key': 'x5c', 'type': '[bytearray]'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, x509_certificates, certificate_attributes=None, tags=None, **kwargs) -> None: + super(CertificateMergeParameters, self).__init__(**kwargs) + self.x509_certificates = x509_certificates + self.certificate_attributes = certificate_attributes + self.tags = tags + + +class CertificateOperation(Model): + """A certificate operation is returned in case of asynchronous requests. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :param issuer_parameters: Parameters for the issuer of the X509 component + of a certificate. + :type issuer_parameters: ~azure.keyvault.v7_0.models.IssuerParameters + :param csr: The certificate signing request (CSR) that is being used in + the certificate operation. + :type csr: bytearray + :param cancellation_requested: Indicates if cancellation was requested on + the certificate operation. + :type cancellation_requested: bool + :param status: Status of the certificate operation. + :type status: str + :param status_details: The status details of the certificate operation. + :type status_details: str + :param error: Error encountered, if any, during the certificate operation. + :type error: ~azure.keyvault.v7_0.models.Error + :param target: Location which contains the result of the certificate + operation. + :type target: str + :param request_id: Identifier for the certificate operation. + :type request_id: str + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'issuer_parameters': {'key': 'issuer', 'type': 'IssuerParameters'}, + 'csr': {'key': 'csr', 'type': 'bytearray'}, + 'cancellation_requested': {'key': 'cancellation_requested', 'type': 'bool'}, + 'status': {'key': 'status', 'type': 'str'}, + 'status_details': {'key': 'status_details', 'type': 'str'}, + 'error': {'key': 'error', 'type': 'Error'}, + 'target': {'key': 'target', 'type': 'str'}, + 'request_id': {'key': 'request_id', 'type': 'str'}, + } + + def __init__(self, *, issuer_parameters=None, csr: bytearray=None, cancellation_requested: bool=None, status: str=None, status_details: str=None, error=None, target: str=None, request_id: str=None, **kwargs) -> None: + super(CertificateOperation, self).__init__(**kwargs) + self.id = None + self.issuer_parameters = issuer_parameters + self.csr = csr + self.cancellation_requested = cancellation_requested + self.status = status + self.status_details = status_details + self.error = error + self.target = target + self.request_id = request_id + + +class CertificateOperationUpdateParameter(Model): + """The certificate operation update parameters. + + All required parameters must be populated in order to send to Azure. + + :param cancellation_requested: Required. Indicates if cancellation was + requested on the certificate operation. + :type cancellation_requested: bool + """ + + _validation = { + 'cancellation_requested': {'required': True}, + } + + _attribute_map = { + 'cancellation_requested': {'key': 'cancellation_requested', 'type': 'bool'}, + } + + def __init__(self, *, cancellation_requested: bool, **kwargs) -> None: + super(CertificateOperationUpdateParameter, self).__init__(**kwargs) + self.cancellation_requested = cancellation_requested + + +class CertificatePolicy(Model): + """Management policy for a certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :param key_properties: Properties of the key backing a certificate. + :type key_properties: ~azure.keyvault.v7_0.models.KeyProperties + :param secret_properties: Properties of the secret backing a certificate. + :type secret_properties: ~azure.keyvault.v7_0.models.SecretProperties + :param x509_certificate_properties: Properties of the X509 component of a + certificate. + :type x509_certificate_properties: + ~azure.keyvault.v7_0.models.X509CertificateProperties + :param lifetime_actions: Actions that will be performed by Key Vault over + the lifetime of a certificate. + :type lifetime_actions: list[~azure.keyvault.v7_0.models.LifetimeAction] + :param issuer_parameters: Parameters for the issuer of the X509 component + of a certificate. + :type issuer_parameters: ~azure.keyvault.v7_0.models.IssuerParameters + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'key_properties': {'key': 'key_props', 'type': 'KeyProperties'}, + 'secret_properties': {'key': 'secret_props', 'type': 'SecretProperties'}, + 'x509_certificate_properties': {'key': 'x509_props', 'type': 'X509CertificateProperties'}, + 'lifetime_actions': {'key': 'lifetime_actions', 'type': '[LifetimeAction]'}, + 'issuer_parameters': {'key': 'issuer', 'type': 'IssuerParameters'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + } + + def __init__(self, *, key_properties=None, secret_properties=None, x509_certificate_properties=None, lifetime_actions=None, issuer_parameters=None, attributes=None, **kwargs) -> None: + super(CertificatePolicy, self).__init__(**kwargs) + self.id = None + self.key_properties = key_properties + self.secret_properties = secret_properties + self.x509_certificate_properties = x509_certificate_properties + self.lifetime_actions = lifetime_actions + self.issuer_parameters = issuer_parameters + self.attributes = attributes + + +class CertificateRestoreParameters(Model): + """The certificate restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param certificate_bundle_backup: Required. The backup blob associated + with a certificate bundle. + :type certificate_bundle_backup: bytes + """ + + _validation = { + 'certificate_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'certificate_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, certificate_bundle_backup: bytes, **kwargs) -> None: + super(CertificateRestoreParameters, self).__init__(**kwargs) + self.certificate_bundle_backup = certificate_bundle_backup + + +class CertificateUpdateParameters(Model): + """The certificate update parameters. + + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'certificate_policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'certificate_attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, certificate_policy=None, certificate_attributes=None, tags=None, **kwargs) -> None: + super(CertificateUpdateParameters, self).__init__(**kwargs) + self.certificate_policy = certificate_policy + self.certificate_attributes = certificate_attributes + self.tags = tags + + +class Contact(Model): + """The contact information for the vault certificates. + + :param email_address: Email address. + :type email_address: str + :param name: Name. + :type name: str + :param phone: Phone number. + :type phone: str + """ + + _attribute_map = { + 'email_address': {'key': 'email', 'type': 'str'}, + 'name': {'key': 'name', 'type': 'str'}, + 'phone': {'key': 'phone', 'type': 'str'}, + } + + def __init__(self, *, email_address: str=None, name: str=None, phone: str=None, **kwargs) -> None: + super(Contact, self).__init__(**kwargs) + self.email_address = email_address + self.name = name + self.phone = phone + + +class Contacts(Model): + """The contacts for the vault certificates. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Identifier for the contacts collection. + :vartype id: str + :param contact_list: The contact list for the vault certificates. + :type contact_list: list[~azure.keyvault.v7_0.models.Contact] + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'contact_list': {'key': 'contacts', 'type': '[Contact]'}, + } + + def __init__(self, *, contact_list=None, **kwargs) -> None: + super(Contacts, self).__init__(**kwargs) + self.id = None + self.contact_list = contact_list + + +class DeletedCertificateBundle(CertificateBundle): + """A Deleted Certificate consisting of its previous id, attributes and its + tags, as well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The certificate id. + :vartype id: str + :ivar kid: The key id. + :vartype kid: str + :ivar sid: The secret id. + :vartype sid: str + :ivar x509_thumbprint: Thumbprint of the certificate. + :vartype x509_thumbprint: bytes + :ivar policy: The management policy. + :vartype policy: ~azure.keyvault.v7_0.models.CertificatePolicy + :param cer: CER contents of x509 certificate. + :type cer: bytearray + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs + :type tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted certificate. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the certificate is scheduled to + be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the certificate was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'kid': {'readonly': True}, + 'sid': {'readonly': True}, + 'x509_thumbprint': {'readonly': True}, + 'policy': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'sid': {'key': 'sid', 'type': 'str'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'policy': {'key': 'policy', 'type': 'CertificatePolicy'}, + 'cer': {'key': 'cer', 'type': 'bytearray'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, cer: bytearray=None, content_type: str=None, attributes=None, tags=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedCertificateBundle, self).__init__(cer=cer, content_type=content_type, attributes=attributes, tags=tags, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedCertificateItem(CertificateItem): + """The deleted certificate item containing metadata about the deleted + certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Certificate identifier. + :type id: str + :param attributes: The certificate management attributes. + :type attributes: ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param x509_thumbprint: Thumbprint of the certificate. + :type x509_thumbprint: bytes + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted certificate. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the certificate is scheduled to + be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the certificate was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'CertificateAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'x509_thumbprint': {'key': 'x5t', 'type': 'base64'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, id: str=None, attributes=None, tags=None, x509_thumbprint: bytes=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedCertificateItem, self).__init__(id=id, attributes=attributes, tags=tags, x509_thumbprint=x509_thumbprint, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedCertificateListResult(Model): + """A list of certificates that have been deleted in this vault. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of deleted certificates + in the vault along with a link to the next page of deleted certificates + :vartype value: list[~azure.keyvault.v7_0.models.DeletedCertificateItem] + :ivar next_link: The URL to get the next set of deleted certificates. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedCertificateItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(DeletedCertificateListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class KeyBundle(Model): + """A KeyBundle consisting of a WebKey plus its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param key: The Json web key. + :type key: ~azure.keyvault.v7_0.models.JsonWebKey + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, *, key=None, attributes=None, tags=None, **kwargs) -> None: + super(KeyBundle, self).__init__(**kwargs) + self.key = key + self.attributes = attributes + self.tags = tags + self.managed = None + + +class DeletedKeyBundle(KeyBundle): + """A DeletedKeyBundle consisting of a WebKey plus its Attributes and deletion + info. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param key: The Json web key. + :type key: ~azure.keyvault.v7_0.models.JsonWebKey + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted key. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the key is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the key was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, key=None, attributes=None, tags=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedKeyBundle, self).__init__(key=key, attributes=attributes, tags=tags, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class KeyItem(Model): + """The key item containing key metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param kid: Key identifier. + :type kid: str + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, *, kid: str=None, attributes=None, tags=None, **kwargs) -> None: + super(KeyItem, self).__init__(**kwargs) + self.kid = kid + self.attributes = attributes + self.tags = tags + self.managed = None + + +class DeletedKeyItem(KeyItem): + """The deleted key item containing the deleted key metadata and information + about deletion. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param kid: Key identifier. + :type kid: str + :param attributes: The key management attributes. + :type attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar managed: True if the key's lifetime is managed by key vault. If this + is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted key. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the key is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the key was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, kid: str=None, attributes=None, tags=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedKeyItem, self).__init__(kid=kid, attributes=attributes, tags=tags, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedKeyListResult(Model): + """A list of keys that have been deleted in this vault. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of deleted keys in the + vault along with a link to the next page of deleted keys + :vartype value: list[~azure.keyvault.v7_0.models.DeletedKeyItem] + :ivar next_link: The URL to get the next set of deleted keys. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedKeyItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(DeletedKeyListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SasDefinitionBundle(Model): + """A SAS definition bundle consists of key vault SAS definition details plus + its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The SAS definition id. + :vartype id: str + :ivar secret_id: Storage account SAS definition secret id. + :vartype secret_id: str + :ivar template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will have + the same properties as the template. + :vartype template_uri: str + :ivar sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :vartype sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :ivar validity_period: The validity period of SAS tokens created according + to the SAS definition. + :vartype validity_period: str + :ivar attributes: The SAS definition attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'template_uri': {'readonly': True}, + 'sas_type': {'readonly': True}, + 'validity_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'template_uri': {'key': 'templateUri', 'type': 'str'}, + 'sas_type': {'key': 'sasType', 'type': 'str'}, + 'validity_period': {'key': 'validityPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs) -> None: + super(SasDefinitionBundle, self).__init__(**kwargs) + self.id = None + self.secret_id = None + self.template_uri = None + self.sas_type = None + self.validity_period = None + self.attributes = None + self.tags = None + + +class DeletedSasDefinitionBundle(SasDefinitionBundle): + """A deleted SAS definition bundle consisting of its previous id, attributes + and its tags, as well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The SAS definition id. + :vartype id: str + :ivar secret_id: Storage account SAS definition secret id. + :vartype secret_id: str + :ivar template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will have + the same properties as the template. + :vartype template_uri: str + :ivar sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :vartype sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :ivar validity_period: The validity period of SAS tokens created according + to the SAS definition. + :vartype validity_period: str + :ivar attributes: The SAS definition attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted SAS definition. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the SAS definition is scheduled + to be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the SAS definition was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'template_uri': {'readonly': True}, + 'sas_type': {'readonly': True}, + 'validity_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'template_uri': {'key': 'templateUri', 'type': 'str'}, + 'sas_type': {'key': 'sasType', 'type': 'str'}, + 'validity_period': {'key': 'validityPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, recovery_id: str=None, **kwargs) -> None: + super(DeletedSasDefinitionBundle, self).__init__(**kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class SasDefinitionItem(Model): + """The SAS definition item containing storage SAS definition metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage SAS identifier. + :vartype id: str + :ivar secret_id: The storage account SAS definition secret id. + :vartype secret_id: str + :ivar attributes: The SAS definition management attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs) -> None: + super(SasDefinitionItem, self).__init__(**kwargs) + self.id = None + self.secret_id = None + self.attributes = None + self.tags = None + + +class DeletedSasDefinitionItem(SasDefinitionItem): + """The deleted SAS definition item containing metadata about the deleted SAS + definition. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage SAS identifier. + :vartype id: str + :ivar secret_id: The storage account SAS definition secret id. + :vartype secret_id: str + :ivar attributes: The SAS definition management attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted SAS definition. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the SAS definition is scheduled + to be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the SAS definition was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'secret_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'secret_id': {'key': 'sid', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, recovery_id: str=None, **kwargs) -> None: + super(DeletedSasDefinitionItem, self).__init__(**kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedSasDefinitionListResult(Model): + """The deleted SAS definition list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of the deleted SAS + definitions in the vault along with a link to the next page of deleted sas + definitions + :vartype value: list[~azure.keyvault.v7_0.models.DeletedSasDefinitionItem] + :ivar next_link: The URL to get the next set of deleted SAS definitions. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedSasDefinitionItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(DeletedSasDefinitionListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SecretBundle(Model): + """A secret consisting of a value, id and its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param value: The secret value. + :type value: str + :param id: The secret id. + :type id: str + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar kid: If this is a secret backing a KV certificate, then this field + specifies the corresponding key backing the KV certificate. + :vartype kid: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a secret backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'kid': {'readonly': True}, + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'id': {'key': 'id', 'type': 'str'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, *, value: str=None, id: str=None, content_type: str=None, attributes=None, tags=None, **kwargs) -> None: + super(SecretBundle, self).__init__(**kwargs) + self.value = value + self.id = id + self.content_type = content_type + self.attributes = attributes + self.tags = tags + self.kid = None + self.managed = None + + +class DeletedSecretBundle(SecretBundle): + """A Deleted Secret consisting of its previous id, attributes and its tags, as + well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param value: The secret value. + :type value: str + :param id: The secret id. + :type id: str + :param content_type: The content type of the secret. + :type content_type: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :ivar kid: If this is a secret backing a KV certificate, then this field + specifies the corresponding key backing the KV certificate. + :vartype kid: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a secret backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted secret. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the secret is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the secret was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'kid': {'readonly': True}, + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'id': {'key': 'id', 'type': 'str'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'kid': {'key': 'kid', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, value: str=None, id: str=None, content_type: str=None, attributes=None, tags=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedSecretBundle, self).__init__(value=value, id=id, content_type=content_type, attributes=attributes, tags=tags, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class SecretItem(Model): + """The secret item containing secret metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Secret identifier. + :type id: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a key backing a certificate, then managed will be true. + :vartype managed: bool + """ + + _validation = { + 'managed': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + } + + def __init__(self, *, id: str=None, attributes=None, tags=None, content_type: str=None, **kwargs) -> None: + super(SecretItem, self).__init__(**kwargs) + self.id = id + self.attributes = attributes + self.tags = tags + self.content_type = content_type + self.managed = None + + +class DeletedSecretItem(SecretItem): + """The deleted secret item containing metadata about the deleted secret. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param id: Secret identifier. + :type id: str + :param attributes: The secret management attributes. + :type attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :ivar managed: True if the secret's lifetime is managed by key vault. If + this is a key backing a certificate, then managed will be true. + :vartype managed: bool + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted secret. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the secret is scheduled to be + purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the secret was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'managed': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'managed': {'key': 'managed', 'type': 'bool'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, id: str=None, attributes=None, tags=None, content_type: str=None, recovery_id: str=None, **kwargs) -> None: + super(DeletedSecretItem, self).__init__(id=id, attributes=attributes, tags=tags, content_type=content_type, **kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedSecretListResult(Model): + """The deleted secret list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of the deleted secrets + in the vault along with a link to the next page of deleted secrets + :vartype value: list[~azure.keyvault.v7_0.models.DeletedSecretItem] + :ivar next_link: The URL to get the next set of deleted secrets. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedSecretItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(DeletedSecretListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class StorageAccountItem(Model): + """The storage account item containing storage account metadata. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Storage identifier. + :vartype id: str + :ivar resource_id: Storage account resource Id. + :vartype resource_id: str + :ivar attributes: The storage account management attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs) -> None: + super(StorageAccountItem, self).__init__(**kwargs) + self.id = None + self.resource_id = None + self.attributes = None + self.tags = None + + +class DeletedStorageAccountItem(StorageAccountItem): + """The deleted storage account item containing metadata about the deleted + storage account. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Storage identifier. + :vartype id: str + :ivar resource_id: Storage account resource Id. + :vartype resource_id: str + :ivar attributes: The storage account management attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs. + :vartype tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted storage account. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the storage account is scheduled + to be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the storage account was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, recovery_id: str=None, **kwargs) -> None: + super(DeletedStorageAccountItem, self).__init__(**kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class StorageBundle(Model): + """A Storage account bundle consists of key vault storage account details plus + its attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage account id. + :vartype id: str + :ivar resource_id: The storage account resource id. + :vartype resource_id: str + :ivar active_key_name: The current active storage account key name. + :vartype active_key_name: str + :ivar auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :vartype auto_regenerate_key: bool + :ivar regeneration_period: The key regeneration time duration specified in + ISO-8601 format. + :vartype regeneration_period: str + :ivar attributes: The storage account attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'active_key_name': {'readonly': True}, + 'auto_regenerate_key': {'readonly': True}, + 'regeneration_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, **kwargs) -> None: + super(StorageBundle, self).__init__(**kwargs) + self.id = None + self.resource_id = None + self.active_key_name = None + self.auto_regenerate_key = None + self.regeneration_period = None + self.attributes = None + self.tags = None + + +class DeletedStorageBundle(StorageBundle): + """A deleted storage account bundle consisting of its previous id, attributes + and its tags, as well as information on when it will be purged. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: The storage account id. + :vartype id: str + :ivar resource_id: The storage account resource id. + :vartype resource_id: str + :ivar active_key_name: The current active storage account key name. + :vartype active_key_name: str + :ivar auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :vartype auto_regenerate_key: bool + :ivar regeneration_period: The key regeneration time duration specified in + ISO-8601 format. + :vartype regeneration_period: str + :ivar attributes: The storage account attributes. + :vartype attributes: ~azure.keyvault.v7_0.models.StorageAccountAttributes + :ivar tags: Application specific metadata in the form of key-value pairs + :vartype tags: dict[str, str] + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted storage account. + :type recovery_id: str + :ivar scheduled_purge_date: The time when the storage account is scheduled + to be purged, in UTC + :vartype scheduled_purge_date: datetime + :ivar deleted_date: The time when the storage account was deleted, in UTC + :vartype deleted_date: datetime + """ + + _validation = { + 'id': {'readonly': True}, + 'resource_id': {'readonly': True}, + 'active_key_name': {'readonly': True}, + 'auto_regenerate_key': {'readonly': True}, + 'regeneration_period': {'readonly': True}, + 'attributes': {'readonly': True}, + 'tags': {'readonly': True}, + 'scheduled_purge_date': {'readonly': True}, + 'deleted_date': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'recovery_id': {'key': 'recoveryId', 'type': 'str'}, + 'scheduled_purge_date': {'key': 'scheduledPurgeDate', 'type': 'unix-time'}, + 'deleted_date': {'key': 'deletedDate', 'type': 'unix-time'}, + } + + def __init__(self, *, recovery_id: str=None, **kwargs) -> None: + super(DeletedStorageBundle, self).__init__(**kwargs) + self.recovery_id = recovery_id + self.scheduled_purge_date = None + self.deleted_date = None + + +class DeletedStorageListResult(Model): + """The deleted storage account list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of the deleted storage + accounts in the vault along with a link to the next page of deleted + storage accounts + :vartype value: + list[~azure.keyvault.v7_0.models.DeletedStorageAccountItem] + :ivar next_link: The URL to get the next set of deleted storage accounts. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[DeletedStorageAccountItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(DeletedStorageListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class Error(Model): + """The key vault server error. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar code: The error code. + :vartype code: str + :ivar message: The error message. + :vartype message: str + :ivar inner_error: + :vartype inner_error: ~azure.keyvault.v7_0.models.Error + """ + + _validation = { + 'code': {'readonly': True}, + 'message': {'readonly': True}, + 'inner_error': {'readonly': True}, + } + + _attribute_map = { + 'code': {'key': 'code', 'type': 'str'}, + 'message': {'key': 'message', 'type': 'str'}, + 'inner_error': {'key': 'innererror', 'type': 'Error'}, + } + + def __init__(self, **kwargs) -> None: + super(Error, self).__init__(**kwargs) + self.code = None + self.message = None + self.inner_error = None + + +class IssuerAttributes(Model): + """The attributes of an issuer managed by the Key Vault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the issuer is enabled. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + } + + def __init__(self, *, enabled: bool=None, **kwargs) -> None: + super(IssuerAttributes, self).__init__(**kwargs) + self.enabled = enabled + self.created = None + self.updated = None + + +class IssuerBundle(Model): + """The issuer for Key Vault certificate. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar id: Identifier for the issuer object. + :vartype id: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided to + the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + """ + + _validation = { + 'id': {'readonly': True}, + } + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'provider': {'key': 'provider', 'type': 'str'}, + 'credentials': {'key': 'credentials', 'type': 'IssuerCredentials'}, + 'organization_details': {'key': 'org_details', 'type': 'OrganizationDetails'}, + 'attributes': {'key': 'attributes', 'type': 'IssuerAttributes'}, + } + + def __init__(self, *, provider: str=None, credentials=None, organization_details=None, attributes=None, **kwargs) -> None: + super(IssuerBundle, self).__init__(**kwargs) + self.id = None + self.provider = provider + self.credentials = credentials + self.organization_details = organization_details + self.attributes = attributes + + +class IssuerCredentials(Model): + """The credentials to be used for the certificate issuer. + + :param account_id: The user name/account name/account id. + :type account_id: str + :param password: The password/secret/account key. + :type password: str + """ + + _attribute_map = { + 'account_id': {'key': 'account_id', 'type': 'str'}, + 'password': {'key': 'pwd', 'type': 'str'}, + } + + def __init__(self, *, account_id: str=None, password: str=None, **kwargs) -> None: + super(IssuerCredentials, self).__init__(**kwargs) + self.account_id = account_id + self.password = password + + +class IssuerParameters(Model): + """Parameters for the issuer of the X509 component of a certificate. + + :param name: Name of the referenced issuer object or reserved names; for + example, 'Self' or 'Unknown'. + :type name: str + :param certificate_type: Type of certificate to be requested from the + issuer provider. + :type certificate_type: str + :param certificate_transparency: Indicates if the certificates generated + under this policy should be published to certificate transparency logs. + :type certificate_transparency: bool + """ + + _attribute_map = { + 'name': {'key': 'name', 'type': 'str'}, + 'certificate_type': {'key': 'cty', 'type': 'str'}, + 'certificate_transparency': {'key': 'cert_transparency', 'type': 'bool'}, + } + + def __init__(self, *, name: str=None, certificate_type: str=None, certificate_transparency: bool=None, **kwargs) -> None: + super(IssuerParameters, self).__init__(**kwargs) + self.name = name + self.certificate_type = certificate_type + self.certificate_transparency = certificate_transparency + + +class JsonWebKey(Model): + """As of http://tools.ietf.org/html/draft-ietf-jose-json-web-key-18. + + :param kid: Key identifier. + :type kid: str + :param kty: JsonWebKey Key Type (kty), as defined in + https://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms-40. + Possible values include: 'EC', 'EC-HSM', 'RSA', 'RSA-HSM', 'oct' + :type kty: str or ~azure.keyvault.v7_0.models.JsonWebKeyType + :param key_ops: + :type key_ops: list[str] + :param n: RSA modulus. + :type n: bytes + :param e: RSA public exponent. + :type e: bytes + :param d: RSA private exponent, or the D component of an EC private key. + :type d: bytes + :param dp: RSA private key parameter. + :type dp: bytes + :param dq: RSA private key parameter. + :type dq: bytes + :param qi: RSA private key parameter. + :type qi: bytes + :param p: RSA secret prime. + :type p: bytes + :param q: RSA secret prime, with p < q. + :type q: bytes + :param k: Symmetric key. + :type k: bytes + :param t: HSM Token, used with 'Bring Your Own Key'. + :type t: bytes + :param crv: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'P-256K' + :type crv: str or ~azure.keyvault.v7_0.models.JsonWebKeyCurveName + :param x: X component of an EC public key. + :type x: bytes + :param y: Y component of an EC public key. + :type y: bytes + """ + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'kty': {'key': 'kty', 'type': 'str'}, + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'n': {'key': 'n', 'type': 'base64'}, + 'e': {'key': 'e', 'type': 'base64'}, + 'd': {'key': 'd', 'type': 'base64'}, + 'dp': {'key': 'dp', 'type': 'base64'}, + 'dq': {'key': 'dq', 'type': 'base64'}, + 'qi': {'key': 'qi', 'type': 'base64'}, + 'p': {'key': 'p', 'type': 'base64'}, + 'q': {'key': 'q', 'type': 'base64'}, + 'k': {'key': 'k', 'type': 'base64'}, + 't': {'key': 'key_hsm', 'type': 'base64'}, + 'crv': {'key': 'crv', 'type': 'str'}, + 'x': {'key': 'x', 'type': 'base64'}, + 'y': {'key': 'y', 'type': 'base64'}, + } + + def __init__(self, *, kid: str=None, kty=None, key_ops=None, n: bytes=None, e: bytes=None, d: bytes=None, dp: bytes=None, dq: bytes=None, qi: bytes=None, p: bytes=None, q: bytes=None, k: bytes=None, t: bytes=None, crv=None, x: bytes=None, y: bytes=None, **kwargs) -> None: + super(JsonWebKey, self).__init__(**kwargs) + self.kid = kid + self.kty = kty + self.key_ops = key_ops + self.n = n + self.e = e + self.d = d + self.dp = dp + self.dq = dq + self.qi = qi + self.p = p + self.q = q + self.k = k + self.t = t + self.crv = crv + self.x = x + self.y = y + + +class KeyAttributes(Attributes): + """The attributes of a key managed by the key vault service. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for keys in the current vault. If it contains 'Purgeable' the key + can be permanently deleted by a privileged user; otherwise, only the + system can purge the key, at the end of the retention interval. Possible + values include: 'Purgeable', 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, *, enabled: bool=None, not_before=None, expires=None, **kwargs) -> None: + super(KeyAttributes, self).__init__(enabled=enabled, not_before=not_before, expires=expires, **kwargs) + self.recovery_level = None + + +class KeyCreateParameters(Model): + """The key create parameters. + + All required parameters must be populated in order to send to Azure. + + :param kty: Required. The type of key to create. For valid values, see + JsonWebKeyType. Possible values include: 'EC', 'EC-HSM', 'RSA', 'RSA-HSM', + 'oct' + :type kty: str or ~azure.keyvault.v7_0.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or 4096 + for RSA. + :type key_size: int + :param key_ops: + :type key_ops: list[str or + ~azure.keyvault.v7_0.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'P-256K' + :type curve: str or ~azure.keyvault.v7_0.models.JsonWebKeyCurveName + """ + + _validation = { + 'kty': {'required': True, 'min_length': 1}, + } + + _attribute_map = { + 'kty': {'key': 'kty', 'type': 'str'}, + 'key_size': {'key': 'key_size', 'type': 'int'}, + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'curve': {'key': 'crv', 'type': 'str'}, + } + + def __init__(self, *, kty, key_size: int=None, key_ops=None, key_attributes=None, tags=None, curve=None, **kwargs) -> None: + super(KeyCreateParameters, self).__init__(**kwargs) + self.kty = kty + self.key_size = key_size + self.key_ops = key_ops + self.key_attributes = key_attributes + self.tags = tags + self.curve = curve + + +class KeyImportParameters(Model): + """The key import parameters. + + All required parameters must be populated in order to send to Azure. + + :param hsm: Whether to import as a hardware key (HSM) or software key. + :type hsm: bool + :param key: Required. The Json web key + :type key: ~azure.keyvault.v7_0.models.JsonWebKey + :param key_attributes: The key management attributes. + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'key': {'required': True}, + } + + _attribute_map = { + 'hsm': {'key': 'Hsm', 'type': 'bool'}, + 'key': {'key': 'key', 'type': 'JsonWebKey'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, key, hsm: bool=None, key_attributes=None, tags=None, **kwargs) -> None: + super(KeyImportParameters, self).__init__(**kwargs) + self.hsm = hsm + self.key = key + self.key_attributes = key_attributes + self.tags = tags + + +class KeyListResult(Model): + """The key list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of keys in the key vault + along with a link to the next page of keys. + :vartype value: list[~azure.keyvault.v7_0.models.KeyItem] + :ivar next_link: The URL to get the next set of keys. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[KeyItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(KeyListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class KeyOperationResult(Model): + """The key operation result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar kid: Key identifier + :vartype kid: str + :ivar result: + :vartype result: bytes + """ + + _validation = { + 'kid': {'readonly': True}, + 'result': {'readonly': True}, + } + + _attribute_map = { + 'kid': {'key': 'kid', 'type': 'str'}, + 'result': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, **kwargs) -> None: + super(KeyOperationResult, self).__init__(**kwargs) + self.kid = None + self.result = None + + +class KeyOperationsParameters(Model): + """The key operations parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: Required. + :type value: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'value': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, algorithm, value: bytes, **kwargs) -> None: + super(KeyOperationsParameters, self).__init__(**kwargs) + self.algorithm = algorithm + self.value = value + + +class KeyProperties(Model): + """Properties of the key pair backing a certificate. + + :param exportable: Indicates if the private key can be exported. + :type exportable: bool + :param key_type: The type of key pair to be used for the certificate. + Possible values include: 'EC', 'EC-HSM', 'RSA', 'RSA-HSM', 'oct' + :type key_type: str or ~azure.keyvault.v7_0.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or 4096 + for RSA. + :type key_size: int + :param reuse_key: Indicates if the same key pair will be used on + certificate renewal. + :type reuse_key: bool + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', 'P-521', + 'P-256K' + :type curve: str or ~azure.keyvault.v7_0.models.JsonWebKeyCurveName + """ + + _attribute_map = { + 'exportable': {'key': 'exportable', 'type': 'bool'}, + 'key_type': {'key': 'kty', 'type': 'str'}, + 'key_size': {'key': 'key_size', 'type': 'int'}, + 'reuse_key': {'key': 'reuse_key', 'type': 'bool'}, + 'curve': {'key': 'crv', 'type': 'str'}, + } + + def __init__(self, *, exportable: bool=None, key_type=None, key_size: int=None, reuse_key: bool=None, curve=None, **kwargs) -> None: + super(KeyProperties, self).__init__(**kwargs) + self.exportable = exportable + self.key_type = key_type + self.key_size = key_size + self.reuse_key = reuse_key + self.curve = curve + + +class KeyRestoreParameters(Model): + """The key restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param key_bundle_backup: Required. The backup blob associated with a key + bundle. + :type key_bundle_backup: bytes + """ + + _validation = { + 'key_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'key_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, key_bundle_backup: bytes, **kwargs) -> None: + super(KeyRestoreParameters, self).__init__(**kwargs) + self.key_bundle_backup = key_bundle_backup + + +class KeySignParameters(Model): + """The key operations parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. The signing/verification algorithm identifier. + For more information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', 'PS384', + 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', 'ES384', 'ES512', + 'ES256K' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeySignatureAlgorithm + :param value: Required. + :type value: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'value': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'value': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, algorithm, value: bytes, **kwargs) -> None: + super(KeySignParameters, self).__init__(**kwargs) + self.algorithm = algorithm + self.value = value + + +class KeyUpdateParameters(Model): + """The key update parameters. + + :param key_ops: Json web key operations. For more information on possible + key operations, see JsonWebKeyOperation. + :type key_ops: list[str or + ~azure.keyvault.v7_0.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'key_ops': {'key': 'key_ops', 'type': '[str]'}, + 'key_attributes': {'key': 'attributes', 'type': 'KeyAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, key_ops=None, key_attributes=None, tags=None, **kwargs) -> None: + super(KeyUpdateParameters, self).__init__(**kwargs) + self.key_ops = key_ops + self.key_attributes = key_attributes + self.tags = tags + + +class KeyVaultError(Model): + """The key vault error exception. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar error: + :vartype error: ~azure.keyvault.v7_0.models.Error + """ + + _validation = { + 'error': {'readonly': True}, + } + + _attribute_map = { + 'error': {'key': 'error', 'type': 'Error'}, + } + + def __init__(self, **kwargs) -> None: + super(KeyVaultError, self).__init__(**kwargs) + self.error = None + + +class KeyVaultErrorException(HttpResponseError): + """Server responsed with exception of type: 'KeyVaultError'. + + :param deserialize: A deserializer + :param response: Server response to be deserialized. + """ + + def __init__(self, response, deserialize, *args): + + model_name = 'KeyVaultError' + self.error = deserialize(model_name, response) + if self.error is None: + self.error = deserialize.dependencies[model_name]() + super(KeyVaultErrorException, self).__init__(response=response) + + +class KeyVerifyParameters(Model): + """The key verify parameters. + + All required parameters must be populated in order to send to Azure. + + :param algorithm: Required. The signing/verification algorithm. For more + information on possible algorithm types, see JsonWebKeySignatureAlgorithm. + Possible values include: 'PS256', 'PS384', 'PS512', 'RS256', 'RS384', + 'RS512', 'RSNULL', 'ES256', 'ES384', 'ES512', 'ES256K' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeySignatureAlgorithm + :param digest: Required. The digest used for signing. + :type digest: bytes + :param signature: Required. The signature to be verified. + :type signature: bytes + """ + + _validation = { + 'algorithm': {'required': True, 'min_length': 1}, + 'digest': {'required': True}, + 'signature': {'required': True}, + } + + _attribute_map = { + 'algorithm': {'key': 'alg', 'type': 'str'}, + 'digest': {'key': 'digest', 'type': 'base64'}, + 'signature': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, algorithm, digest: bytes, signature: bytes, **kwargs) -> None: + super(KeyVerifyParameters, self).__init__(**kwargs) + self.algorithm = algorithm + self.digest = digest + self.signature = signature + + +class KeyVerifyResult(Model): + """The key verify result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: True if the signature is verified, otherwise false. + :vartype value: bool + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'bool'}, + } + + def __init__(self, **kwargs) -> None: + super(KeyVerifyResult, self).__init__(**kwargs) + self.value = None + + +class LifetimeAction(Model): + """Action and its trigger that will be performed by Key Vault over the + lifetime of a certificate. + + :param trigger: The condition that will execute the action. + :type trigger: ~azure.keyvault.v7_0.models.Trigger + :param action: The action that will be executed. + :type action: ~azure.keyvault.v7_0.models.Action + """ + + _attribute_map = { + 'trigger': {'key': 'trigger', 'type': 'Trigger'}, + 'action': {'key': 'action', 'type': 'Action'}, + } + + def __init__(self, *, trigger=None, action=None, **kwargs) -> None: + super(LifetimeAction, self).__init__(**kwargs) + self.trigger = trigger + self.action = action + + +class OrganizationDetails(Model): + """Details of the organization of the certificate issuer. + + :param id: Id of the organization. + :type id: str + :param admin_details: Details of the organization administrator. + :type admin_details: + list[~azure.keyvault.v7_0.models.AdministratorDetails] + """ + + _attribute_map = { + 'id': {'key': 'id', 'type': 'str'}, + 'admin_details': {'key': 'admin_details', 'type': '[AdministratorDetails]'}, + } + + def __init__(self, *, id: str=None, admin_details=None, **kwargs) -> None: + super(OrganizationDetails, self).__init__(**kwargs) + self.id = id + self.admin_details = admin_details + + +class PendingCertificateSigningRequestResult(Model): + """The pending certificate signing request result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: The pending certificate signing request as Base64 encoded + string. + :vartype value: str + """ + + _validation = { + 'value': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(PendingCertificateSigningRequestResult, self).__init__(**kwargs) + self.value = None + + +class SasDefinitionAttributes(Model): + """The SAS definition management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: the enabled state of the object. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for SAS definitions in the current vault. If it contains + 'Purgeable' the SAS definition can be permanently deleted by a privileged + user; otherwise, only the system can purge the SAS definition, at the end + of the retention interval. Possible values include: 'Purgeable', + 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, *, enabled: bool=None, **kwargs) -> None: + super(SasDefinitionAttributes, self).__init__(**kwargs) + self.enabled = enabled + self.created = None + self.updated = None + self.recovery_level = None + + +class SasDefinitionCreateParameters(Model): + """The SAS definition create parameters. + + All required parameters must be populated in order to send to Azure. + + :param template_uri: Required. The SAS definition token template signed + with an arbitrary key. Tokens created according to the SAS definition + will have the same properties as the template. + :type template_uri: str + :param sas_type: Required. The type of SAS token the SAS definition will + create. Possible values include: 'account', 'service' + :type sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :param validity_period: Required. The validity period of SAS tokens + created according to the SAS definition. + :type validity_period: str + :param sas_definition_attributes: The attributes of the SAS definition. + :type sas_definition_attributes: + ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'template_uri': {'required': True}, + 'sas_type': {'required': True}, + 'validity_period': {'required': True}, + } + + _attribute_map = { + 'template_uri': {'key': 'templateUri', 'type': 'str'}, + 'sas_type': {'key': 'sasType', 'type': 'str'}, + 'validity_period': {'key': 'validityPeriod', 'type': 'str'}, + 'sas_definition_attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, template_uri: str, sas_type, validity_period: str, sas_definition_attributes=None, tags=None, **kwargs) -> None: + super(SasDefinitionCreateParameters, self).__init__(**kwargs) + self.template_uri = template_uri + self.sas_type = sas_type + self.validity_period = validity_period + self.sas_definition_attributes = sas_definition_attributes + self.tags = tags + + +class SasDefinitionListResult(Model): + """The storage account SAS definition list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of SAS definitions along + with a link to the next page of SAS definitions. + :vartype value: list[~azure.keyvault.v7_0.models.SasDefinitionItem] + :ivar next_link: The URL to get the next set of SAS definitions. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[SasDefinitionItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(SasDefinitionListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SasDefinitionUpdateParameters(Model): + """The SAS definition update parameters. + + :param template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will have + the same properties as the template. + :type template_uri: str + :param sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :type sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :param validity_period: The validity period of SAS tokens created + according to the SAS definition. + :type validity_period: str + :param sas_definition_attributes: The attributes of the SAS definition. + :type sas_definition_attributes: + ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'template_uri': {'key': 'templateUri', 'type': 'str'}, + 'sas_type': {'key': 'sasType', 'type': 'str'}, + 'validity_period': {'key': 'validityPeriod', 'type': 'str'}, + 'sas_definition_attributes': {'key': 'attributes', 'type': 'SasDefinitionAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, template_uri: str=None, sas_type=None, validity_period: str=None, sas_definition_attributes=None, tags=None, **kwargs) -> None: + super(SasDefinitionUpdateParameters, self).__init__(**kwargs) + self.template_uri = template_uri + self.sas_type = sas_type + self.validity_period = validity_period + self.sas_definition_attributes = sas_definition_attributes + self.tags = tags + + +class SecretAttributes(Attributes): + """The secret management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param not_before: Not before date in UTC. + :type not_before: datetime + :param expires: Expiry date in UTC. + :type expires: datetime + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for secrets in the current vault. If it contains 'Purgeable', the + secret can be permanently deleted by a privileged user; otherwise, only + the system can purge the secret, at the end of the retention interval. + Possible values include: 'Purgeable', 'Recoverable+Purgeable', + 'Recoverable', 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'not_before': {'key': 'nbf', 'type': 'unix-time'}, + 'expires': {'key': 'exp', 'type': 'unix-time'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, *, enabled: bool=None, not_before=None, expires=None, **kwargs) -> None: + super(SecretAttributes, self).__init__(enabled=enabled, not_before=not_before, expires=expires, **kwargs) + self.recovery_level = None + + +class SecretListResult(Model): + """The secret list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of secrets in the key + vault along with a link to the next page of secrets. + :vartype value: list[~azure.keyvault.v7_0.models.SecretItem] + :ivar next_link: The URL to get the next set of secrets. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[SecretItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(SecretListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class SecretProperties(Model): + """Properties of the key backing a certificate. + + :param content_type: The media type (MIME type). + :type content_type: str + """ + + _attribute_map = { + 'content_type': {'key': 'contentType', 'type': 'str'}, + } + + def __init__(self, *, content_type: str=None, **kwargs) -> None: + super(SecretProperties, self).__init__(**kwargs) + self.content_type = content_type + + +class SecretRestoreParameters(Model): + """The secret restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param secret_bundle_backup: Required. The backup blob associated with a + secret bundle. + :type secret_bundle_backup: bytes + """ + + _validation = { + 'secret_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'secret_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, secret_bundle_backup: bytes, **kwargs) -> None: + super(SecretRestoreParameters, self).__init__(**kwargs) + self.secret_bundle_backup = secret_bundle_backup + + +class SecretSetParameters(Model): + """The secret set parameters. + + All required parameters must be populated in order to send to Azure. + + :param value: Required. The value of the secret. + :type value: str + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: ~azure.keyvault.v7_0.models.SecretAttributes + """ + + _validation = { + 'value': {'required': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': 'str'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'secret_attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + } + + def __init__(self, *, value: str, tags=None, content_type: str=None, secret_attributes=None, **kwargs) -> None: + super(SecretSetParameters, self).__init__(**kwargs) + self.value = value + self.tags = tags + self.content_type = content_type + self.secret_attributes = secret_attributes + + +class SecretUpdateParameters(Model): + """The secret update parameters. + + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'content_type': {'key': 'contentType', 'type': 'str'}, + 'secret_attributes': {'key': 'attributes', 'type': 'SecretAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, content_type: str=None, secret_attributes=None, tags=None, **kwargs) -> None: + super(SecretUpdateParameters, self).__init__(**kwargs) + self.content_type = content_type + self.secret_attributes = secret_attributes + self.tags = tags + + +class StorageAccountAttributes(Model): + """The storage account management attributes. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :param enabled: the enabled state of the object. + :type enabled: bool + :ivar created: Creation time in UTC. + :vartype created: datetime + :ivar updated: Last updated time in UTC. + :vartype updated: datetime + :ivar recovery_level: Reflects the deletion recovery level currently in + effect for storage accounts in the current vault. If it contains + 'Purgeable' the storage account can be permanently deleted by a privileged + user; otherwise, only the system can purge the storage account, at the end + of the retention interval. Possible values include: 'Purgeable', + 'Recoverable+Purgeable', 'Recoverable', + 'Recoverable+ProtectedSubscription' + :vartype recovery_level: str or + ~azure.keyvault.v7_0.models.DeletionRecoveryLevel + """ + + _validation = { + 'created': {'readonly': True}, + 'updated': {'readonly': True}, + 'recovery_level': {'readonly': True}, + } + + _attribute_map = { + 'enabled': {'key': 'enabled', 'type': 'bool'}, + 'created': {'key': 'created', 'type': 'unix-time'}, + 'updated': {'key': 'updated', 'type': 'unix-time'}, + 'recovery_level': {'key': 'recoveryLevel', 'type': 'str'}, + } + + def __init__(self, *, enabled: bool=None, **kwargs) -> None: + super(StorageAccountAttributes, self).__init__(**kwargs) + self.enabled = enabled + self.created = None + self.updated = None + self.recovery_level = None + + +class StorageAccountCreateParameters(Model): + """The storage account create parameters. + + All required parameters must be populated in order to send to Azure. + + :param resource_id: Required. Storage account resource id. + :type resource_id: str + :param active_key_name: Required. Current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: Required. whether keyvault should manage the + storage account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration specified + in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage account. + :type storage_account_attributes: + ~azure.keyvault.v7_0.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _validation = { + 'resource_id': {'required': True}, + 'active_key_name': {'required': True}, + 'auto_regenerate_key': {'required': True}, + } + + _attribute_map = { + 'resource_id': {'key': 'resourceId', 'type': 'str'}, + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'storage_account_attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, resource_id: str, active_key_name: str, auto_regenerate_key: bool, regeneration_period: str=None, storage_account_attributes=None, tags=None, **kwargs) -> None: + super(StorageAccountCreateParameters, self).__init__(**kwargs) + self.resource_id = resource_id + self.active_key_name = active_key_name + self.auto_regenerate_key = auto_regenerate_key + self.regeneration_period = regeneration_period + self.storage_account_attributes = storage_account_attributes + self.tags = tags + + +class StorageAccountRegenerteKeyParameters(Model): + """The storage account key regenerate parameters. + + All required parameters must be populated in order to send to Azure. + + :param key_name: Required. The storage account key name. + :type key_name: str + """ + + _validation = { + 'key_name': {'required': True}, + } + + _attribute_map = { + 'key_name': {'key': 'keyName', 'type': 'str'}, + } + + def __init__(self, *, key_name: str, **kwargs) -> None: + super(StorageAccountRegenerteKeyParameters, self).__init__(**kwargs) + self.key_name = key_name + + +class StorageAccountUpdateParameters(Model): + """The storage account update parameters. + + :param active_key_name: The current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration specified + in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage account. + :type storage_account_attributes: + ~azure.keyvault.v7_0.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + """ + + _attribute_map = { + 'active_key_name': {'key': 'activeKeyName', 'type': 'str'}, + 'auto_regenerate_key': {'key': 'autoRegenerateKey', 'type': 'bool'}, + 'regeneration_period': {'key': 'regenerationPeriod', 'type': 'str'}, + 'storage_account_attributes': {'key': 'attributes', 'type': 'StorageAccountAttributes'}, + 'tags': {'key': 'tags', 'type': '{str}'}, + } + + def __init__(self, *, active_key_name: str=None, auto_regenerate_key: bool=None, regeneration_period: str=None, storage_account_attributes=None, tags=None, **kwargs) -> None: + super(StorageAccountUpdateParameters, self).__init__(**kwargs) + self.active_key_name = active_key_name + self.auto_regenerate_key = auto_regenerate_key + self.regeneration_period = regeneration_period + self.storage_account_attributes = storage_account_attributes + self.tags = tags + + +class StorageListResult(Model): + """The storage accounts list result. + + Variables are only populated by the server, and will be ignored when + sending a request. + + :ivar value: A response message containing a list of storage accounts in + the key vault along with a link to the next page of storage accounts. + :vartype value: list[~azure.keyvault.v7_0.models.StorageAccountItem] + :ivar next_link: The URL to get the next set of storage accounts. + :vartype next_link: str + """ + + _validation = { + 'value': {'readonly': True}, + 'next_link': {'readonly': True}, + } + + _attribute_map = { + 'value': {'key': 'value', 'type': '[StorageAccountItem]'}, + 'next_link': {'key': 'nextLink', 'type': 'str'}, + } + + def __init__(self, **kwargs) -> None: + super(StorageListResult, self).__init__(**kwargs) + self.value = None + self.next_link = None + + +class StorageRestoreParameters(Model): + """The secret restore parameters. + + All required parameters must be populated in order to send to Azure. + + :param storage_bundle_backup: Required. The backup blob associated with a + storage account. + :type storage_bundle_backup: bytes + """ + + _validation = { + 'storage_bundle_backup': {'required': True}, + } + + _attribute_map = { + 'storage_bundle_backup': {'key': 'value', 'type': 'base64'}, + } + + def __init__(self, *, storage_bundle_backup: bytes, **kwargs) -> None: + super(StorageRestoreParameters, self).__init__(**kwargs) + self.storage_bundle_backup = storage_bundle_backup + + +class SubjectAlternativeNames(Model): + """The subject alternate names of a X509 object. + + :param emails: Email addresses. + :type emails: list[str] + :param dns_names: Domain names. + :type dns_names: list[str] + :param upns: User principal names. + :type upns: list[str] + """ + + _attribute_map = { + 'emails': {'key': 'emails', 'type': '[str]'}, + 'dns_names': {'key': 'dns_names', 'type': '[str]'}, + 'upns': {'key': 'upns', 'type': '[str]'}, + } + + def __init__(self, *, emails=None, dns_names=None, upns=None, **kwargs) -> None: + super(SubjectAlternativeNames, self).__init__(**kwargs) + self.emails = emails + self.dns_names = dns_names + self.upns = upns + + +class Trigger(Model): + """A condition to be satisfied for an action to be executed. + + :param lifetime_percentage: Percentage of lifetime at which to trigger. + Value should be between 1 and 99. + :type lifetime_percentage: int + :param days_before_expiry: Days before expiry to attempt renewal. Value + should be between 1 and validity_in_months multiplied by 27. If + validity_in_months is 36, then value should be between 1 and 972 (36 * + 27). + :type days_before_expiry: int + """ + + _validation = { + 'lifetime_percentage': {'maximum': 99, 'minimum': 1}, + } + + _attribute_map = { + 'lifetime_percentage': {'key': 'lifetime_percentage', 'type': 'int'}, + 'days_before_expiry': {'key': 'days_before_expiry', 'type': 'int'}, + } + + def __init__(self, *, lifetime_percentage: int=None, days_before_expiry: int=None, **kwargs) -> None: + super(Trigger, self).__init__(**kwargs) + self.lifetime_percentage = lifetime_percentage + self.days_before_expiry = days_before_expiry + + +class X509CertificateProperties(Model): + """Properties of the X509 component of a certificate. + + :param subject: The subject name. Should be a valid X509 distinguished + Name. + :type subject: str + :param ekus: The enhanced key usage. + :type ekus: list[str] + :param subject_alternative_names: The subject alternative names. + :type subject_alternative_names: + ~azure.keyvault.v7_0.models.SubjectAlternativeNames + :param key_usage: List of key usages. + :type key_usage: list[str or ~azure.keyvault.v7_0.models.KeyUsageType] + :param validity_in_months: The duration that the certificate is valid in + months. + :type validity_in_months: int + """ + + _validation = { + 'validity_in_months': {'minimum': 0}, + } + + _attribute_map = { + 'subject': {'key': 'subject', 'type': 'str'}, + 'ekus': {'key': 'ekus', 'type': '[str]'}, + 'subject_alternative_names': {'key': 'sans', 'type': 'SubjectAlternativeNames'}, + 'key_usage': {'key': 'key_usage', 'type': '[str]'}, + 'validity_in_months': {'key': 'validity_months', 'type': 'int'}, + } + + def __init__(self, *, subject: str=None, ekus=None, subject_alternative_names=None, key_usage=None, validity_in_months: int=None, **kwargs) -> None: + super(X509CertificateProperties, self).__init__(**kwargs) + self.subject = subject + self.ekus = ekus + self.subject_alternative_names = subject_alternative_names + self.key_usage = key_usage + self.validity_in_months = validity_in_months diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/operations/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/operations/__init__.py new file mode 100644 index 000000000000..603e37d3ee07 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/operations/__init__.py @@ -0,0 +1,16 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from ._key_vault_client_operations import KeyVaultClientOperationsMixin + +__all__ = [ + 'KeyVaultClientOperationsMixin', +] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/operations/_key_vault_client_operations.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/operations/_key_vault_client_operations.py new file mode 100644 index 000000000000..b9ed6e10ea21 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/operations/_key_vault_client_operations.py @@ -0,0 +1,5163 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +from azure.core.exceptions import map_error +from azure.core.paging import ItemPaged +from .. import models +import uuid + + +class KeyVaultClientOperationsMixin(object): + + def create_key(self, vault_base_url, key_name, kty, key_size=None, key_ops=None, key_attributes=None, tags=None, curve=None, cls=None, **kwargs): + """Creates a new key, stores it, then returns key parameters and + attributes to the client. + + The create key operation can be used to create any key type in Azure + Key Vault. If the named key already exists, Azure Key Vault creates a + new version of the key. It requires the keys/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name for the new key. The system will generate + the version name for the new key. + :type key_name: str + :param kty: The type of key to create. For valid values, see + JsonWebKeyType. Possible values include: 'EC', 'EC-HSM', 'RSA', + 'RSA-HSM', 'oct' + :type kty: str or ~azure.keyvault.v7_0.models.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or + 4096 for RSA. + :type key_size: int + :param key_ops: + :type key_ops: list[str or + ~azure.keyvault.v7_0.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param curve: Elliptic curve name. For valid values, see + JsonWebKeyCurveName. Possible values include: 'P-256', 'P-384', + 'P-521', 'P-256K' + :type curve: str or ~azure.keyvault.v7_0.models.JsonWebKeyCurveName + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyCreateParameters(kty=kty, key_size=key_size, key_ops=key_ops, key_attributes=key_attributes, tags=tags, curve=curve) + + # Construct URL + url = self.create_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyCreateParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + create_key.metadata = {'url': '/keys/{key-name}/create'} + + def import_key(self, vault_base_url, key_name, key, hsm=None, key_attributes=None, tags=None, cls=None, **kwargs): + """Imports an externally created key, stores it, and returns key + parameters and attributes to the client. + + The import key operation may be used to import any key type into an + Azure Key Vault. If the named key already exists, Azure Key Vault + creates a new version of the key. This operation requires the + keys/import permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: Name for the imported key. + :type key_name: str + :param key: The Json web key + :type key: ~azure.keyvault.v7_0.models.JsonWebKey + :param hsm: Whether to import as a hardware key (HSM) or software key. + :type hsm: bool + :param key_attributes: The key management attributes. + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyImportParameters(hsm=hsm, key=key, key_attributes=key_attributes, tags=tags) + + # Construct URL + url = self.import_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyImportParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + import_key.metadata = {'url': '/keys/{key-name}'} + + def delete_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Deletes a key of any type from storage in Azure Key Vault. + + The delete key operation cannot be used to remove individual versions + of a key. This operation removes the cryptographic material associated + with the key, which means the key is not usable for Sign/Verify, + Wrap/Unwrap or Encrypt/Decrypt operations. This operation requires the + keys/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key to delete. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedKeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedKeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedKeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_key.metadata = {'url': '/keys/{key-name}'} + + def update_key(self, vault_base_url, key_name, key_version, key_ops=None, key_attributes=None, tags=None, cls=None, **kwargs): + """The update key operation changes specified attributes of a stored key + and can be applied to any key type and key version stored in Azure Key + Vault. + + In order to perform this operation, the key must already exist in the + Key Vault. Note: The cryptographic material of a key itself cannot be + changed. This operation requires the keys/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of key to update. + :type key_name: str + :param key_version: The version of the key to update. + :type key_version: str + :param key_ops: Json web key operations. For more information on + possible key operations, see JsonWebKeyOperation. + :type key_ops: list[str or + ~azure.keyvault.v7_0.models.JsonWebKeyOperation] + :param key_attributes: + :type key_attributes: ~azure.keyvault.v7_0.models.KeyAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyUpdateParameters(key_ops=key_ops, key_attributes=key_attributes, tags=tags) + + # Construct URL + url = self.update_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_key.metadata = {'url': '/keys/{key-name}/{key-version}'} + + def get_key(self, vault_base_url, key_name, key_version, cls=None, **kwargs): + """Gets the public part of a stored key. + + The get key operation is applicable to all key types. If the requested + key is symmetric, then no key material is released in the response. + This operation requires the keys/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key to get. + :type key_name: str + :param key_version: Adding the version parameter retrieves a specific + version of a key. + :type key_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_key.metadata = {'url': '/keys/{key-name}/{key-version}'} + + def get_key_versions( + self, vault_base_url, key_name, maxresults=None, cls=None, **kwargs): + """Retrieves a list of individual key versions with the same key name. + + The full key identifier, attributes, and tags are provided in the + response. This operation requires the keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of KeyItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.KeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_key_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('KeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_key_versions.metadata = {'url': '/keys/{key-name}/versions'} + + def get_keys( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """List keys in the specified vault. + + Retrieves a list of the keys in the Key Vault as JSON Web Key + structures that contain the public part of a stored key. The LIST + operation is applicable to all key types, however only the base key + identifier, attributes, and tags are provided in the response. + Individual versions of a key are not listed in the response. This + operation requires the keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of KeyItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.KeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_keys.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('KeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_keys.metadata = {'url': '/keys'} + + def backup_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Requests that a backup of the specified key be downloaded to the + client. + + The Key Backup operation exports a key from Azure Key Vault in a + protected form. Note that this operation does NOT return key material + in a form that can be used outside the Azure Key Vault system, the + returned key material is either protected to a Azure Key Vault HSM or + to Azure Key Vault itself. The intent of this operation is to allow a + client to GENERATE a key in one Azure Key Vault instance, BACKUP the + key, and then RESTORE it into another Azure Key Vault instance. The + BACKUP operation may be used to export, in protected form, any key type + from Azure Key Vault. Individual versions of a key cannot be backed up. + BACKUP / RESTORE can be performed within geographical boundaries only; + meaning that a BACKUP from one geographical area cannot be restored to + another geographical area. For example, a backup from the US + geographical area cannot be restored in an EU geographical area. This + operation requires the key/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupKeyResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.BackupKeyResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupKeyResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_key.metadata = {'url': '/keys/{key-name}/backup'} + + def restore_key(self, vault_base_url, key_bundle_backup, cls=None, **kwargs): + """Restores a backed up key to a vault. + + Imports a previously backed up key into Azure Key Vault, restoring the + key, its key identifier, attributes and access control policies. The + RESTORE operation may be used to import a previously backed up key. + Individual versions of a key cannot be restored. The key is restored in + its entirety with the same key name as it had when it was backed up. If + the key name is not available in the target Key Vault, the RESTORE + operation will be rejected. While the key name is retained during + restore, the final key identifier will change if the key is restored to + a different vault. Restore will restore all versions and preserve + version identifiers. The RESTORE operation is subject to security + constraints: The target Key Vault must be owned by the same Microsoft + Azure Subscription as the source Key Vault The user must have RESTORE + permission in the target Key Vault. This operation requires the + keys/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_bundle_backup: The backup blob associated with a key + bundle. + :type key_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyRestoreParameters(key_bundle_backup=key_bundle_backup) + + # Construct URL + url = self.restore_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_key.metadata = {'url': '/keys/restore'} + + def encrypt(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Encrypts an arbitrary sequence of bytes using an encryption key that is + stored in a key vault. + + The ENCRYPT operation encrypts an arbitrary sequence of bytes using an + encryption key that is stored in Azure Key Vault. Note that the ENCRYPT + operation only supports a single block of data, the size of which is + dependent on the target key and the encryption algorithm to be used. + The ENCRYPT operation is only strictly necessary for symmetric keys + stored in Azure Key Vault since protection with an asymmetric key can + be performed using public portion of the key. This operation is + supported for asymmetric keys as a convenience for callers that have a + key-reference but do not have access to the public key material. This + operation requires the keys/encrypt permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.encrypt.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + encrypt.metadata = {'url': '/keys/{key-name}/{key-version}/encrypt'} + + def decrypt(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Decrypts a single block of encrypted data. + + The DECRYPT operation decrypts a well-formed block of ciphertext using + the target encryption key and specified algorithm. This operation is + the reverse of the ENCRYPT operation; only a single block of data may + be decrypted, the size of this block is dependent on the target key and + the algorithm to be used. The DECRYPT operation applies to asymmetric + and symmetric keys stored in Azure Key Vault since it uses the private + portion of the key. This operation requires the keys/decrypt + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.decrypt.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + decrypt.metadata = {'url': '/keys/{key-name}/{key-version}/decrypt'} + + def sign(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Creates a signature from a digest using the specified key. + + The SIGN operation is applicable to asymmetric and symmetric keys + stored in Azure Key Vault since this operation uses the private portion + of the key. This operation requires the keys/sign permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: The signing/verification algorithm identifier. For + more information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', + 'PS384', 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', + 'ES384', 'ES512', 'ES256K' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeySignatureAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeySignParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.sign.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeySignParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + sign.metadata = {'url': '/keys/{key-name}/{key-version}/sign'} + + def verify(self, vault_base_url, key_name, key_version, algorithm, digest, signature, cls=None, **kwargs): + """Verifies a signature using a specified key. + + The VERIFY operation is applicable to symmetric keys stored in Azure + Key Vault. VERIFY is not strictly necessary for asymmetric keys stored + in Azure Key Vault since signature verification can be performed using + the public portion of the key but this operation is supported as a + convenience for callers that only have a key-reference and not the + public portion of the key. This operation requires the keys/verify + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: The signing/verification algorithm. For more + information on possible algorithm types, see + JsonWebKeySignatureAlgorithm. Possible values include: 'PS256', + 'PS384', 'PS512', 'RS256', 'RS384', 'RS512', 'RSNULL', 'ES256', + 'ES384', 'ES512', 'ES256K' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeySignatureAlgorithm + :param digest: The digest used for signing. + :type digest: bytes + :param signature: The signature to be verified. + :type signature: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyVerifyResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyVerifyResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyVerifyParameters(algorithm=algorithm, digest=digest, signature=signature) + + # Construct URL + url = self.verify.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyVerifyParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyVerifyResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + verify.metadata = {'url': '/keys/{key-name}/{key-version}/verify'} + + def wrap_key(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Wraps a symmetric key using a specified key. + + The WRAP operation supports encryption of a symmetric key using a key + encryption key that has previously been stored in an Azure Key Vault. + The WRAP operation is only strictly necessary for symmetric keys stored + in Azure Key Vault since protection with an asymmetric key can be + performed using the public portion of the key. This operation is + supported for asymmetric keys as a convenience for callers that have a + key-reference but do not have access to the public key material. This + operation requires the keys/wrapKey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.wrap_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + wrap_key.metadata = {'url': '/keys/{key-name}/{key-version}/wrapkey'} + + def unwrap_key(self, vault_base_url, key_name, key_version, algorithm, value, cls=None, **kwargs): + """Unwraps a symmetric key using the specified key that was initially used + for wrapping that key. + + The UNWRAP operation supports decryption of a symmetric key using the + target key encryption key. This operation is the reverse of the WRAP + operation. The UNWRAP operation applies to asymmetric and symmetric + keys stored in Azure Key Vault since it uses the private portion of the + key. This operation requires the keys/unwrapKey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param key_version: The version of the key. + :type key_version: str + :param algorithm: algorithm identifier. Possible values include: + 'RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5' + :type algorithm: str or + ~azure.keyvault.v7_0.models.JsonWebKeyEncryptionAlgorithm + :param value: + :type value: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyOperationResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyOperationResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.KeyOperationsParameters(algorithm=algorithm, value=value) + + # Construct URL + url = self.unwrap_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str'), + 'key-version': self._serialize.url("key_version", key_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'KeyOperationsParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyOperationResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + unwrap_key.metadata = {'url': '/keys/{key-name}/{key-version}/unwrapkey'} + + def get_deleted_keys( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """Lists the deleted keys in the specified vault. + + Retrieves a list of the keys in the Key Vault as JSON Web Key + structures that contain the public part of a deleted key. This + operation includes deletion-specific information. The Get Deleted Keys + operation is applicable for vaults enabled for soft-delete. While the + operation can be invoked on any vault, it will return an error if + invoked on a non soft-delete enabled vault. This operation requires the + keys/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedKeyItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.DeletedKeyItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_keys.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('DeletedKeyListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_deleted_keys.metadata = {'url': '/deletedkeys'} + + def get_deleted_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Gets the public part of a deleted key. + + The Get Deleted Key operation is applicable for soft-delete enabled + vaults. While the operation can be invoked on any vault, it will return + an error if invoked on a non soft-delete enabled vault. This operation + requires the keys/get permission. . + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedKeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedKeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedKeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_key.metadata = {'url': '/deletedkeys/{key-name}'} + + def purge_deleted_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Permanently deletes the specified key. + + The Purge Deleted Key operation is applicable for soft-delete enabled + vaults. While the operation can be invoked on any vault, it will return + an error if invoked on a non soft-delete enabled vault. This operation + requires the keys/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the key + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_key.metadata = {'url': '/deletedkeys/{key-name}'} + + def recover_deleted_key(self, vault_base_url, key_name, cls=None, **kwargs): + """Recovers the deleted key to its latest version. + + The Recover Deleted Key operation is applicable for deleted keys in + soft-delete enabled vaults. It recovers the deleted key back to its + latest version under /keys. An attempt to recover an non-deleted key + will return an error. Consider this the inverse of the delete operation + on soft-delete enabled vaults. This operation requires the keys/recover + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param key_name: The name of the deleted key. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: KeyBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.KeyBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'key-name': self._serialize.url("key_name", key_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('KeyBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_key.metadata = {'url': '/deletedkeys/{key-name}/recover'} + + def set_secret(self, vault_base_url, secret_name, value, tags=None, content_type=None, secret_attributes=None, cls=None, **kwargs): + """Sets a secret in a specified key vault. + + The SET operation adds a secret to the Azure Key Vault. If the named + secret already exists, Azure Key Vault creates a new version of that + secret. This operation requires the secrets/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param value: The value of the secret. + :type value: str + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretSetParameters(value=value, tags=tags, content_type=content_type, secret_attributes=secret_attributes) + + # Construct URL + url = self.set_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretSetParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_secret.metadata = {'url': '/secrets/{secret-name}'} + + def delete_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Deletes a secret from a specified key vault. + + The DELETE operation applies to any secret stored in Azure Key Vault. + DELETE cannot be applied to an individual version of a secret. This + operation requires the secrets/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedSecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_secret.metadata = {'url': '/secrets/{secret-name}'} + + def update_secret(self, vault_base_url, secret_name, secret_version, content_type=None, secret_attributes=None, tags=None, cls=None, **kwargs): + """Updates the attributes associated with a specified secret in a given + key vault. + + The UPDATE operation changes specified attributes of an existing stored + secret. Attributes that are not specified in the request are left + unchanged. The value of a secret itself cannot be changed. This + operation requires the secrets/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param secret_version: The version of the secret. + :type secret_version: str + :param content_type: Type of the secret value such as a password. + :type content_type: str + :param secret_attributes: The secret management attributes. + :type secret_attributes: ~azure.keyvault.v7_0.models.SecretAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretUpdateParameters(content_type=content_type, secret_attributes=secret_attributes, tags=tags) + + # Construct URL + url = self.update_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str'), + 'secret-version': self._serialize.url("secret_version", secret_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} + + def get_secret(self, vault_base_url, secret_name, secret_version, cls=None, **kwargs): + """Get a specified secret from a given key vault. + + The GET operation is applicable to any secret stored in Azure Key + Vault. This operation requires the secrets/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param secret_version: The version of the secret. + :type secret_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str'), + 'secret-version': self._serialize.url("secret_version", secret_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} + + def get_secrets( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """List secrets in a specified key vault. + + The Get Secrets operation is applicable to the entire vault. However, + only the base secret identifier and its attributes are provided in the + response. Individual secret versions are not listed in the response. + This operation requires the secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified, the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SecretItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.SecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_secrets.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('SecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_secrets.metadata = {'url': '/secrets'} + + def get_secret_versions( + self, vault_base_url, secret_name, maxresults=None, cls=None, **kwargs): + """List all versions of the specified secret. + + The full secret identifier and attributes are provided in the response. + No values are returned for the secrets. This operations requires the + secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified, the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SecretItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.SecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_secret_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('SecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_secret_versions.metadata = {'url': '/secrets/{secret-name}/versions'} + + def get_deleted_secrets( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """Lists deleted secrets for the specified vault. + + The Get Deleted Secrets operation returns the secrets that have been + deleted for a vault enabled for soft-delete. This operation requires + the secrets/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedSecretItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.DeletedSecretItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_secrets.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('DeletedSecretListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_deleted_secrets.metadata = {'url': '/deletedsecrets'} + + def get_deleted_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Gets the specified deleted secret. + + The Get Deleted Secret operation returns the specified deleted secret + along with its attributes. This operation requires the secrets/get + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedSecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}'} + + def purge_deleted_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Permanently deletes the specified secret. + + The purge deleted secret operation removes the secret permanently, + without the possibility of recovery. This operation can only be enabled + on a soft-delete enabled vault. This operation requires the + secrets/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}'} + + def recover_deleted_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Recovers the deleted secret to the latest version. + + Recovers the deleted secret in the specified vault. This operation can + only be performed on a soft-delete enabled vault. This operation + requires the secrets/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the deleted secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_secret.metadata = {'url': '/deletedsecrets/{secret-name}/recover'} + + def backup_secret(self, vault_base_url, secret_name, cls=None, **kwargs): + """Backs up the specified secret. + + Requests that a backup of the specified secret be downloaded to the + client. All versions of the secret will be downloaded. This operation + requires the secrets/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_name: The name of the secret. + :type secret_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupSecretResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.BackupSecretResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'secret-name': self._serialize.url("secret_name", secret_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupSecretResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_secret.metadata = {'url': '/secrets/{secret-name}/backup'} + + def restore_secret(self, vault_base_url, secret_bundle_backup, cls=None, **kwargs): + """Restores a backed up secret to a vault. + + Restores a backed up secret, and all its versions, to a vault. This + operation requires the secrets/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param secret_bundle_backup: The backup blob associated with a secret + bundle. + :type secret_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: SecretBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SecretBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SecretRestoreParameters(secret_bundle_backup=secret_bundle_backup) + + # Construct URL + url = self.restore_secret.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SecretRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SecretBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_secret.metadata = {'url': '/secrets/restore'} + + def get_certificates( + self, vault_base_url, maxresults=None, include_pending=None, cls=None, **kwargs): + """List certificates in a specified key vault. + + The GetCertificates operation returns the set of certificates resources + in the specified key vault. This operation requires the + certificates/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :param include_pending: Specifies whether to include certificates + which are not completely provisioned. + :type include_pending: bool + :return: An iterator like instance of CertificateItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.CertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificates.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + if include_pending is not None: + query_parameters['includePending'] = self._serialize.query("include_pending", include_pending, 'bool') + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('CertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_certificates.metadata = {'url': '/certificates'} + + def delete_certificate(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Deletes a certificate from a specified key vault. + + Deletes all versions of a certificate object along with its associated + policy. Delete certificate cannot be used to remove individual versions + of a certificate object. This operation requires the + certificates/delete permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedCertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedCertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedCertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate.metadata = {'url': '/certificates/{certificate-name}'} + + def set_certificate_contacts(self, vault_base_url, contact_list=None, cls=None, **kwargs): + """Sets the certificate contacts for the specified key vault. + + Sets the certificate contacts for the specified key vault. This + operation requires the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param contact_list: The contact list for the vault certificates. + :type contact_list: list[~azure.keyvault.v7_0.models.Contact] + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + contacts = models.Contacts(contact_list=contact_list) + + # Construct URL + url = self.set_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(contacts, 'Contacts') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + def get_certificate_contacts(self, vault_base_url, cls=None, **kwargs): + """Lists the certificate contacts for a specified key vault. + + The GetCertificateContacts operation returns the set of certificate + contact resources in the specified key vault. This operation requires + the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + def delete_certificate_contacts(self, vault_base_url, cls=None, **kwargs): + """Deletes the certificate contacts for a specified key vault. + + Deletes the certificate contacts for a specified key vault certificate. + This operation requires the certificates/managecontacts permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: Contacts or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.Contacts + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_contacts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('Contacts', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_contacts.metadata = {'url': '/certificates/contacts'} + + def get_certificate_issuers( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """List certificate issuers for a specified key vault. + + The GetCertificateIssuers operation returns the set of certificate + issuer resources in the specified key vault. This operation requires + the certificates/manageissuers/getissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateIssuerItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.CertificateIssuerItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificate_issuers.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('CertificateIssuerListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_certificate_issuers.metadata = {'url': '/certificates/issuers'} + + def set_certificate_issuer(self, vault_base_url, issuer_name, provider, credentials=None, organization_details=None, attributes=None, cls=None, **kwargs): + """Sets the specified certificate issuer. + + The SetCertificateIssuer operation adds or updates the specified + certificate issuer. This operation requires the certificates/setissuers + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided + to the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameter = models.CertificateIssuerSetParameters(provider=provider, credentials=credentials, organization_details=organization_details, attributes=attributes) + + # Construct URL + url = self.set_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameter, 'CertificateIssuerSetParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + def update_certificate_issuer(self, vault_base_url, issuer_name, provider=None, credentials=None, organization_details=None, attributes=None, cls=None, **kwargs): + """Updates the specified certificate issuer. + + The UpdateCertificateIssuer operation performs an update on the + specified certificate issuer entity. This operation requires the + certificates/setissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param provider: The issuer provider. + :type provider: str + :param credentials: The credentials to be used for the issuer. + :type credentials: ~azure.keyvault.v7_0.models.IssuerCredentials + :param organization_details: Details of the organization as provided + to the issuer. + :type organization_details: + ~azure.keyvault.v7_0.models.OrganizationDetails + :param attributes: Attributes of the issuer object. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameter = models.CertificateIssuerUpdateParameters(provider=provider, credentials=credentials, organization_details=organization_details, attributes=attributes) + + # Construct URL + url = self.update_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameter, 'CertificateIssuerUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + def get_certificate_issuer(self, vault_base_url, issuer_name, cls=None, **kwargs): + """Lists the specified certificate issuer. + + The GetCertificateIssuer operation returns the specified certificate + issuer resources in the specified key vault. This operation requires + the certificates/manageissuers/getissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + def delete_certificate_issuer(self, vault_base_url, issuer_name, cls=None, **kwargs): + """Deletes the specified certificate issuer. + + The DeleteCertificateIssuer operation permanently removes the specified + certificate issuer from the vault. This operation requires the + certificates/manageissuers/deleteissuers permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param issuer_name: The name of the issuer. + :type issuer_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: IssuerBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.IssuerBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_issuer.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'issuer-name': self._serialize.url("issuer_name", issuer_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('IssuerBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_issuer.metadata = {'url': '/certificates/issuers/{issuer-name}'} + + def create_certificate(self, vault_base_url, certificate_name, certificate_policy=None, certificate_attributes=None, tags=None, cls=None, **kwargs): + """Creates a new certificate. + + If this is the first version, the certificate resource is created. This + operation requires the certificates/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateCreateParameters(certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.create_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateCreateParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [202]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 202: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + create_certificate.metadata = {'url': '/certificates/{certificate-name}/create'} + + def import_certificate(self, vault_base_url, certificate_name, base64_encoded_certificate, password=None, certificate_policy=None, certificate_attributes=None, tags=None, cls=None, **kwargs): + """Imports a certificate into a specified key vault. + + Imports an existing valid certificate, containing a private key, into + Azure Key Vault. The certificate to be imported can be in either PFX or + PEM format. If the certificate is in PEM format the PEM file must + contain the key as well as x509 certificates. This operation requires + the certificates/import permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param base64_encoded_certificate: Base64 encoded representation of + the certificate object to import. This certificate needs to contain + the private key. + :type base64_encoded_certificate: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateImportParameters(base64_encoded_certificate=base64_encoded_certificate, password=password, certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.import_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str', pattern=r'^[0-9a-zA-Z-]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateImportParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + import_certificate.metadata = {'url': '/certificates/{certificate-name}/import'} + + def get_certificate_versions( + self, vault_base_url, certificate_name, maxresults=None, cls=None, **kwargs): + """List the versions of a certificate. + + The GetCertificateVersions operation returns the versions of a + certificate in the specified key vault. This operation requires the + certificates/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of CertificateItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.CertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_certificate_versions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('CertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_certificate_versions.metadata = {'url': '/certificates/{certificate-name}/versions'} + + def get_certificate_policy(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Lists the policy for a certificate. + + The GetCertificatePolicy operation returns the specified certificate + policy resources in the specified key vault. This operation requires + the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in a given key + vault. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificatePolicy or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificatePolicy + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_policy.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificatePolicy', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_policy.metadata = {'url': '/certificates/{certificate-name}/policy'} + + def update_certificate_policy(self, vault_base_url, certificate_name, certificate_policy, cls=None, **kwargs): + """Updates the policy for a certificate. + + Set specified members in the certificate policy. Leave others as null. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given + vault. + :type certificate_name: str + :param certificate_policy: The policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v7_0.models.CertificatePolicy + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificatePolicy or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificatePolicy + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.update_certificate_policy.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(certificate_policy, 'CertificatePolicy') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificatePolicy', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_policy.metadata = {'url': '/certificates/{certificate-name}/policy'} + + def update_certificate(self, vault_base_url, certificate_name, certificate_version, certificate_policy=None, certificate_attributes=None, tags=None, cls=None, **kwargs): + """Updates the specified attributes associated with the given certificate. + + The UpdateCertificate operation applies the specified update on the + given certificate; the only elements updated are the certificate's + attributes. This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given key + vault. + :type certificate_name: str + :param certificate_version: The version of the certificate. + :type certificate_version: str + :param certificate_policy: The management policy for the certificate. + :type certificate_policy: + ~azure.keyvault.v7_0.models.CertificatePolicy + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateUpdateParameters(certificate_policy=certificate_policy, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.update_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str'), + 'certificate-version': self._serialize.url("certificate_version", certificate_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate.metadata = {'url': '/certificates/{certificate-name}/{certificate-version}'} + + def get_certificate(self, vault_base_url, certificate_name, certificate_version, cls=None, **kwargs): + """Gets information about a certificate. + + Gets information about a specific certificate. This operation requires + the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate in the given + vault. + :type certificate_name: str + :param certificate_version: The version of the certificate. + :type certificate_version: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str'), + 'certificate-version': self._serialize.url("certificate_version", certificate_version, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate.metadata = {'url': '/certificates/{certificate-name}/{certificate-version}'} + + def update_certificate_operation(self, vault_base_url, certificate_name, cancellation_requested, cls=None, **kwargs): + """Updates a certificate operation. + + Updates a certificate creation operation that is already in progress. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param cancellation_requested: Indicates if cancellation was requested + on the certificate operation. + :type cancellation_requested: bool + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + certificate_operation = models.CertificateOperationUpdateParameter(cancellation_requested=cancellation_requested) + + # Construct URL + url = self.update_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(certificate_operation, 'CertificateOperationUpdateParameter') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + def get_certificate_operation(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Gets the creation operation of a certificate. + + Gets the creation operation associated with a specified certificate. + This operation requires the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + def delete_certificate_operation(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Deletes the creation operation for a specific certificate. + + Deletes the creation operation for a specified certificate that is in + the process of being created. The certificate is no longer created. + This operation requires the certificates/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateOperation or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateOperation + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_certificate_operation.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateOperation', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_certificate_operation.metadata = {'url': '/certificates/{certificate-name}/pending'} + + def merge_certificate(self, vault_base_url, certificate_name, x509_certificates, certificate_attributes=None, tags=None, cls=None, **kwargs): + """Merges a certificate or a certificate chain with a key pair existing on + the server. + + The MergeCertificate operation performs the merging of a certificate or + certificate chain with a key pair currently available in the service. + This operation requires the certificates/create permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param x509_certificates: The certificate or the certificate chain to + merge. + :type x509_certificates: list[bytearray] + :param certificate_attributes: The attributes of the certificate + (optional). + :type certificate_attributes: + ~azure.keyvault.v7_0.models.CertificateAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateMergeParameters(x509_certificates=x509_certificates, certificate_attributes=certificate_attributes, tags=tags) + + # Construct URL + url = self.merge_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateMergeParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [201]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 201: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + merge_certificate.metadata = {'url': '/certificates/{certificate-name}/pending/merge'} + + def backup_certificate(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Backs up the specified certificate. + + Requests that a backup of the specified certificate be downloaded to + the client. All versions of the certificate will be downloaded. This + operation requires the certificates/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate. + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupCertificateResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.BackupCertificateResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupCertificateResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_certificate.metadata = {'url': '/certificates/{certificate-name}/backup'} + + def restore_certificate(self, vault_base_url, certificate_bundle_backup, cls=None, **kwargs): + """Restores a backed up certificate to a vault. + + Restores a backed up certificate, and all its versions, to a vault. + This operation requires the certificates/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_bundle_backup: The backup blob associated with a + certificate bundle. + :type certificate_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.CertificateRestoreParameters(certificate_bundle_backup=certificate_bundle_backup) + + # Construct URL + url = self.restore_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'CertificateRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_certificate.metadata = {'url': '/certificates/restore'} + + def get_deleted_certificates( + self, vault_base_url, maxresults=None, include_pending=None, cls=None, **kwargs): + """Lists the deleted certificates in the specified vault currently + available for recovery. + + The GetDeletedCertificates operation retrieves the certificates in the + current vault which are in a deleted state and ready for recovery or + purging. This operation includes deletion-specific information. This + operation requires the certificates/get/list permission. This operation + can only be enabled on soft-delete enabled vaults. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :param include_pending: Specifies whether to include certificates + which are not completely provisioned. + :type include_pending: bool + :return: An iterator like instance of DeletedCertificateItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.DeletedCertificateItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_certificates.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + if include_pending is not None: + query_parameters['includePending'] = self._serialize.query("include_pending", include_pending, 'bool') + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('DeletedCertificateListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_deleted_certificates.metadata = {'url': '/deletedcertificates'} + + def get_deleted_certificate(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Retrieves information about the specified deleted certificate. + + The GetDeletedCertificate operation retrieves the deleted certificate + information plus its attributes, such as retention interval, scheduled + permanent deletion and the current deletion recovery level. This + operation requires the certificates/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedCertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedCertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedCertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}'} + + def purge_deleted_certificate(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Permanently deletes the specified deleted certificate. + + The PurgeDeletedCertificate operation performs an irreversible deletion + of the specified certificate, without possibility for recovery. The + operation is not available if the recovery level does not specify + 'Purgeable'. This operation requires the certificate/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}'} + + def recover_deleted_certificate(self, vault_base_url, certificate_name, cls=None, **kwargs): + """Recovers the deleted certificate back to its current version under + /certificates. + + The RecoverDeletedCertificate operation performs the reversal of the + Delete operation. The operation is applicable in vaults enabled for + soft-delete, and must be issued during the retention interval + (available in the deleted certificate's attributes). This operation + requires the certificates/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param certificate_name: The name of the deleted certificate + :type certificate_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: CertificateBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.CertificateBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_certificate.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._serialize.url("certificate_name", certificate_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('CertificateBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_certificate.metadata = {'url': '/deletedcertificates/{certificate-name}/recover'} + + def get_storage_accounts( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """List storage accounts managed by the specified key vault. This + operation requires the storage/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of StorageAccountItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.StorageAccountItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_storage_accounts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('StorageListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_storage_accounts.metadata = {'url': '/storage'} + + def get_deleted_storage_accounts( + self, vault_base_url, maxresults=None, cls=None, **kwargs): + """Lists deleted storage accounts for the specified vault. + + The Get Deleted Storage Accounts operation returns the storage accounts + that have been deleted for a vault enabled for soft-delete. This + operation requires the storage/list permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedStorageAccountItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.DeletedStorageAccountItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_storage_accounts.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('DeletedStorageListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_deleted_storage_accounts.metadata = {'url': '/deletedstorage'} + + def get_deleted_storage_account(self, vault_base_url, storage_account_name, cls=None, **kwargs): + """Gets the specified deleted storage account. + + The Get Deleted Storage Account operation returns the specified deleted + storage account along with its attributes. This operation requires the + storage/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedStorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedStorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedStorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_storage_account.metadata = {'url': '/deletedstorage/{storage-account-name}'} + + def purge_deleted_storage_account(self, vault_base_url, storage_account_name, cls=None, **kwargs): + """Permanently deletes the specified storage account. + + The purge deleted storage account operation removes the secret + permanently, without the possibility of recovery. This operation can + only be performed on a soft-delete enabled vault. This operation + requires the storage/purge permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: None or the result of cls(response) + :rtype: None + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.purge_deleted_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [204]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + if cls: + response_headers = {} + return cls(response, None, response_headers) + purge_deleted_storage_account.metadata = {'url': '/deletedstorage/{storage-account-name}'} + + def recover_deleted_storage_account(self, vault_base_url, storage_account_name, cls=None, **kwargs): + """Recovers the deleted storage account. + + Recovers the deleted storage account in the specified vault. This + operation can only be performed on a soft-delete enabled vault. This + operation requires the storage/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_storage_account.metadata = {'url': '/deletedstorage/{storage-account-name}/recover'} + + def backup_storage_account(self, vault_base_url, storage_account_name, cls=None, **kwargs): + """Backs up the specified storage account. + + Requests that a backup of the specified storage account be downloaded + to the client. This operation requires the storage/backup permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: BackupStorageResult or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.BackupStorageResult + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.backup_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('BackupStorageResult', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + backup_storage_account.metadata = {'url': '/storage/{storage-account-name}/backup'} + + def restore_storage_account(self, vault_base_url, storage_bundle_backup, cls=None, **kwargs): + """Restores a backed up storage account to a vault. + + Restores a backed up storage account to a vault. This operation + requires the storage/restore permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_bundle_backup: The backup blob associated with a + storage account. + :type storage_bundle_backup: bytes + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageRestoreParameters(storage_bundle_backup=storage_bundle_backup) + + # Construct URL + url = self.restore_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True) + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageRestoreParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + restore_storage_account.metadata = {'url': '/storage/restore'} + + def delete_storage_account(self, vault_base_url, storage_account_name, cls=None, **kwargs): + """Deletes a storage account. This operation requires the storage/delete + permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedStorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedStorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedStorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + def get_storage_account(self, vault_base_url, storage_account_name, cls=None, **kwargs): + """Gets information about a specified storage account. This operation + requires the storage/get permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + def set_storage_account(self, vault_base_url, storage_account_name, resource_id, active_key_name, auto_regenerate_key, regeneration_period=None, storage_account_attributes=None, tags=None, cls=None, **kwargs): + """Creates or updates a new storage account. This operation requires the + storage/set permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param resource_id: Storage account resource id. + :type resource_id: str + :param active_key_name: Current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration + specified in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage + account. + :type storage_account_attributes: + ~azure.keyvault.v7_0.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountCreateParameters(resource_id=resource_id, active_key_name=active_key_name, auto_regenerate_key=auto_regenerate_key, regeneration_period=regeneration_period, storage_account_attributes=storage_account_attributes, tags=tags) + + # Construct URL + url = self.set_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountCreateParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + def update_storage_account(self, vault_base_url, storage_account_name, active_key_name=None, auto_regenerate_key=None, regeneration_period=None, storage_account_attributes=None, tags=None, cls=None, **kwargs): + """Updates the specified attributes associated with the given storage + account. This operation requires the storage/set/update permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param active_key_name: The current active storage account key name. + :type active_key_name: str + :param auto_regenerate_key: whether keyvault should manage the storage + account for the user. + :type auto_regenerate_key: bool + :param regeneration_period: The key regeneration time duration + specified in ISO-8601 format. + :type regeneration_period: str + :param storage_account_attributes: The attributes of the storage + account. + :type storage_account_attributes: + ~azure.keyvault.v7_0.models.StorageAccountAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountUpdateParameters(active_key_name=active_key_name, auto_regenerate_key=auto_regenerate_key, regeneration_period=regeneration_period, storage_account_attributes=storage_account_attributes, tags=tags) + + # Construct URL + url = self.update_storage_account.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_storage_account.metadata = {'url': '/storage/{storage-account-name}'} + + def regenerate_storage_account_key(self, vault_base_url, storage_account_name, key_name, cls=None, **kwargs): + """Regenerates the specified key value for the given storage account. This + operation requires the storage/regeneratekey permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param key_name: The storage account key name. + :type key_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: StorageBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.StorageBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.StorageAccountRegenerteKeyParameters(key_name=key_name) + + # Construct URL + url = self.regenerate_storage_account_key.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'StorageAccountRegenerteKeyParameters') + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('StorageBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + regenerate_storage_account_key.metadata = {'url': '/storage/{storage-account-name}/regeneratekey'} + + def get_sas_definitions( + self, vault_base_url, storage_account_name, maxresults=None, cls=None, **kwargs): + """List storage SAS definitions for the given storage account. This + operation requires the storage/listsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of SasDefinitionItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.SasDefinitionItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_sas_definitions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('SasDefinitionListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_sas_definitions.metadata = {'url': '/storage/{storage-account-name}/sas'} + + def get_deleted_sas_definitions( + self, vault_base_url, storage_account_name, maxresults=None, cls=None, **kwargs): + """Lists deleted SAS definitions for the specified vault and storage + account. + + The Get Deleted Sas Definitions operation returns the SAS definitions + that have been deleted for a vault enabled for soft-delete. This + operation requires the storage/listsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param maxresults: Maximum number of results to return in a page. If + not specified the service will return up to 25 results. + :type maxresults: int + :return: An iterator like instance of DeletedSasDefinitionItem + :rtype: + ~azure.core.paging.ItemPaged[~azure.keyvault.v7_0.models.DeletedSasDefinitionItem] + :raises: + :class:`KeyVaultErrorException` + """ + def prepare_request(next_link=None): + query_parameters = {} + if not next_link: + # Construct URL + url = self.get_deleted_sas_definitions.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + if maxresults is not None: + query_parameters['maxresults'] = self._serialize.query("maxresults", maxresults, 'int', maximum=25, minimum=1) + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + else: + url = next_link + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + return request + + def extract_data(response): + deserialized = self._deserialize('DeletedSasDefinitionListResult', response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) + return deserialized.next_link, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + pipeline_response = self._client._pipeline.run(request) + response = pipeline_response.http_response + + error_map = kwargs.pop('error_map', None) + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + return response + + # Deserialize response + return ItemPaged( + get_next, extract_data + ) + get_deleted_sas_definitions.metadata = {'url': '/deletedstorage/{storage-account-name}/sas'} + + def get_deleted_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, cls=None, **kwargs): + """Gets the specified deleted sas definition. + + The Get Deleted SAS Definition operation returns the specified deleted + SAS definition along with its attributes. This operation requires the + storage/getsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedSasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_deleted_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_deleted_sas_definition.metadata = {'url': '/deletedstorage/{storage-account-name}/sas/{sas-definition-name}'} + + def recover_deleted_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, cls=None, **kwargs): + """Recovers the deleted SAS definition. + + Recovers the deleted SAS definition for the specified storage account. + This operation can only be performed on a soft-delete enabled vault. + This operation requires the storage/recover permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.recover_deleted_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.post(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + recover_deleted_sas_definition.metadata = {'url': '/deletedstorage/{storage-account-name}/sas/{sas-definition-name}/recover'} + + def delete_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, cls=None, **kwargs): + """Deletes a SAS definition from a specified storage account. This + operation requires the storage/deletesas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: DeletedSasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.DeletedSasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.delete_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.delete(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('DeletedSasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + delete_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + def get_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, cls=None, **kwargs): + """Gets information about a SAS definition for the specified storage + account. This operation requires the storage/getsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + # Construct URL + url = self.get_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client.get(url, query_parameters, header_parameters) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + get_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + def set_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, template_uri, sas_type, validity_period, sas_definition_attributes=None, tags=None, cls=None, **kwargs): + """Creates or updates a new SAS definition for the specified storage + account. This operation requires the storage/setsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will + have the same properties as the template. + :type template_uri: str + :param sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :type sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :param validity_period: The validity period of SAS tokens created + according to the SAS definition. + :type validity_period: str + :param sas_definition_attributes: The attributes of the SAS + definition. + :type sas_definition_attributes: + ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SasDefinitionCreateParameters(template_uri=template_uri, sas_type=sas_type, validity_period=validity_period, sas_definition_attributes=sas_definition_attributes, tags=tags) + + # Construct URL + url = self.set_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SasDefinitionCreateParameters') + + # Construct and send request + request = self._client.put(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + set_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} + + def update_sas_definition(self, vault_base_url, storage_account_name, sas_definition_name, template_uri=None, sas_type=None, validity_period=None, sas_definition_attributes=None, tags=None, cls=None, **kwargs): + """Updates the specified attributes associated with the given SAS + definition. This operation requires the storage/setsas permission. + + :param vault_base_url: The vault name, for example + https://myvault.vault.azure.net. + :type vault_base_url: str + :param storage_account_name: The name of the storage account. + :type storage_account_name: str + :param sas_definition_name: The name of the SAS definition. + :type sas_definition_name: str + :param template_uri: The SAS definition token template signed with an + arbitrary key. Tokens created according to the SAS definition will + have the same properties as the template. + :type template_uri: str + :param sas_type: The type of SAS token the SAS definition will create. + Possible values include: 'account', 'service' + :type sas_type: str or ~azure.keyvault.v7_0.models.SasTokenType + :param validity_period: The validity period of SAS tokens created + according to the SAS definition. + :type validity_period: str + :param sas_definition_attributes: The attributes of the SAS + definition. + :type sas_definition_attributes: + ~azure.keyvault.v7_0.models.SasDefinitionAttributes + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :param callable cls: A custom type or function that will be passed the + direct response + :return: SasDefinitionBundle or the result of cls(response) + :rtype: ~azure.keyvault.v7_0.models.SasDefinitionBundle + :raises: + :class:`KeyVaultErrorException` + """ + error_map = kwargs.pop('error_map', None) + parameters = models.SasDefinitionUpdateParameters(template_uri=template_uri, sas_type=sas_type, validity_period=validity_period, sas_definition_attributes=sas_definition_attributes, tags=tags) + + # Construct URL + url = self.update_sas_definition.metadata['url'] + path_format_arguments = { + 'vaultBaseUrl': self._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'storage-account-name': self._serialize.url("storage_account_name", storage_account_name, 'str', pattern=r'^[0-9a-zA-Z]+$'), + 'sas-definition-name': self._serialize.url("sas_definition_name", sas_definition_name, 'str', pattern=r'^[0-9a-zA-Z]+$') + } + url = self._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/json' + header_parameters['Content-Type'] = 'application/json; charset=utf-8' + if self._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct body + body_content = self._serialize.body(parameters, 'SasDefinitionUpdateParameters') + + # Construct and send request + request = self._client.patch(url, query_parameters, header_parameters, body_content) + pipeline_response = self._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + raise models.KeyVaultErrorException(response, self._deserialize) + + deserialized = None + if response.status_code == 200: + deserialized = self._deserialize('SasDefinitionBundle', response) + + if cls: + return cls(response, deserialized, None) + + return deserialized + update_sas_definition.metadata = {'url': '/storage/{storage-account-name}/sas/{sas-definition-name}'} diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/version.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/version.py new file mode 100644 index 000000000000..3c10f7d869d7 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/_generated/v7_0/version.py @@ -0,0 +1,13 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is +# regenerated. +# -------------------------------------------------------------------------- + +VERSION = "7.0" + diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/async_challenge_auth_policy.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/async_challenge_auth_policy.py new file mode 100644 index 000000000000..d07718d9c5e6 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/async_challenge_auth_policy.py @@ -0,0 +1,57 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from azure.core.pipeline import PipelineRequest +from azure.core.pipeline.policies import AsyncHTTPPolicy +from azure.core.pipeline.transport import HttpRequest, HttpResponse + +from . import ChallengeAuthPolicyBase, HttpChallenge, HttpChallengeCache + + +class AsyncChallengeAuthPolicy(ChallengeAuthPolicyBase, AsyncHTTPPolicy): + """policy for handling HTTP authentication challenges""" + + async def send(self, request: PipelineRequest) -> HttpResponse: + challenge = HttpChallengeCache.get_challenge_for_url(request.http_request.url) + if not challenge: + # provoke a challenge with an unauthorized, bodiless request + no_body = HttpRequest( + request.http_request.method, request.http_request.url, headers=request.http_request.headers + ) + if request.http_request.body: + # no_body was created with request's headers -> if request has a body, no_body's content-length is wrong + no_body.headers["Content-Length"] = "0" + + challenger = await self.next.send(PipelineRequest(http_request=no_body, context=request.context)) + try: + challenge = self._update_challenge(request, challenger) + except ValueError: + # didn't receive the expected challenge -> nothing more this policy can do + return challenger + + await self._handle_challenge(request, challenge) + response = await self.next.send(request) + + if response.http_response.status_code == 401: + # cached challenge could be outdated; maybe this response has a new one? + try: + challenge = self._update_challenge(request, response) + except ValueError: + # 401 with no legible challenge -> nothing more this policy can do + return response + + await self._handle_challenge(request, challenge) + response = await self.next.send(request) + + return response + + async def _handle_challenge(self, request: PipelineRequest, challenge: HttpChallenge) -> None: + """authenticate according to challenge, add Authorization header to request""" + + scope = challenge.get_resource() + if not scope.endswith("/.default"): + scope += "/.default" + + access_token = await self._credential.get_token(scope) + self._update_headers(request.http_request.headers, access_token.token) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/async_client_base.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/async_client_base.py new file mode 100644 index 000000000000..b6081db0d09e --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/async_client_base.py @@ -0,0 +1,115 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from typing import Any, TYPE_CHECKING + +from azure.core.configuration import Configuration +from azure.core.pipeline import AsyncPipeline +from azure.core.pipeline.policies import UserAgentPolicy +from azure.core.pipeline.policies.distributed_tracing import DistributedTracingPolicy +from azure.core.pipeline.transport import AsyncHttpTransport + +from ._generated import KeyVaultClient +from . import AsyncChallengeAuthPolicy +from .._user_agent import USER_AGENT + + +if TYPE_CHECKING: + try: + # pylint:disable=unused-import + from azure.core.credentials import TokenCredential + except ImportError: + # TokenCredential is a typing_extensions.Protocol; we don't depend on that package + pass + + +class AsyncKeyVaultClientBase: + """Base class for async Key Vault clients""" + + @staticmethod + def _create_config( + credential: "TokenCredential", api_version: str = None, **kwargs: "**Any" + ) -> Configuration: + if api_version is None: + api_version = KeyVaultClient.DEFAULT_API_VERSION + config = KeyVaultClient.get_configuration_class(api_version, aio=True)(credential, **kwargs) + config.authentication_policy = AsyncChallengeAuthPolicy(credential) + + # replace the autorest-generated UserAgentPolicy and its hard-coded user agent + # https://github.com/Azure/azure-sdk-for-python/issues/6637 + config.user_agent_policy = UserAgentPolicy(base_user_agent=USER_AGENT, **kwargs) + + # Override config policies if found in kwargs + # TODO: should be unnecessary after next regeneration (written 2019-08-02) + if "user_agent_policy" in kwargs: + config.user_agent_policy = kwargs["user_agent_policy"] + if "headers_policy" in kwargs: + config.headers_policy = kwargs["headers_policy"] + if "proxy_policy" in kwargs: + config.proxy_policy = kwargs["proxy_policy"] + if "logging_policy" in kwargs: + config.logging_policy = kwargs["logging_policy"] + if "retry_policy" in kwargs: + config.retry_policy = kwargs["retry_policy"] + if "custom_hook_policy" in kwargs: + config.custom_hook_policy = kwargs["custom_hook_policy"] + if "redirect_policy" in kwargs: + config.redirect_policy = kwargs["redirect_policy"] + + return config + + def __init__( + self, + vault_url: str, + credential: "TokenCredential", + transport: AsyncHttpTransport = None, + api_version: str = None, + **kwargs: "**Any" + ) -> None: + if not credential: + raise ValueError( + "credential should be an object supporting the TokenCredential protocol, " + "such as a credential from azure-identity" + ) + if not vault_url: + raise ValueError("vault_url must be the URL of an Azure Key Vault") + + self._vault_url = vault_url.strip(" /") + + client = kwargs.pop("generated_client", None) + if client: + # caller provided a configured client -> nothing left to initialize + self._client = client + return + + if api_version is None: + api_version = KeyVaultClient.DEFAULT_API_VERSION + + config = self._create_config(credential, api_version=api_version, **kwargs) + pipeline = kwargs.pop("pipeline", None) or self._build_pipeline(config, transport=transport, **kwargs) + self._client = KeyVaultClient(credential, api_version=api_version, pipeline=pipeline, aio=True) + + @staticmethod + def _build_pipeline(config: Configuration, transport: AsyncHttpTransport, **kwargs: "**Any") -> AsyncPipeline: + policies = [ + config.headers_policy, + config.user_agent_policy, + config.proxy_policy, + config.redirect_policy, + config.retry_policy, + config.authentication_policy, + config.logging_policy, + DistributedTracingPolicy(), + ] + + if transport is None: + from azure.core.pipeline.transport import AioHttpTransport + + transport = AioHttpTransport(**kwargs) + + return AsyncPipeline(transport, policies=policies) + + @property + def vault_url(self) -> str: + return self._vault_url diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/challenge_auth_policy.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/challenge_auth_policy.py new file mode 100644 index 000000000000..2ca78ed9393d --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/challenge_auth_policy.py @@ -0,0 +1,92 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from azure.core.pipeline import PipelineRequest +from azure.core.pipeline.policies import HTTPPolicy +from azure.core.pipeline.policies.authentication import _BearerTokenCredentialPolicyBase +from azure.core.pipeline.transport import HttpRequest + +from .http_challenge import HttpChallenge +from . import http_challenge_cache as ChallengeCache + +try: + from typing import TYPE_CHECKING +except ImportError: + TYPE_CHECKING = False + +if TYPE_CHECKING: + # pylint:disable=unused-import + from azure.core.pipeline.transport import HttpResponse + + +class ChallengeAuthPolicyBase(_BearerTokenCredentialPolicyBase): + """Sans I/O base for challenge authentication policies""" + + # pylint:disable=useless-super-delegation + def __init__(self, credential, **kwargs): + super(ChallengeAuthPolicyBase, self).__init__(credential, **kwargs) + + @staticmethod + def _update_challenge(request, challenger): + # type: (HttpRequest, HttpResponse) -> HttpChallenge + """parse challenge from challenger, cache it, return it""" + + challenge = HttpChallenge( + request.http_request.url, + challenger.http_response.headers.get("WWW-Authenticate"), + response_headers=challenger.http_response.headers, + ) + ChallengeCache.set_challenge_for_url(request.http_request.url, challenge) + return challenge + + +class ChallengeAuthPolicy(ChallengeAuthPolicyBase, HTTPPolicy): + """policy for handling HTTP authentication challenges""" + + def send(self, request): + # type: (PipelineRequest) -> HttpResponse + + challenge = ChallengeCache.get_challenge_for_url(request.http_request.url) + if not challenge: + # provoke a challenge with an unauthorized, bodiless request + no_body = HttpRequest( + request.http_request.method, request.http_request.url, headers=request.http_request.headers + ) + if request.http_request.body: + # no_body was created with request's headers -> if request has a body, no_body's content-length is wrong + no_body.headers["Content-Length"] = "0" + + challenger = self.next.send(PipelineRequest(http_request=no_body, context=request.context)) + try: + challenge = self._update_challenge(request, challenger) + except ValueError: + # didn't receive the expected challenge -> nothing more this policy can do + return challenger + + self._handle_challenge(request, challenge) + response = self.next.send(request) + + if response.http_response.status_code == 401: + # cached challenge could be outdated; maybe this response has a new one? + try: + challenge = self._update_challenge(request, response) + except ValueError: + # 401 with no legible challenge -> nothing more this policy can do + return response + + self._handle_challenge(request, challenge) + response = self.next.send(request) + + return response + + def _handle_challenge(self, request, challenge): + # type: (PipelineRequest, HttpChallenge) -> None + """authenticate according to challenge, add Authorization header to request""" + + scope = challenge.get_resource() + if not scope.endswith("/.default"): + scope += "/.default" + + access_token = self._credential.get_token(scope) + self._update_headers(request.http_request.headers, access_token.token) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/client_base.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/client_base.py new file mode 100644 index 000000000000..54f033e55d28 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/client_base.py @@ -0,0 +1,106 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from typing import TYPE_CHECKING + +from azure.core import Configuration +from azure.core.pipeline import Pipeline +from azure.core.pipeline.policies import UserAgentPolicy +from azure.core.pipeline.transport import RequestsTransport +from azure.core.pipeline.policies.distributed_tracing import DistributedTracingPolicy +from ._generated import KeyVaultClient +from .challenge_auth_policy import ChallengeAuthPolicy +from .._user_agent import USER_AGENT + +if TYPE_CHECKING: + # pylint:disable=unused-import + from typing import Any, Optional + from azure.core.credentials import TokenCredential + from azure.core.pipeline.transport import HttpTransport + +KEY_VAULT_SCOPE = "https://vault.azure.net/.default" + + +class KeyVaultClientBase(object): + """Base class for Key Vault clients""" + + @staticmethod + def _create_config(credential, api_version=None, **kwargs): + # type: (TokenCredential, Optional[str], **Any) -> Configuration + if api_version is None: + api_version = KeyVaultClient.DEFAULT_API_VERSION + config = KeyVaultClient.get_configuration_class(api_version, aio=False)(credential, **kwargs) + config.authentication_policy = ChallengeAuthPolicy(credential) + + # replace the autorest-generated UserAgentPolicy and its hard-coded user agent + # https://github.com/Azure/azure-sdk-for-python/issues/6637 + config.user_agent_policy = UserAgentPolicy(base_user_agent=USER_AGENT, **kwargs) + + # Override config policies if found in kwargs + # TODO: should be unnecessary after next regeneration (written 2019-08-02) + if "user_agent_policy" in kwargs: + config.user_agent_policy = kwargs["user_agent_policy"] + if "headers_policy" in kwargs: + config.headers_policy = kwargs["headers_policy"] + if "proxy_policy" in kwargs: + config.proxy_policy = kwargs["proxy_policy"] + if "logging_policy" in kwargs: + config.logging_policy = kwargs["logging_policy"] + if "retry_policy" in kwargs: + config.retry_policy = kwargs["retry_policy"] + if "custom_hook_policy" in kwargs: + config.custom_hook_policy = kwargs["custom_hook_policy"] + if "redirect_policy" in kwargs: + config.redirect_policy = kwargs["redirect_policy"] + + return config + + def __init__(self, vault_url, credential, transport=None, api_version=None, **kwargs): + # type: (str, TokenCredential, Optional[HttpTransport], Optional[str], **Any) -> None + if not credential: + raise ValueError( + "credential should be an object supporting the TokenCredential protocol, " + "such as a credential from azure-identity" + ) + if not vault_url: + raise ValueError("vault_url must be the URL of an Azure Key Vault") + + self._vault_url = vault_url.strip(" /") + + client = kwargs.pop("generated_client", None) + if client: + # caller provided a configured client -> nothing left to initialize + self._client = client + return + + if api_version is None: + api_version = KeyVaultClient.DEFAULT_API_VERSION + + config = self._create_config(credential, api_version=api_version, **kwargs) + pipeline = kwargs.pop("pipeline", None) or self._build_pipeline(config, transport, **kwargs) + self._client = KeyVaultClient(credential, api_version=api_version, pipeline=pipeline, aio=False, **kwargs) + + # pylint:disable=no-self-use + def _build_pipeline(self, config, transport, **kwargs): + # type: (Configuration, HttpTransport, **Any) -> Pipeline + policies = [ + config.headers_policy, + config.user_agent_policy, + config.proxy_policy, + config.redirect_policy, + config.retry_policy, + config.authentication_policy, + config.logging_policy, + DistributedTracingPolicy(), + ] + + if transport is None: + transport = RequestsTransport(**kwargs) + + return Pipeline(transport, policies=policies) + + @property + def vault_url(self): + # type: () -> str + return self._vault_url diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/http_challenge.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/http_challenge.py new file mode 100644 index 000000000000..c762e1ae50ef --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/http_challenge.py @@ -0,0 +1,114 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +try: + import urllib.parse as parse +except ImportError: + import urlparse as parse # type: ignore + + +class HttpChallenge(object): + def __init__(self, request_uri, challenge, response_headers=None): + """ Parses an HTTP WWW-Authentication Bearer challenge from a server. """ + self.source_authority = self._validate_request_uri(request_uri) + self.source_uri = request_uri + self._parameters = {} + + # get the scheme of the challenge and remove from the challenge string + trimmed_challenge = self._validate_challenge(challenge) + split_challenge = trimmed_challenge.split(" ", 1) + self.scheme = split_challenge[0] + trimmed_challenge = split_challenge[1] + + # split trimmed challenge into comma-separated name=value pairs. Values are expected + # to be surrounded by quotes which are stripped here. + for item in trimmed_challenge.split(","): + # process name=value pairs + comps = item.split("=") + if len(comps) == 2: + key = comps[0].strip(' "') + value = comps[1].strip(' "') + if key: + self._parameters[key] = value + + # minimum set of parameters + if not self._parameters: + raise ValueError("Invalid challenge parameters") + + # must specify authorization or authorization_uri + if "authorization" not in self._parameters and "authorization_uri" not in self._parameters: + raise ValueError("Invalid challenge parameters") + + # if the response headers were supplied + if response_headers: + # get the message signing key and message key encryption key from the headers + self.server_signature_key = response_headers.get("x-ms-message-signing-key", None) + self.server_encryption_key = response_headers.get("x-ms-message-encryption-key", None) + + def is_bearer_challenge(self): + """ Tests whether the HttpChallenge a Bearer challenge. + rtype: bool """ + if not self.scheme: + return False + + return self.scheme.lower() == "bearer" + + def is_pop_challenge(self): + """ Tests whether the HttpChallenge is a proof of possession challenge. + rtype: bool """ + if not self.scheme: + return False + + return self.scheme.lower() == "pop" + + def get_value(self, key): + return self._parameters.get(key) + + def get_authorization_server(self): + """ Returns the URI for the authorization server if present, otherwise empty string. """ + value = "" + for key in ["authorization_uri", "authorization"]: + value = self.get_value(key) or "" + if value: + break + return value + + def get_resource(self): + """ Returns the resource if present, otherwise empty string. """ + return self.get_value("resource") or "" + + def get_scope(self): + """ Returns the scope if present, otherwise empty string. """ + return self.get_value("scope") or "" + + def supports_pop(self): + """ Returns True if challenge supports pop token auth else False """ + return self._parameters.get("supportspop", "").lower() == "true" + + def supports_message_protection(self): + """ Returns True if challenge vault supports message protection """ + return self.supports_pop() and self.server_encryption_key and self.server_signature_key + + # pylint:disable=no-self-use + def _validate_challenge(self, challenge): + """ Verifies that the challenge is a valid auth challenge and returns the key=value pairs. """ + if not challenge: + raise ValueError("Challenge cannot be empty") + + return challenge.strip() + + # pylint:disable=no-self-use + def _validate_request_uri(self, uri): + """ Extracts the host authority from the given URI. """ + if not uri: + raise ValueError("request_uri cannot be empty") + + uri = parse.urlparse(uri) + if not uri.netloc: + raise ValueError("request_uri must be an absolute URI") + + if uri.scheme.lower() not in ["http", "https"]: + raise ValueError("request_uri must be HTTP or HTTPS") + + return uri.netloc diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/http_challenge_cache.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/http_challenge_cache.py new file mode 100644 index 000000000000..07cda1366aa8 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_shared/http_challenge_cache.py @@ -0,0 +1,89 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import threading + +try: + import urllib.parse as parse +except ImportError: + import urlparse as parse # type: ignore + +try: + from typing import TYPE_CHECKING +except ImportError: + TYPE_CHECKING = False + +if TYPE_CHECKING: + # pylint: disable=unused-import + from typing import Dict + from .http_challenge import HttpChallenge + + +_cache = {} # type: Dict[str, HttpChallenge] +_lock = threading.Lock() + + +def get_challenge_for_url(url): + """ Gets the challenge for the cached URL. + :param url: the URL the challenge is cached for. + :rtype: HttpBearerChallenge """ + + if not url: + raise ValueError("URL cannot be None") + + key = _get_cache_key(url) + + with _lock: + return _cache.get(key) + + +def _get_cache_key(url): + """Use the URL's netloc as cache key except when the URL specifies the default port for its scheme. In that case + use the netloc without the port. That is to say, https://foo.bar and https://foo.bar:443 are considered equivalent. + + This equivalency prevents an unnecessary challenge when using Key Vault's paging API. The Key Vault client doesn't + specify ports, but Key Vault's next page links do, so a redundant challenge would otherwise be executed when the + client requests the next page.""" + + parsed = parse.urlparse(url) + if parsed.scheme == "https" and parsed.port == 443: + return parsed.netloc[:-4] + return parsed.netloc + + +def remove_challenge_for_url(url): + """ Removes the cached challenge for the specified URL. + :param url: the URL for which to remove the cached challenge """ + if not url: + raise ValueError("URL cannot be empty") + + url = parse.urlparse(url) + + with _lock: + del _cache[url.netloc] + + +def set_challenge_for_url(url, challenge): + """ Caches the challenge for the specified URL. + :param url: the URL for which to cache the challenge + :param challenge: the challenge to cache """ + if not url: + raise ValueError("URL cannot be empty") + + if not challenge: + raise ValueError("Challenge cannot be empty") + + src_url = parse.urlparse(url) + if src_url.netloc != challenge.source_authority: + raise ValueError("Source URL and Challenge URL do not match") + + with _lock: + _cache[src_url.netloc] = challenge + + +def clear(): + """ Clears the cache. """ + + with _lock: + _cache.clear() diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_user_agent.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_user_agent.py new file mode 100644 index 000000000000..60d5dd5502c3 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_user_agent.py @@ -0,0 +1,10 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import platform +from ._version import VERSION + +USER_AGENT = "azsdk-python-keyvault-certificates/{} Python/{} ({})".format( + VERSION, platform.python_version(), platform.platform() +) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_version.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_version.py new file mode 100644 index 000000000000..ccaa7193d0b4 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/_version.py @@ -0,0 +1,6 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ + +VERSION = "4.0.0b1" diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/aio/__init__.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/aio/__init__.py new file mode 100644 index 000000000000..af111e52db7b --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/aio/__init__.py @@ -0,0 +1,22 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ + +from .client import CertificateClient +from ..enums import ActionType, JsonWebKeyCurveName, JsonWebKeyType, SecretContentType, KeyUsageType +from ..models import AdministratorDetails, CertificatePolicy, Contact, KeyProperties, LifetimeAction + +__all__ = [ + "ActionType", + "AdministratorDetails", + "CertificateClient", + "CertificatePolicy", + "Contact", + "JsonWebKeyCurveName", + "JsonWebKeyType", + "KeyProperties", + "KeyUsageType", + "LifetimeAction", + "SecretContentType" +] diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/aio/_polling_async.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/aio/_polling_async.py new file mode 100644 index 000000000000..1ae0f029b728 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/aio/_polling_async.py @@ -0,0 +1,64 @@ +# ------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for +# license information. +# -------------------------------------------------------------------------- + +import asyncio +import logging +from typing import Any, Callable + +from azure.core import HttpResponseError +from azure.core.polling import AsyncPollingMethod +from azure.keyvault.certificates._shared import parse_vault_id + + +logger = logging.getLogger(__name__) + + +class CreateCertificatePollerAsync(AsyncPollingMethod): + def __init__(self, interval=5, unknown_issuer=False): + self._command = None + self._status = None + self._certificate_id = None + self.polling_interval = interval + self.unknown_issuer = unknown_issuer + + async def _update_status(self): + # type: () -> None + pending_certificate = await self._command() + self._status = pending_certificate.status.lower() + if not self._certificate_id: + self._certificate_id = parse_vault_id(pending_certificate.id) + + def initialize(self, client, initial_response, _): + # type: (Any, Any, Callable) -> None + self._command = client + self._status = initial_response + + async def run(self): + # type: () -> None + try: + while not self.finished(): + await self._update_status() + if self._status != 'completed' and self._status != 'inprogress' and self._status != 'cancelled': + raise HttpResponseError( + 'Unknown status \'{}\' for pending certificate {}'.format(self._status, self._certificate_id)) + await asyncio.sleep(self.polling_interval) + except Exception as e: + logger.warning(str(e)) + raise + + def finished(self): + # type: () -> bool + if self.unknown_issuer: + return True + return self._status == 'completed' or self._status == 'cancelled' + + def resource(self): + # type: () -> Any + return self._status + + def status(self): + # type: () -> str + return self._status diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/aio/client.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/aio/client.py new file mode 100644 index 000000000000..070adb786346 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/aio/client.py @@ -0,0 +1,1083 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +# pylint:disable=too-many-lines,too-many-public-methods +import base64 +import uuid +from typing import Any, AsyncIterable, Optional, Iterable, List, Dict +from functools import partial + +from azure.core.exceptions import ResourceExistsError, ResourceNotFoundError +from azure.core.tracing.decorator import distributed_trace +from azure.core.tracing.decorator_async import distributed_trace_async +from azure.core.polling import async_poller + +from azure.keyvault.certificates.models import( + AdministratorDetails, + CertificatePolicy, + CertificateOperation, + Certificate, + DeletedCertificate, + CertificateBase, + Contact, + Issuer, + IssuerBase, + KeyProperties, + SecretContentType, + LifetimeAction, + KeyUsageType +) +from ._polling_async import CreateCertificatePollerAsync +from .._shared import AsyncKeyVaultClientBase + + +class CertificateClient(AsyncKeyVaultClientBase): + """"CertificateClient defines a high level interface for + managing certificates in the specified vault. + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START create_certificate_client] + :end-before: [END create_certificate_client] + :language: python + :dedent: 4 + :caption: Creates a new instance of the Certificate client + """ + + # pylint:disable=protected-access + @distributed_trace_async + async def create_certificate( + self, + name: str, + policy: Optional[CertificatePolicy] = None, + enabled: Optional[bool] = None, + tags: Optional[Dict[str, str]] = None, + **kwargs: "**Any" + ) -> CertificateOperation: + """Creates a new certificate. + + If this is the first version, the certificate resource is created. This + operation requires the certificates/create permission. + + :param name: The name of the certificate. + :type name: str + :param policy: The management policy for the certificate. + :type policy: + ~azure.keyvault.certificates.models.CertificatePolicy + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict(str, str) + :returns: The created CertificateOperation + :rtype: ~azure.keyvault.certificates.models.CertificateOperation + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START create_certificate] + :end-before: [END create_certificate] + :language: python + :caption: Create a certificate + :dedent: 8 + """ + if enabled is not None: + attributes = self._client.models.CertificateAttributes( + enabled=enabled + ) + else: + attributes = None + + if not policy: + lifetime_actions = [LifetimeAction( + days_before_expiry=90, + action_type="AutoRenew" + )] + policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=True, + key_usage=[ + KeyUsageType.c_rl_sign, + KeyUsageType.data_encipherment, + KeyUsageType.digital_signature, + KeyUsageType.key_agreement, + KeyUsageType.key_cert_sign, + KeyUsageType.key_encipherment + ]), + issuer_name="Self", + lifetime_actions=lifetime_actions, + content_type=SecretContentType.PFX, + subject_name="CN=DefaultPolicy", + validity_in_months=12) + + await self._client.create_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_policy=policy._to_certificate_policy_bundle(), + certificate_attributes=attributes, + tags=tags, + **kwargs + ) + + command = partial( + self._client.get_certificate_operation, + vault_base_url=self.vault_url, + certificate_name=name, + **kwargs + ) + + create_certificate_polling = CreateCertificatePollerAsync( + unknown_issuer=(policy.issuer_name.lower() == 'unknown')) + return async_poller( + command, + "inprogress", + None, + create_certificate_polling + ) + + @distributed_trace_async + async def get_certificate_with_policy( + self, + name: str, + **kwargs: "**Any" + ) -> Certificate: + """Gets information about a certificate, which includes information about the + certificate's policy. + + + Gets information about a specific certificate. This operation requires + the certificates/get permission. Does not accept the version of the certificate + as a parameter. + + :param name: The name of the certificate in the given + vault. + :type name: str + :returns: An instance of Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START get_certificate] + :end-before: [END get_certificate] + :language: python + :caption: Get a certificate + :dedent: 8 + """ + bundle = await self._client.get_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_version="", + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace_async + async def get_certificate( + self, + name: str, + version: str, + **kwargs: "**Any" + ) -> Certificate: + """Gets information about a certificate. + + Gets information about a specific certificate. This operation requires + the certificates/get permission. If you wish to not specify a version or to + get the certificate's policy as well, use the get_certificate_with_policy function. + + :param name: The name of the certificate in the given + vault. + :type name: str + :param version: The version of the certificate. + :type version: str + :returns: An instance of Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START get_certificate] + :end-before: [END get_certificate] + :language: python + :caption: Get a certificate + :dedent: 8 + """ + bundle = await self._client.get_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_version=version, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace_async + async def delete_certificate(self, name: str, **kwargs: "**Any") -> DeletedCertificate: + """Deletes a certificate from the key vault. + + Deletes all versions of a certificate object along with its associated + policy. Delete certificate cannot be used to remove individual versions + of a certificate object. This operation requires the + certificates/delete permission. + + :param name: The name of the certificate. + :type name: str + :returns: The deleted certificate + :rtype: ~azure.keyvault.certificates.models.DeletedCertificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START delete_certificate] + :end-before: [END delete_certificate] + :language: python + :caption: Delete a certificate + :dedent: 8 + """ + bundle = await self._client.delete_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return DeletedCertificate._from_deleted_certificate_bundle(deleted_certificate_bundle=bundle) + + @distributed_trace_async + async def get_deleted_certificate(self, name: str, **kwargs: "**Any") -> DeletedCertificate: + """Retrieves information about the specified deleted certificate. + + Retrieves the deleted certificate information plus its attributes, + such as retention interval, scheduled permanent deletion, and the + current deletion recovery level. This operaiton requires the certificates/ + get permission. + + :param name: The name of the certificate. + :type name: str + :return: The deleted certificate + :rtype: ~azure.keyvault.certificates.models.DeletedCertificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the deleted certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START get_deleted_certificate] + :end-before: [END get_deleted_certificate] + :language: python + :caption: Get a deleted certificate + :dedent: 8 + """ + bundle = await self._client.get_deleted_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return DeletedCertificate._from_deleted_certificate_bundle(deleted_certificate_bundle=bundle) + + @distributed_trace_async + async def purge_deleted_certificate(self, name: str, **kwargs: "**Any") -> None: + """Permanently deletes the specified deleted certificate. + + Performs an irreversible deletion of the specified certificate, without + possibility for recovery. The operation is not available if the recovery + level does not specified 'Purgeable'. This operation requires the + certificate/purge permission. + + :param name: The name of the certificate + :type name: str + :return: None + :rtype: None + :raises: ~azure.core.exceptions.ResourceNotFoundError if the deleted certificate doesn't exist + """ + await self._client.purge_deleted_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + + @distributed_trace_async + async def recover_deleted_certificate(self, name: str, **kwargs: "**Any") -> Certificate: + """Recovers the deleted certificate back to its current version under + /certificates. + + Performs the reversal of the Delete operation. THe operation is applicable + in vaults enabled for soft-delete, and must be issued during the retention + interval (available in the deleted certificate's attributes). This operation + requires the certificates/recover permission. + + :param name: The name of the deleted certificate + :type name: str + :return: The recovered certificate + :rtype ~azure.keyvault.certificates.models.Certificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the deleted certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START recover_deleted_certificate] + :end-before: [END recover_deleted_certificate] + :language: python + :caption: Recover a deleted certificate + :dedent: 8 + """ + bundle = await self._client.recover_deleted_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace_async + async def import_certificate( + self, + name: str, + certificate_bytes: bytes, + password: Optional[str] = None, + policy: Optional[CertificatePolicy] = None, + enabled: Optional[bool] = None, + tags: Optional[Dict[str, str]] = None, + **kwargs: "**Any" + ) -> Certificate: + """Imports a certificate into a specified key vault. + + Imports an existing valid certificate, containing a private key, into + Azure Key Vault. The certificate to be imported can be in either PFX or + PEM format. If the certificate is in PEM format the PEM file must + contain the key as well as x509 certificates. This operation requires + the certificates/import permission. + + :param name: The name of the certificate. + :type name: str + :param certificate_bytes: Bytes of the ertificate object to import. + This certificate needs to contain the private key. + :type certificate_bytes: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param policy: The management policy for the certificate. + :type policy: + ~azure.keyvault.certificates.models.CertificatePolicy + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :returns: The imported Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + """ + if enabled is not None: + attributes = self._client.models.CertificateAttributes( + enabled=enabled + ) + else: + attributes = None + base64_encoded_certificate = base64.b64encode(certificate_bytes).decode("utf-8") + bundle = await self._client.import_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + base64_encoded_certificate=base64_encoded_certificate, + password=password, + certificate_policy=CertificatePolicy._to_certificate_policy_bundle(policy), + certificate_attributes=attributes, + tags=tags, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace_async + async def get_policy(self, name: str, **kwargs: "**Any") -> CertificatePolicy: + """Gets the policy for a certificate. + + Returns the specified certificate policy resources in the key + vault. This operation requires the certificates/get permission. + + :param name: The name of the certificate in a given key vault. + :type name: str + :return: The certificate policy + :rtype ~azure.keyvault.certificates.models.CertificatePolicy + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + """ + bundle = await self._client.get_certificate_policy( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificatePolicy._from_certificate_policy_bundle(certificate_policy_bundle=bundle) + + @distributed_trace_async + async def update_policy( + self, + name: str, + policy: CertificatePolicy, + **kwargs: "**Any" + ) -> CertificatePolicy: + """Updates the policy for a certificate. + + Set specified members in the certificate policy. Leaves others as null. + This operation requries the certificates/update permission. + + :param name: The name of the certificate in the given vault. + :type name: str + :param policy: The policy for the certificate. + :type policy: ~azure.keyvault.certificates.models.CertificatePolicy + :return: The certificate policy + :rtype: ~azure.keyvault.certificates.models.CertificatePolicy + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + """ + bundle = await self._client.update_certificate_policy( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_policy=policy._to_certificate_policy_bundle(), + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificatePolicy._from_certificate_policy_bundle(certificate_policy_bundle=bundle) + + @distributed_trace_async + async def update_certificate( + self, + name: str, + version: Optional[str] = None, + enabled: Optional[bool] = None, + tags: Optional[Dict[str, str]] = None, + **kwargs: "**Any" + ) -> Certificate: + """Updates the specified attributes associated with the given certificate. + + The UpdateCertificate operation applies the specified update on the + given certificate; the only elements updated are the certificate's + attributes. This operation requires the certificates/update permission. + + :param name: The name of the certificate in the given key + vault. + :type name: str + :param version: The version of the certificate. + :type version: str + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict(str, str) + :returns: The updated Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START update_certificate] + :end-before: [END update_certificate] + :language: python + :caption: Update a certificate's attributes + :dedent: 8 + """ + if enabled is not None: + attributes = self._client.models.CertificateAttributes( + enabled=enabled + ) + else: + attributes = None + + bundle = await self._client.update_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_version=version or "", + certificate_attributes=attributes, + tags=tags, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace_async + async def backup_certificate(self, name: str, **kwargs: "**Any") -> bytes: + """Backs up the specified certificate. + + Requests that a backup of the specified certificate be downloaded + to the client. All versions of the certificate will be downloaded. + This operation requires the certificates/backup permission. + + :param name: The name of the certificate. + :type name: str + :return: the backup blob containing the backed up certificate. + :rtype: bytes + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START backup_certificate] + :end-before: [END backup_certificate] + :language: python + :caption: Get a certificate backup + :dedent: 8 + """ + backup_result = await self._client.backup_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return backup_result.value + + @distributed_trace_async + async def restore_certificate(self, backup: bytes, **kwargs: "**Any") -> Certificate: + """Restores a backed up certificate to a vault. + + Restores a backed up certificate, and all its versions, to a vault. + this operation requires the certificates/restore permission. + + :param backup: The backup blob associated with a certificate bundle. + :type backup bytes + :return: The restored Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + :raises: + ~azure.core.exceptions.ResourceExistsError if the backed up certificate's name is already in use + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START restore_certificate] + :end-before: [END restore_certificate] + :language: python + :caption: Restore a certificate backup + :dedent: 8 + """ + bundle = await self._client.restore_certificate( + vault_base_url=self.vault_url, + certificate_bundle_backup=backup, + error_map={409: ResourceExistsError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace + def list_deleted_certificates( + self, + include_pending: Optional[bool] = None, + **kwargs: "**Any" + ) -> AsyncIterable[DeletedCertificate]: + """Lists the deleted certificates in the specified vault currently + available for recovery. + + Retrieves the certificates in the current vault which are in a deleted + state and ready for recovery or purging. This operation includes + deletion-specific information. This operation requires the certificates/get/list + permission. This operation can only be enabled on soft-delete enabled vaults. + + :param include_pending: Specifies whether to include certificates which are not + completely provisioned. + :type include_pending: bool + :return: An iterator like instance of DeletedCertificate + :rtype: + typing.Generator[~azure.keyvault.certificates.models.DeletedCertificate] + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START list_deleted_certificates] + :end-before: [END list_deleted_certificates] + :language: python + :caption: List all the deleted certificates + :dedent: 8 + """ + max_page_size = kwargs.pop("max_page_size", None) + return self._client.get_deleted_certificates( + vault_base_url=self._vault_url, + maxresults=max_page_size, + include_pending=include_pending, + cls=lambda objs: [DeletedCertificate._from_deleted_certificate_item(x) for x in objs], + **kwargs + ) + + @distributed_trace + def list_certificates( + self, + include_pending: Optional[bool] = None, + **kwargs: "**Any" + ) -> AsyncIterable[CertificateBase]: + """List certificates in the key vault. + + The GetCertificates operation returns the set of certificates resources + in the key vault. This operation requires the + certificates/list permission. + + :param include_pending: Specifies whether to include certificates + which are not completely provisioned. + :type include_pending: bool + :returns: An iterator like instance of CertificateBase + :rtype: + typing.Generator[~azure.keyvault.certificates.models.CertificateBase] + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START list_certificates] + :end-before: [END list_certificates] + :language: python + :caption: List all certificates + :dedent: 8 + """ + max_page_size = kwargs.pop("max_page_size", None) + return self._client.get_certificates( + vault_base_url=self._vault_url, + maxresults=max_page_size, + include_pending=include_pending, + cls=lambda objs: [CertificateBase._from_certificate_item(x) for x in objs], + **kwargs + ) + + @distributed_trace + def list_certificate_versions(self, name: str, **kwargs: "**Any") -> AsyncIterable[CertificateBase]: + """List the versions of a certificate. + + The GetCertificateVersions operation returns the versions of a + certificate in the key vault. This operation requires the + certificates/list permission. + + :param name: The name of the certificate. + :type name: str + :returns: An iterator like instance of CertificateBase + :rtype: + typing.Generator[~azure.keyvault.certificates.models.CertificateBase] + + Example: + .. literalinclude:: ../tests/test_examples_certificates_async.py + :start-after: [START list_certificate_versions] + :end-before: [END list_certificate_versions] + :language: python + :caption: List all versions of a certificate + :dedent: 8 + """ + max_page_size = kwargs.pop("max_page_size", None) + return self._client.get_certificate_versions( + vault_base_url=self._vault_url, + certificate_name=name, + maxresults=max_page_size, + cls=lambda objs: [CertificateBase._from_certificate_item(x) for x in objs], + **kwargs) + + @distributed_trace_async + async def create_contacts(self, contacts: Iterable[Contact], **kwargs: "**Any") -> List[Contact]: + # pylint:disable=unsubscriptable-object + + # disabled unsubscruptable-object because of pylint bug referenced here: + # https://github.com/PyCQA/pylint/issues/2377 + """Sets the certificate contacts for the key vault. + + Sets the certificate contacts for the key vault. This + operation requires the certificates/managecontacts permission. + + :param contacts: The contact list for the vault certificates. + :type contacts: list[~azure.keyvault.certificates.models.Contact] + :returns: The created list of contacts + :rtype: Iterator[~azure.keyvault.certificates.models.Contact] + """ + contacts = await self._client.set_certificate_contacts( + vault_base_url=self.vault_url, + contact_list=[c._to_certificate_contacts_item() for c in contacts], + **kwargs + ) + return [Contact._from_certificate_contacts_item(contact_item=item) for item in contacts.contact_list] + + @distributed_trace_async + async def get_contacts(self, **kwargs: "**Any") -> List[Contact]: + # pylint:disable=unsubscriptable-object + + # disabled unsubscruptable-object because of pylint bug referenced here: + # https://github.com/PyCQA/pylint/issues/2377 + """Gets the certificate contacts for the key vault. + + Returns the set of certificate contact resources in the specified + key vault. This operation requires the certificates/managecontacts + permission. + + :return: The certificate contacts for the key vault. + :rtype: Iterator[azure.keyvault.certificates.models.Contact] + """ + contacts = await self._client.get_certificate_contacts(vault_base_url=self._vault_url, **kwargs) + return [Contact._from_certificate_contacts_item(contact_item=item) for item in contacts.contact_list] + + @distributed_trace_async + async def delete_contacts(self, **kwargs: "**Any") -> List[Contact]: + # pylint:disable=unsubscriptable-object + + # disabled unsubscruptable-object because of pylint bug referenced here: + # https://github.com/PyCQA/pylint/issues/2377 + """Deletes the certificate contacts for the key vault. + + Deletes the certificate contacts for the key vault certificate. + This operation requires the certificates/managecontacts permission. + + :return: Contacts + :rtype: Iterator[~azure.security.certificates._models.Contact] + """ + contacts = await self._client.delete_certificate_contacts(vault_base_url=self.vault_url, **kwargs) + return [Contact._from_certificate_contacts_item(contact_item=item) for item in contacts.contact_list] + + @distributed_trace_async + async def get_certificate_operation(self, name: str, **kwargs: "**Any") -> CertificateOperation: + """Gets the creation operation of a certificate. + + Gets the creation operation associated with a specified certificate. + This operation requires the certificates/get permission. + + :param name: The name of the certificate. + :type name: str + :returns: The created CertificateOperation + :rtype: ~azure.security.keyvault.certificates.models.CertificateOperation + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate operation doesn't exist + """ + + bundle = await self._client.get_certificate_operation( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificateOperation._from_certificate_operation_bundle(certificate_operation_bundle=bundle) + + @distributed_trace_async + async def delete_certificate_operation(self, name: str, **kwargs: "**Any") -> CertificateOperation: + """Deletes the creation operation for a specific certificate. + + Deletes the creation operation for a specified certificate that is in + the process of being created. The certificate is no longer created. + This operation requires the certificates/update permission. + + :param name: The name of the certificate. + :type name: str + :return: The deleted CertificateOperation + :rtype: ~azure.keyvault.certificates.models.CertificateOperation + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate operation doesn't exist + """ + bundle = await self._client.delete_certificate_operation( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificateOperation._from_certificate_operation_bundle(certificate_operation_bundle=bundle) + + @distributed_trace_async + async def cancel_certificate_operation(self, name: str, **kwargs: "**Any") -> CertificateOperation: + """Updates a certificate operation. + + Updates a certificate creation operation that is already in progress. + This operation requires the certificates/update permission. + + :param name: The name of the certificate. + :type name: str + :returns: The updated certificate operation + :rtype: ~azure.keyvault.certificates.models.CertificateOperation + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate operation doesn't exist + """ + bundle = await self._client.update_certificate_operation( + vault_base_url=self.vault_url, + certificate_name=name, + cancellation_requested=True, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificateOperation._from_certificate_operation_bundle(certificate_operation_bundle=bundle) + + @distributed_trace_async + async def get_pending_certificate_signing_request( + self, + name: str, + custom_headers: Optional[Dict[str, str]] = None, + **kwargs: "**Any") -> str: + """Gets the Base64 pending certificate signing request (PKCS-10). + :param name: The name of the certificate + :type name: str + :param custom_headers: headers that will be added to the request + :type custom_headers: dict + :return: Base64 encoded pending certificate signing request (PKCS-10). + :rtype: str + :raises: ~azure.core.exceptions.ResourceNotFoundError if the pending csr doesn't exist + """ + error_map = {404: ResourceNotFoundError} + vault_base_url = self.vault_url + # Construct URL + url = '/certificates/{certificate-name}/pending' + path_format_arguments = { + 'vaultBaseUrl': self._client._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._client._serialize.url("certificate_name", name, 'str') + } + url = self._client._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._client._serialize.query( + name="self.api_version", + data=self._client.api_version, + data_type='str' + ) + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/pkcs10' + if self._client._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + if custom_headers: + header_parameters.update(custom_headers) + + # Construct and send request + request = self._client._client.get( + url=url, + params=query_parameters, + headers=header_parameters + ) + pipeline_response = await self._client._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + self._client.map_error(status_code=response.status_code, response=response, error_map=error_map) + raise self._client.models.KeyVaultErrorException(response, self._client._deserialize) + + deserialized = None + + if response.status_code == 200: + deserialized = response.body() if hasattr(response, 'body') else response.content + + return deserialized + + @distributed_trace_async + async def merge_certificate( + self, + name: str, + x509_certificates: List[bytearray], + enabled: Optional[bool] = None, + tags: Optional[Dict[str, str]] = None, + **kwargs: "**Any" + ) -> Certificate: + """Merges a certificate or a certificate chain with a key pair existing on the server. + + Performs the merging of a certificate or certificate chain with a key pair currently + available in the service. This operation requires the certificates/create permission. + + :param name: The name of the certificate + :type name: str + :param x509_certificates: The certificate or the certificate chain to merge. + :type x509_certificates: list[bytearray] + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :return: The merged certificate operation + :rtype: ~azure.keyvault.certificates.models.CertificateOperation + :raises: ~azure.core.exceptions.ResourceNotFoundError if the create certificate operation doesn't exist + """ + if enabled is not None: + attributes = self._client.models.CertificateAttributes( + enabled=enabled + ) + else: + attributes = None + bundle = await self._client.merge_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + x509_certificates=x509_certificates, + certificate_attributes=attributes, + tags=tags, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace_async + async def get_issuer(self, name: str, **kwargs: "**Any") -> Issuer: + """Gets the specified certificate issuer. + + Returns the specified certificate issuer resources in the key vault. + This operation requires the certificates/manageissuers/getissuers permission. + + :param name: The name of the issuer. + :type name: str + :return: The specified certificate issuer. + :rtype: ~azure.keyvault.certificates.models.Issuer + :raises: ~azure.core.exceptions.ResourceNotFoundError if the issuer doesn't exist + """ + issuer_bundle = await self._client.get_certificate_issuer( + vault_base_url=self.vault_url, + issuer_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Issuer._from_issuer_bundle(issuer_bundle=issuer_bundle) + + @distributed_trace_async + async def create_issuer( + self, + name: str, + provider: str, + account_id: Optional[str] = None, + password: Optional[str] = None, + organization_id: Optional[str] = None, + admin_details: Optional[List[AdministratorDetails]] = None, + enabled: Optional[bool] = None, + **kwargs: "**Any" + ) -> Issuer: + """Sets the specified certificate issuer. + + The SetCertificateIssuer operation adds or updates the specified + certificate issuer. This operation requires the certificates/setissuers + permission. + + :param name: The name of the issuer. + :type name: str + :param provider: The issuer provider. + :type provider: str + :param account_id: The user name/account name/account id. + :type account_id: str + :param password: The password/secret/account key. + :type password: str + :param organization_id: Id of the organization. + :type organization_id: str + :param admin_details: Details of the organization administrators of the certificate issuer. + :type admin_details: ~azure.keyvault.certificates.models.AdministratorDetails + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :returns: The created Issuer + :rtype: ~azure.keyvault.certificates.models.Issuer + """ + if account_id or password: + issuer_credentials = self._client.models.IssuerCredentials(account_id=account_id, password=password) + else: + issuer_credentials = None + if admin_details and admin_details[0]: + admin_details_to_pass = list(self._client.models.AdministratorDetails( + first_name=admin_detail.first_name, + last_name=admin_detail.last_name, + email_address=admin_detail.email, + phone=admin_detail.phone + ) for admin_detail in admin_details) + else: + admin_details_to_pass = admin_details + if organization_id or admin_details: + organization_details = self._client.models.OrganizationDetails( + id=organization_id, + admin_details=admin_details_to_pass + ) + else: + organization_details = None + if enabled is not None: + issuer_attributes = self._client.models.IssuerAttributes(enabled=enabled) + else: + issuer_attributes = None + issuer_bundle = await self._client.set_certificate_issuer( + vault_base_url=self.vault_url, + issuer_name=name, + provider=provider, + credentials=issuer_credentials, + organization_details=organization_details, + attributes=issuer_attributes, + **kwargs + ) + return Issuer._from_issuer_bundle(issuer_bundle=issuer_bundle) + + @distributed_trace_async + async def update_issuer( + self, + name: str, + provider: Optional[str] = None, + account_id: Optional[str] = None, + password: Optional[str] = None, + organization_id: Optional[str] = None, + admin_details: Optional[List[AdministratorDetails]] = None, + enabled: Optional[bool] = None, + **kwargs: "**Any" + ) -> Issuer: + """Updates the specified certificate issuer. + + Performs an update on the specified certificate issuer entity. + THis operation requires the certificates/setissuers permission. + + :param name: The name of the issuer. + :type name: str + :param provider: The issuer provider. + :type provider: str + :param account_id: The username / account name / account key. + :type account_id: str + :param password: The password / secret / account key. + :type password: str + :param organization_id: Id of the organization + :type organization_id: str + :param admin_details: Details of the organization administrators of the certificate issuer. + :type admin_details: ~azure.keyvault.certificates.models.AdministratorDetails + :param enabled: Determines whether the issuer is enabled. + :type enabled: bool + :return: The updated issuer + :rtype: ~azure.keyvault.certificates.models.Issuer + :raises: ~azure.core.exceptions.ResourceNotFoundError if the issuer doesn't exist + """ + if account_id or password: + issuer_credentials = self._client.models.IssuerCredentials(account_id=account_id, password=password) + else: + issuer_credentials = None + if admin_details and admin_details[0]: + admin_details_to_pass = list(self._client.models.AdministratorDetails( + first_name=admin_detail.first_name, + last_name=admin_detail.last_name, + email_address=admin_detail.email, + phone=admin_detail.phone + ) for admin_detail in admin_details) + else: + admin_details_to_pass = admin_details + if organization_id or admin_details: + organization_details = self._client.models.OrganizationDetails( + id=organization_id, + admin_details=admin_details_to_pass + ) + else: + organization_details = None + if enabled is not None: + issuer_attributes = self._client.models.IssuerAttributes(enabled=enabled) + else: + issuer_attributes = None + issuer_bundle = await self._client.update_certificate_issuer( + vault_base_url=self.vault_url, + issuer_name=name, + provider=provider, + credentials=issuer_credentials, + organization_details=organization_details, + attributes=issuer_attributes, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Issuer._from_issuer_bundle(issuer_bundle=issuer_bundle) + + @distributed_trace_async + async def delete_issuer(self, name: str, **kwargs: "**Any") -> Issuer: + """Deletes the specified certificate issuer. + + Permanently removes the specified certificate issuer from the vault. + This operation requires the certificates/manageissuers/deleteissuers permission. + + :param name: The name of the issuer. + :type name: str + :return: Issuer + :rtype: ~azure.keyvault.certificates.models.Issuer + :raises: ~azure.core.exceptions.ResourceNotFoundError if the issuer doesn't exist + """ + issuer_bundle = await self._client.delete_certificate_issuer( + vault_base_url=self.vault_url, + issuer_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Issuer._from_issuer_bundle(issuer_bundle=issuer_bundle) + + @distributed_trace + def list_issuers(self, **kwargs: "**Any") -> AsyncIterable[IssuerBase]: + """List certificate issuers for the key vault. + + Returns the set of certificate issuer resources in the key + vault. This operation requires the certificates/manageissuers/getissuers + permission. + + :return: An iterator like instance of Issuers + :rtype: Iterable[~azure.keyvault.certificates.models.Issuer] + """ + max_page_size = kwargs.pop("max_page_size", None) + return self._client.get_certificate_issuers( + vault_base_url=self.vault_url, + maxresults=max_page_size, + cls=lambda objs: [IssuerBase._from_issuer_item(x) for x in objs], + **kwargs + ) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/client.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/client.py new file mode 100644 index 000000000000..d054e6cefcc3 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/client.py @@ -0,0 +1,1085 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +# pylint:disable=too-many-lines,too-many-public-methods +import base64 +import uuid +from functools import partial +from azure.core.exceptions import ResourceExistsError, ResourceNotFoundError +from azure.core.polling import LROPoller +from azure.core.tracing.decorator import distributed_trace + +from ._shared import KeyVaultClientBase +from .models import ( + Certificate, + CertificateBase, + CertificatePolicy, + DeletedCertificate, + Issuer, + IssuerBase, + Contact, + CertificateOperation, + LifetimeAction, + KeyProperties, + KeyUsageType, + SecretContentType +) +from ._polling import CreateCertificatePoller + +try: + from typing import TYPE_CHECKING +except ImportError: + TYPE_CHECKING = False + +if TYPE_CHECKING: + # pylint:disable=unused-import + from typing import Any, Dict, List, Optional, Iterable + + +class CertificateClient(KeyVaultClientBase): + """CertificateClient defines a high level interface for + managing certificates in the specified vault. + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START create_certificate_client] + :end-before: [END create_certificate_client] + :language: python + :caption: Create a new ``CertificateClient`` + :dedent: 4 + """ + + # pylint:disable=protected-access + + @distributed_trace + def create_certificate( + self, + name, # type: str + policy=None, # type: Optional[CertificatePolicy] + enabled=None, # type: Optional[bool] + tags=None, # type: Optional[Dict[str, str]] + **kwargs # type: **Any + ): + # type: (...) -> CertificateOperation + """Creates a new certificate. + + If this is the first version, the certificate resource is created. This + operation requires the certificates/create permission. + + :param name: The name of the certificate. + :type name: str + :param policy: The management policy for the certificate. + :type policy: + ~azure.security.keyvault.certificates._models.CertificatePolicy + :param bool enabled: Determines whether the object is enabled. + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict(str, str) + :returns: The created CertificateOperation + :rtype: ~azure.keyvault.certificates.models.CertificateOperation + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START create_certificate] + :end-before: [END create_certificate] + :language: python + :caption: Create a certificate + :dedent: 8 + """ + + if enabled is not None: + attributes = self._client.models.CertificateAttributes( + enabled=enabled + ) + else: + attributes = None + + if not policy: + lifetime_actions = [LifetimeAction( + days_before_expiry=90, + action_type="AutoRenew" + )] + policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=True, + key_usage=[ + KeyUsageType.c_rl_sign, + KeyUsageType.data_encipherment, + KeyUsageType.digital_signature, + KeyUsageType.key_agreement, + KeyUsageType.key_cert_sign, + KeyUsageType.key_encipherment + ]), + issuer_name="Self", + lifetime_actions=lifetime_actions, + content_type=SecretContentType.PFX, + subject_name="CN=DefaultPolicy", + validity_in_months=12) + + self._client.create_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_policy=policy._to_certificate_policy_bundle(), + certificate_attributes=attributes, + tags=tags, + **kwargs + ) + + command = partial( + self._client.get_certificate_operation, + vault_base_url=self.vault_url, + certificate_name=name, + **kwargs + ) + + create_certificate_polling = CreateCertificatePoller(unknown_issuer=(policy.issuer_name.lower() == 'unknown')) + return LROPoller( + command, + "inprogress", + None, + create_certificate_polling + ) + + + @distributed_trace + def get_certificate_with_policy(self, name, **kwargs): + # type: (str, **Any) -> Certificate + """Gets information about a certificate, which includes information about the + certificate's policy. + + Gets information about a specific certificate. This operation requires + the certificates/get permission. Does not accept the version of the certificate + as a parameter. + + :param name: The name of the certificate in the given + vault. + :type name: str + :returns: An instance of Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START get_certificate] + :end-before: [END get_certificate] + :language: python + :caption: Get a certificate + :dedent: 8 + """ + bundle = self._client.get_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_version="", + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace + def get_certificate(self, name, version, **kwargs): + # type: (str, str, **Any) -> Certificate + """Gets information about a certificate, which does not include the policy. + Version must be specified. + + Gets information about a specific certificate. This operation requires + the certificates/get permission. If you wish to not specify a version or to + get the certificate's policy as well, use the get_certificate_with_policy function. + + :param name: The name of the certificate in the given + vault. + :type name: str + :param version: The version of the certificate. + :type version: str + :returns: An instance of Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START get_certificate] + :end-before: [END get_certificate] + :language: python + :caption: Get a certificate + :dedent: 8 + """ + bundle = self._client.get_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_version=version, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace + def delete_certificate(self, name, **kwargs): + # type: (str, **Any) -> DeletedCertificate + """Deletes a certificate from the key vault. + + Deletes all versions of a certificate object along with its associated + policy. Delete certificate cannot be used to remove individual versions + of a certificate object. This operation requires the + certificates/delete permission. + + :param name: The name of the certificate. + :type name: str + :returns: The deleted certificate + :rtype: ~azure.keyvault.certificates.models.DeletedCertificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START delete_certificate] + :end-before: [END delete_certificate] + :language: python + :caption: Delete a certificate + :dedent: 8 + """ + bundle = self._client.delete_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return DeletedCertificate._from_deleted_certificate_bundle(deleted_certificate_bundle=bundle) + + @distributed_trace + def get_deleted_certificate(self, name, **kwargs): + # type: (str, **Any) -> DeletedCertificate + """Retrieves information about the specified deleted certificate. + + Retrieves the deleted certificate information plus its attributes, + such as retention interval, scheduled permanent deletion, and the + current deletion recovery level. This operaiton requires the certificates/ + get permission. + + :param name: The name of the certificate. + :type name: str + :return: The deleted certificate + :rtype: ~azure.keyvault.certificates.models.DeletedCertificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the deleted certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START get_deleted_certificate] + :end-before: [END get_deleted_certificate] + :language: python + :caption: Get a deleted certificate + :dedent: 8 + """ + bundle = self._client.get_deleted_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return DeletedCertificate._from_deleted_certificate_bundle(deleted_certificate_bundle=bundle) + + @distributed_trace + def purge_deleted_certificate(self, name, **kwargs): + # type: (str, **Any) -> None + """Permanently deletes the specified deleted certificate. + + Performs an irreversible deletion of the specified certificate, without + possibility for recovery. The operation is not available if the recovery + level does not specified 'Purgeable'. This operation requires the + certificate/purge permission. + + :param name: The name of the certificate + :type name: str + :return: None + :rtype: None + :raises: ~azure.core.exceptions.ResourceNotFoundError if the deleted certificate doesn't exist + """ + self._client.purge_deleted_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + + @distributed_trace + def recover_deleted_certificate(self, name, **kwargs): + # type: (str, **Any) -> Certificate + """Recovers the deleted certificate back to its current version under + /certificates. + + Performs the reversal of the Delete operation. THe operation is applicable + in vaults enabled for soft-delete, and must be issued during the retention + interval (available in the deleted certificate's attributes). This operation + requires the certificates/recover permission. + + :param name: The name of the deleted certificate + :type name: str + :return: The recovered certificate + :rtype ~azure.keyvault.certificates.models.Certificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the deleted certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_samples_keys.py + :start-after: [START recover_deleted_certificate] + :end-before: [END recover_deleted_certificate] + :language: python + :caption: Recover a deleted certificate + :dedent: 8 + """ + bundle = self._client.recover_deleted_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace + def import_certificate( + self, + name, # type: str + certificate_bytes, # type: bytes + password=None, # type: Optional[str] + policy=None, # type: Optional[CertificatePolicy] + enabled=None, # type: Optional[bool] + tags=None, # type: Optional[Dict[str, str]] + **kwargs # type: **Any + ): + # type: (...) -> Certificate + """Imports a certificate into a specified key vault. + + Imports an existing valid certificate, containing a private key, into + Azure Key Vault. The certificate to be imported can be in either PFX or + PEM format. If the certificate is in PEM format the PEM file must + contain the key as well as x509 certificates. This operation requires + the certificates/import permission. + + :param name: The name of the certificate. + :type name: str + :param certificate_bytes: Bytes of the ertificate object to import. + This certificate needs to contain the private key. + :type certificate_bytes: str + :param password: If the private key in base64EncodedCertificate is + encrypted, the password used for encryption. + :type password: str + :param policy: The management policy for the certificate. + :type policy: + ~azure.keyvault.certificates.models.CertificatePolicy + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param tags: Application specific metadata in the form of key-value + pairs. + :type tags: dict[str, str] + :returns: The imported Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + """ + if enabled is not None: + attributes = self._client.models.CertificateAttributes( + enabled=enabled + ) + else: + attributes = None + base64_encoded_certificate = base64.b64encode(certificate_bytes).decode("utf-8") + bundle = self._client.import_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + base64_encoded_certificate=base64_encoded_certificate, + password=password, + certificate_policy=policy._to_certificate_policy_bundle(), + certificate_attributes=attributes, + tags=tags, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace + def get_policy(self, name, **kwargs): + # type: (str, **Any) -> CertificatePolicy + """Gets the policy for a certificate. + + Returns the specified certificate policy resources in the key + vault. This operation requires the certificates/get permission. + + :param name: The name of the certificate in a given key vault. + :type name: str + :return: The certificate policy + :rtype ~azure.keyvault.certificates.models.CertificatePolicy + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + """ + bundle = self._client.get_certificate_policy( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificatePolicy._from_certificate_policy_bundle(certificate_policy_bundle=bundle) + + @distributed_trace + def update_policy(self, name, policy, **kwargs): + # type: (str, CertificatePolicy, **Any) -> CertificatePolicy + """Updates the policy for a certificate. + + Set specified members in the certificate policy. Leaves others as null. + This operation requires the certificates/update permission. + + :param name: The name of the certificate in the given vault. + :type name: str + :param policy: The policy for the certificate. + :type policy: ~azure.keyvault.certificates.models.CertificatePolicy + :return: The certificate policy + :rtype: ~azure.keyvault.certificates.models.CertificatePolicy + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + """ + bundle = self._client.update_certificate_policy( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_policy=policy._to_certificate_policy_bundle(), + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificatePolicy._from_certificate_policy_bundle(certificate_policy_bundle=bundle) + + @distributed_trace + def update_certificate( + self, + name, # type: str + version=None, # type: Optional[str] + enabled=None, # type: Optional[bool] + tags=None, # type: Optional[Dict[str, str]] + **kwargs # type: **Any + ): + # type: (...) -> Certificate + """Updates the specified attributes associated with the given certificate. + + The UpdateCertificate operation applies the specified update on the + given certificate; the only elements updated are the certificate's + attributes. This operation requires the certificates/update permission. + + :param name: The name of the certificate in the given key + vault. + :type name: str + :param version: The version of the certificate. + :type version: str + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict(str, str) + :returns: The updated Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START update_certificate] + :end-before: [END update_certificate] + :language: python + :caption: Update a certificate's attributes + :dedent: 8 + """ + if enabled is not None: + attributes = self._client.models.CertificateAttributes( + enabled=enabled + ) + else: + attributes = None + + bundle = self._client.update_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + certificate_version=version or "", + certificate_attributes=attributes, + tags=tags, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace + def backup_certificate(self, name, **kwargs): + # type: (str, **Any) -> bytes + """Backs up the specified certificate. + + Requests that a backup of the specified certificate be downloaded + to the client. All versions of the certificate will be downloaded. + This operation requires the certificates/backup permission. + + :param name: The name of the certificate. + :type name: str + :return: the backup blob containing the backed up certificate. + :rtype: bytes + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate doesn't exist + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START backup_certificate] + :end-before: [END backup_certificate] + :language: python + :caption: Get a certificate backup + :dedent: 8 + """ + backup_result = self._client.backup_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return backup_result.value + + @distributed_trace + def restore_certificate(self, backup, **kwargs): + # type: (bytes, **Any) -> Certificate + """Restores a backed up certificate to a vault. + + Restores a backed up certificate, and all its versions, to a vault. + this operation requires the certificates/restore permission. + + :param backup: The backup blob associated with a certificate bundle. + :type backup bytes + :return: The restored Certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + :raises: + ~azure.core.exceptions.ResourceExistsError if the backed up certificate's name is already in use + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START restore_certificate] + :end-before: [END restore_certificate] + :language: python + :caption: Restore a certificate backup + :dedent: 8 + """ + bundle = self._client.restore_certificate( + vault_base_url=self.vault_url, + certificate_bundle_backup=backup, + error_map={409: ResourceExistsError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace + def list_deleted_certificates(self, include_pending=None, **kwargs): + # type: (Optional[bool], **Any) -> Iterable[DeletedCertificate] + """Lists the deleted certificates in the specified vault currently + available for recovery. + + Retrieves the certificates in the current vault which are in a deleted + state and ready for recovery or purging. This operation includes + deletion-specific information. This operation requires the certificates/get/list + permission. This operation can only be enabled on soft-delete enabled vaults. + + :param include_pending: Specifies whether to include certificates which are not + completely provisioned. + :type include_pending: bool + :return: An iterator like instance of DeletedCertificate + :rtype: + typing.Generator[~azure.keyvault.certificates.models.DeletedCertificate] + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START list_deleted_certificates] + :end-before: [END list_deleted_certificates] + :language: python + :caption: List all the deleted certificates + :dedent: 8 + """ + max_page_size = kwargs.pop("max_page_size", None) + return self._client.get_deleted_certificates( + vault_base_url=self._vault_url, + maxresults=max_page_size, + include_pending=include_pending, + cls=lambda objs: [ + DeletedCertificate._from_deleted_certificate_item(deleted_certificate_item=x) + for x in objs + ], + **kwargs + ) + + @distributed_trace + def list_certificates(self, include_pending=None, **kwargs): + # type: (Optional[bool], **Any) -> Iterable[CertificateBase] + """List certificates in the key vault. + + The GetCertificates operation returns the set of certificates resources + in the key vault. This operation requires the + certificates/list permission. + + :param include_pending: Specifies whether to include certificates + which are not completely provisioned. + :type include_pending: bool + :returns: An iterator like instance of CertificateBase + :rtype: + typing.Generator[~azure.keyvault.certificates.models.CertificateBase] + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START list_certificates] + :end-before: [END list_certificates] + :language: python + :caption: List all certificates + :dedent: 8 + """ + max_page_size = kwargs.pop("max_page_size", None) + return self._client.get_certificates( + vault_base_url=self._vault_url, + maxresults=max_page_size, + include_pending=include_pending, + cls=lambda objs: [CertificateBase._from_certificate_item(certificate_item=x) for x in objs], + **kwargs + ) + + @distributed_trace + def list_certificate_versions(self, name, **kwargs): + # type: (str, **Any) -> Iterable[CertificateBase] + """List the versions of a certificate. + + The GetCertificateVersions operation returns the versions of a + certificate in the key vault. This operation requires the + certificates/list permission. + + :param name: The name of the certificate. + :type name: str + :returns: An iterator like instance of CertificateBase + :rtype: + typing.Generator[~azure.keyvault.certificates.models.CertificateBase] + + Example: + .. literalinclude:: ../tests/test_examples_certificates.py + :start-after: [START list_certificate_versions] + :end-before: [END list_certificate_versions] + :language: python + :caption: List all versions of a certificate + :dedent: 8 + """ + max_page_size = kwargs.pop("max_page_size", None) + return self._client.get_certificate_versions( + vault_base_url=self._vault_url, + certificate_name=name, + maxresults=max_page_size, + cls=lambda objs: [CertificateBase._from_certificate_item(certificate_item=x) for x in objs], + **kwargs) + + @distributed_trace + def create_contacts(self, contacts, **kwargs): + # type: (Iterable[Contact], **Any) -> List[Contact] + """Sets the certificate contacts for the key vault. + + Sets the certificate contacts for the key vault. This + operation requires the certificates/managecontacts permission. + + :param contacts: The contact list for the vault certificates. + :type contacts: list[~azure.keyvault.certificates.models.Contact] + :returns: The created list of contacts + :rtype: Iterator[~azure.keyvault.certificates.models.Contact] + """ + contacts = self._client.set_certificate_contacts( + vault_base_url=self.vault_url, + contact_list=[c._to_certificate_contacts_item() for c in contacts], + **kwargs + ) + return [Contact._from_certificate_contacts_item(contact_item=item) for item in contacts.contact_list] + + @distributed_trace + def get_contacts(self, **kwargs): + # type: (**Any) -> List[Contact] + """Gets the certificate contacts for the key vault. + + Returns the set of certificate contact resources in the specified + key vault. This operation requires the certificates/managecontacts + permission. + + :return: The certificate contacts for the key vault. + :rtype: Iterator[azure.keyvault.certificates._models.Contact] + """ + contacts = self._client.get_certificate_contacts(vault_base_url=self._vault_url, **kwargs) + return [Contact._from_certificate_contacts_item(contact_item=item) for item in contacts.contact_list] + + @distributed_trace + def delete_contacts(self, **kwargs): + # type: (**Any) -> List[Contact] + """Deletes the certificate contacts for the key vault. + + Deletes the certificate contacts for the key vault certificate. + This operation requires the certificates/managecontacts permission. + + :return: Contacts + :rtype: Iterator[~azure.certificates._models.Contact] + """ + contacts = self._client.delete_certificate_contacts(vault_base_url=self.vault_url, **kwargs) + return [Contact._from_certificate_contacts_item(contact_item=item) for item in contacts.contact_list] + + @distributed_trace + def get_certificate_operation(self, name, **kwargs): + # type: (str, **Any) -> CertificateOperation + """Gets the creation operation of a certificate. + + Gets the creation operation associated with a specified certificate. + This operation requires the certificates/get permission. + + :param name: The name of the certificate. + :type name: str + :returns: The created CertificateOperation + :rtype: ~azure.keyvault.certificates.models.CertificateOperation + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate operation doesn't exist + """ + + bundle = self._client.get_certificate_operation( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificateOperation._from_certificate_operation_bundle(certificate_operation_bundle=bundle) + + @distributed_trace + def delete_certificate_operation(self, name, **kwargs): + # type: (str, **Any) -> CertificateOperation + """Deletes the creation operation for a specific certificate. + + Deletes the creation operation for a specified certificate that is in + the process of being created. The certificate is no longer created. + This operation requires the certificates/update permission. + + :param name: The name of the certificate. + :type name: str + :return: The deleted CertificateOperation + :rtype: ~azure.keyvault.certificates.models.CertificateOperation + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate operation doesn't exist + """ + bundle = self._client.delete_certificate_operation( + vault_base_url=self.vault_url, + certificate_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificateOperation._from_certificate_operation_bundle(certificate_operation_bundle=bundle) + + @distributed_trace + def cancel_certificate_operation(self, name, **kwargs): + # type: (str, **Any) -> CertificateOperation + """Updates a certificate operation. + + Updates a certificate creation operation that is already in progress. + This operation requires the certificates/update permission. + + :param name: The name of the certificate. + :type name: str + :returns: The updated certificate operation + :rtype: ~azure.keyvault.certificates.models.CertificateOperation + :raises: ~azure.core.exceptions.ResourceNotFoundError if the certificate operation doesn't exist + """ + bundle = self._client.update_certificate_operation( + vault_base_url=self.vault_url, + certificate_name=name, + cancellation_requested=True, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return CertificateOperation._from_certificate_operation_bundle(certificate_operation_bundle=bundle) + + @distributed_trace + def merge_certificate( + self, + name, # type: str + x509_certificates, # type: List[bytearray] + enabled=None, # type: Optional[bool] + tags=None, # type: Optional[Dict[str, str]] + **kwargs # type: **Any + ): + # type: (...) -> Certificate + """Merges a certificate or a certificate chain with a key pair existing on the server. + + Performs the merging of a certificate or certificate chain with a key pair currently + available in the service. This operation requires the certificates/create permission. + + :param name: The name of the certificate + :type name: str + :param x509_certificates: The certificate or the certificate chain to merge. + :type x509_certificates: list[bytearray] + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :param tags: Application specific metadata in the form of key-value pairs. + :type tags: dict[str, str] + :return: The merged certificate + :rtype: ~azure.keyvault.certificates.models.Certificate + :raises: ~azure.core.exceptions.ResourceNotFoundError if the create certificate operation doesn't exist + """ + if enabled is not None: + attributes = self._client.models.CertificateAttributes( + enabled=enabled + ) + else: + attributes = None + bundle = self._client.merge_certificate( + vault_base_url=self.vault_url, + certificate_name=name, + x509_certificates=x509_certificates, + certificate_attributes=attributes, + tags=tags, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Certificate._from_certificate_bundle(certificate_bundle=bundle) + + @distributed_trace + def get_pending_certificate_signing_request( + self, + name, # type: str + **kwargs # type: **Any + ): + # type: (...) -> str + """Gets the Base64 pending certificate signing request (PKCS-10). + :param name: The name of the certificate + :type name: str + :param custom_headers: headers that will be added to the request + :type custom_headers: dict + :return: Base64 encoded pending certificate signing request (PKCS-10). + :rtype: str + :raises: ~azure.core.exceptions.ResourceNotFoundError if the pending csr doesn't exist + """ + error_map = {404: ResourceNotFoundError} + vault_base_url = self.vault_url + # Construct URL + url = '/certificates/{certificate-name}/pending' + path_format_arguments = { + 'vaultBaseUrl': self._client._serialize.url("vault_base_url", vault_base_url, 'str', skip_quote=True), + 'certificate-name': self._client._serialize.url("certificate_name", name, 'str') + } + url = self._client._client.format_url(url, **path_format_arguments) + + # Construct parameters + query_parameters = {} + query_parameters['api-version'] = self._client._serialize.query( + name="self.api_version", + data=self._client.api_version, + data_type='str' + ) + + # Construct headers + header_parameters = {} + header_parameters['Accept'] = 'application/pkcs10' + if self._client._config.generate_client_request_id: + header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) + + # Construct and send request + request = self._client._client.get( + url=url, + params=query_parameters, + headers=header_parameters + ) + pipeline_response = self._client._client._pipeline.run(request, stream=False, **kwargs) + response = pipeline_response.http_response + + if response.status_code not in [200]: + self._client.map_error(status_code=response.status_code, response=response, error_map=error_map) + raise self._client.models.KeyVaultErrorException(response, self._client._deserialize) + + deserialized = None + + if response.status_code == 200: + deserialized = response.body() if hasattr(response, 'body') else response.content + + return deserialized + + @distributed_trace + def get_issuer(self, name, **kwargs): + # type: (str, **Any) -> Issuer + """Gets the specified certificate issuer. + + Returns the specified certificate issuer resources in the key vault. + This operation requires the certificates/manageissuers/getissuers permission. + + :param name: The name of the issuer. + :type name: str + :return: The specified certificate issuer. + :rtype: ~azure.keyvault.certificates.models.Issuer + :raises: ~azure.core.exceptions.ResourceNotFoundError if the issuer doesn't exist + """ + issuer_bundle = self._client.get_certificate_issuer( + vault_base_url=self.vault_url, + issuer_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Issuer._from_issuer_bundle(issuer_bundle=issuer_bundle) + + @distributed_trace + def create_issuer( + self, + name, # type: str, + provider, # type: str, + account_id=None, # type: Optional[str] + password=None, # type: Optional[str] + organization_id=None, # type: Optional[str] + admin_details=None, # type: Optional[List[AdministratorDetails]] + enabled=None, # type: Optional[bool] + **kwargs # type: **Any + ): + # type: (...) -> Issuer + """Sets the specified certificate issuer. + + The SetCertificateIssuer operation adds or updates the specified + certificate issuer. This operation requires the certificates/setissuers + permission. + + :param name: The name of the issuer. + :type name: str + :param provider: The issuer provider. + :type provider: str + :param account_id: The user name/account name/account id. + :type account_id: str + :param password: The password/secret/account key. + :type password: str + :param organization_id: Id of the organization. + :type organization_id: str + :param admin_details: Details of the organization administrators of the certificate issuer. + :type admin_details: Iterable[AdministratorDetails] + :param enabled: Determines whether the object is enabled. + :type enabled: bool + :returns: The created Issuer + :rtype: ~azure.keyvault.certificates.models.Issuer + """ + if account_id or password: + issuer_credentials = self._client.models.IssuerCredentials(account_id=account_id, password=password) + else: + issuer_credentials = None + if admin_details and admin_details[0]: + admin_details_to_pass = [self._client.models.AdministratorDetails( + first_name=admin_detail.first_name, + last_name=admin_detail.last_name, + email_address=admin_detail.email, + phone=admin_detail.phone + ) for admin_detail in admin_details] + else: + admin_details_to_pass = admin_details + if organization_id or admin_details: + organization_details = self._client.models.OrganizationDetails( + id=organization_id, + admin_details=admin_details_to_pass + ) + else: + organization_details = None + if enabled is not None: + issuer_attributes = self._client.models.IssuerAttributes(enabled=enabled) + else: + issuer_attributes = None + issuer_bundle = self._client.set_certificate_issuer( + vault_base_url=self.vault_url, + issuer_name=name, + provider=provider, + credentials=issuer_credentials, + organization_details=organization_details, + attributes=issuer_attributes, + **kwargs + ) + return Issuer._from_issuer_bundle(issuer_bundle=issuer_bundle) + + @distributed_trace + def update_issuer( + self, + name, # type: str, + provider=None, # type: Optional[str], + account_id=None, # type: Optional[str] + password=None, # type: Optional[str] + organization_id=None, # type: Optional[str] + admin_details=None, # type: Optional[List[AdministratorDetails]] + enabled=None, # type: Optional[bool] + **kwargs # type: **Any + ): + # type: (...) -> Issuer + """Updates the specified certificate issuer. + + Performs an update on the specified certificate issuer entity. + THis operation requires the certificates/setissuers permission. + + :param name: The name of the issuer. + :type name: str + :param provider: The issuer provider. + :type provider: str + :param account_id: The username / account name / account key. + :type account_id: str + :param password: The password / secret / account key. + :type password: str + :param organization_id: Id of the organization + :type organization_id: str + :param admin_details: Details of the organization administrators of the certificate issuer. + :type admin_details: Iterable[AdministratorDetails] + :param enabled: Determines whether the issuer is enabled. + :type enabled: bool + :return: The updated issuer + :rtype: ~azure.keyvault.certificates.models.Issuer + :raises: ~azure.core.exceptions.ResourceNotFoundError if the issuer doesn't exist + """ + if account_id or password: + issuer_credentials = self._client.models.IssuerCredentials(account_id=account_id, password=password) + else: + issuer_credentials = None + if admin_details and admin_details[0]: + admin_details_to_pass = [self._client.models.AdministratorDetails( + first_name=admin_detail.first_name, + last_name=admin_detail.last_name, + email_address=admin_detail.email, + phone=admin_detail.phone + ) for admin_detail in admin_details] + else: + admin_details_to_pass = admin_details + if organization_id or admin_details: + organization_details = self._client.models.OrganizationDetails( + id=organization_id, + admin_details=admin_details_to_pass + ) + else: + organization_details = None + if enabled is not None: + issuer_attributes = self._client.models.IssuerAttributes(enabled=enabled) + else: + issuer_attributes = None + issuer_bundle = self._client.update_certificate_issuer( + vault_base_url=self.vault_url, + issuer_name=name, + provider=provider, + credentials=issuer_credentials, + organization_details=organization_details, + attributes=issuer_attributes, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Issuer._from_issuer_bundle(issuer_bundle=issuer_bundle) + + @distributed_trace + def delete_issuer(self, name, **kwargs): + # type: (str, **Any) -> Issuer + """Deletes the specified certificate issuer. + + Permanently removes the specified certificate issuer from the vault. + This operation requires the certificates/manageissuers/deleteissuers permission. + + :param name: The name of the issuer. + :type name: str + :return: Issuer + :rtype: ~azure.keyvault.certificates.models.Issuer + :raises: ~azure.core.exceptions.ResourceNotFoundError if the issuer doesn't exist + """ + issuer_bundle = self._client.delete_certificate_issuer( + vault_base_url=self.vault_url, + issuer_name=name, + error_map={404: ResourceNotFoundError}, + **kwargs + ) + return Issuer._from_issuer_bundle(issuer_bundle=issuer_bundle) + + @distributed_trace + def list_issuers(self, **kwargs): + # type: (**Any) -> Iterable[IssuerBase] + """List certificate issuers for the key vault. + + Returns the set of certificate issuer resources in the key + vault. This operation requires the certificates/manageissuers/getissuers + permission. + + :return: An iterator like instance of Issuers + :rtype: Iterable[~azure.keyvault.certificates.models.Issuer] + """ + max_page_size = kwargs.pop("max_page_size", None) + return self._client.get_certificate_issuers( + vault_base_url=self.vault_url, + maxresults=max_page_size, + cls=lambda objs: [IssuerBase._from_issuer_item(issuer_item=x) for x in objs], + **kwargs + ) diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/enums.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/enums.py new file mode 100644 index 000000000000..d0b1283d3b87 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/enums.py @@ -0,0 +1,52 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from enum import Enum + + +class ActionType(str, Enum): + """The supported action types for the lifetime of a certificate""" + + email_contacts = "EmailContacts" + auto_renew = "AutoRenew" + + +class SecretContentType(str, Enum): + """Content type of the secrets as specified in Certificate Policy""" + + PFX = 'application/x-pkcs12' + PEM = 'application/x-pem-file' + + +class KeyUsageType(str, Enum): + """The supported types of key usages""" + + digital_signature = "digitalSignature" + non_repudiation = "nonRepudiation" + key_encipherment = "keyEncipherment" + data_encipherment = "dataEncipherment" + key_agreement = "keyAgreement" + key_cert_sign = "keyCertSign" + c_rl_sign = "cRLSign" + encipher_only = "encipherOnly" + decipher_only = "decipherOnly" + + +class JsonWebKeyType(str, Enum): + """Supported key types""" + + ec = "EC" #: Elliptic Curve + ec_hsm = "EC-HSM" #: Elliptic Curve with a private key which is not exportable from the HSM + rsa = "RSA" #: RSA (https://tools.ietf.org/html/rfc3447) + rsa_hsm = "RSA-HSM" #: RSA with a private key which is not exportable from the HSM + oct = "oct" #: Octet sequence (used to represent symmetric keys) + + +class JsonWebKeyCurveName(str, Enum): + """Supported elliptic curves""" + + p_256 = "P-256" #: The NIST P-256 elliptic curve, AKA SECG curve SECP256R1. + p_384 = "P-384" #: The NIST P-384 elliptic curve, AKA SECG curve SECP384R1. + p_521 = "P-521" #: The NIST P-521 elliptic curve, AKA SECG curve SECP521R1. + p_256_k = "P-256K" #: The SECG SECP256K1 elliptic curve. diff --git a/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/models.py b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/models.py new file mode 100644 index 000000000000..63ca7a29cae4 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/azure/keyvault/certificates/models.py @@ -0,0 +1,1426 @@ +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See LICENSE.txt in the project root for +# license information. +# -------------------------------------------------------------------------- +# pylint:disable=too-many-lines + +from datetime import datetime + +from ._shared import parse_vault_id +from ._shared._generated.v7_0 import models +from .enums import ActionType, KeyUsageType, JsonWebKeyCurveName, JsonWebKeyType, SecretContentType + +try: + from typing import TYPE_CHECKING +except ImportError: + TYPE_CHECKING = False + +if TYPE_CHECKING: + from typing import Any, Dict, Optional + + +class AdministratorDetails(object): + """Details of the organization administrator of the certificate issuer. + + :param first_name: First name of the issuer. + :type first_name: str + :param last_name: Last name of the issuer. + :type last_name: str + :param email: email of the issuer. + :type email: str + :param phone: phone number of the issuer. + :type phone: str + """ + + def __init__(self, first_name=None, last_name=None, email=None, phone=None): + # type: (Optional[str], Optional[str], Optional[str], Optional[str]) -> None + self._first_name = first_name + self._last_name = last_name + self._phone = phone + self._email = email + + @classmethod + def _from_admin_details_bundle(cls, admin_details_bundle): + # type: (models.AdministratorDetails) -> AdministratorDetails + """Construct a AdministratorDetails from an autorest-generated AdministratorDetailsBundle""" + return cls( + email=admin_details_bundle.email_address, + first_name=admin_details_bundle.first_name, + last_name=admin_details_bundle.last_name, + phone=admin_details_bundle.phone + ) + + @property + def email(self): + # type: () -> str + """:rtype: str""" + return self._email + + @property + def first_name(self): + # type: () -> str + """:rtype: str""" + return self._first_name + + @property + def last_name(self): + # type: () -> str + """:rtype: str""" + return self._last_name + + @property + def phone(self): + # type: () -> str + """:rtype: str""" + return self._phone + + +class Error(object): + """The key vault server error. + + :param code: The error code. + :type code: str + :param message: The error message. + :type message: str + :param inner_error: The error object itself + :type inner_error: ~azure.keyvault.certificates.Error + """ + + def __init__(self, code, message, inner_error): + # type: (str, str, models.Error, **Any) -> None + self._code = code + self._message = message + self._inner_error = inner_error + + @property + def code(self): + # type: () -> str + """The error code. + + :rtype: str + """ + return self._code + + @property + def message(self): + # type: () -> str + """The error message. + + :rtype: str + """ + return self._message + + @property + def inner_error(self): + # type: () -> Error + """The error itself + + :return models.Error: + """ + return self._inner_error + + +class CertificateBase(object): + """Certificate base consists of a certificates metadata. + + :param attributes: The certificate management attributes. + :type attributes: ~azure.keyvault.certificates.CertificateAttributes + :param cert_id: The certificate id. + :type cert_id: str + :param thumbprint: Thumpbrint of the certificate + :type thumbprint: bytes + """ + def __init__(self, attributes=None, cert_id=None, thumbprint=None, **kwargs): + # type: (Optional[models.CertificateAttributes], Optional[str], Optional[bytes], **Any) -> None + self._attributes = attributes + self._id = cert_id + self._vault_id = parse_vault_id(cert_id) + self._thumbprint = thumbprint + self._tags = kwargs.get("tags", None) + + @classmethod + def _from_certificate_item(cls, certificate_item): + # type: (models.CertificateItem) -> CertificateBase + """Construct a CertificateBase from an autorest-generated CertificateItem""" + return cls( + attributes=certificate_item.attributes, + cert_id=certificate_item.id, + thumbprint=certificate_item.x509_thumbprint, + tags=certificate_item.tags, + ) + + @property + def id(self): + # type: () -> str + """Certificate identifier. + + :rtype: str + """ + return self._id + + @property + def name(self): + # type: () -> str + """The name of the certificate. + + :rtype: str + """ + return self._vault_id.name + + @property + def enabled(self): + # type: () -> bool + """Whether the certificate is enabled or not. + + :rtype: bool + """ + return self._attributes.enabled if self._attributes else None + + @property + def not_before(self): + # type: () -> datetime + """The datetime before which the certificate is not valid. + + :rtype: datetime + """ + return self._attributes.not_before if self._attributes else None + + @property + def expires(self): + # type: () -> datetime + """The datetime when the certificate expires. + + :rtype: datetime + """ + return self._attributes.expires if self._attributes else None + + @property + def created(self): + # type: () -> datetime + """The datetime when the certificate is created. + + :rtype: datetime + """ + return self._attributes.created if self._attributes else None + + @property + def updated(self): + # type: () -> datetime + """The datetime when the certificate was last updated. + + :rtype: datetime + """ + return self._attributes.updated if self._attributes else None + + @property + def recovery_level(self): + # type: () -> models.DeletionRecoveryLevel + """The deletion recovery level currently in effect for the certificate. + + :rtype: models.DeletionRecoveryLevel + """ + return self._attributes.recovery_level if self._attributes else None + + @property + def vault_url(self): + # type: () -> str + """The name of the vault that the certificate is created in. + + :rtype: str + """ + return self._vault_id.vault_url + + @property + def thumbprint(self): + # type: () -> bytes + """Thumbprint of the certificate. + + :rtype: bytes + """ + return self._thumbprint + + @property + def tags(self): + # type: () -> Dict[str, str] + """Application specific metadata in the form of key-value pairs. + + :rtype: str + """ + return self._tags + + @property + def version(self): + # type: () -> str + """The version of the certificate + + :rtype: str + """ + return self._vault_id.version + + +class Certificate(CertificateBase): + """Consists of a certificate and its attributes + + :param policy: The management policy for the certificate. + :type policy: ~azure.keyvault.certificates.CertificatePolicy + :param cert_id: The certificate id. + :type cert_id: str + :param thumbprint: Thumpbrint of the certificate + :type thumbprint: bytes + :param key_id: The key id. + :type key_id: str + :param secret_id: The secret id. + :type secret_id: str + :param attributes: The certificate attributes. + :type attributes: ~azure.keyvault.certificates.CertificateAttributes + :param cer: CER contents of the X509 certificate. + :type cer: bytearray + """ + def __init__( + self, + policy, # type: models.CertificatePolicy + cert_id, # type: Optional[str] + thumbprint=None, # type: Optional[bytes] + key_id=None, # type: Optional[str] + secret_id=None, # type: Optional[str] + attributes=None, # type: Optional[CertificateAttributes] + cer=None, # type: Optional[bytes] + **kwargs # type: **Any + ): + # type: (...) -> None + super(Certificate, self).__init__(attributes=attributes, cert_id=cert_id, thumbprint=thumbprint, **kwargs) + self._key_id = key_id + self._secret_id = secret_id + self._policy = policy + self._cer = cer + + @classmethod + def _from_certificate_bundle(cls, certificate_bundle): + # type: (models.CertificateBundle) -> Certificate + """Construct a certificate from an autorest-generated certificateBundle""" + # pylint:disable=protected-access + return cls( + attributes=certificate_bundle.attributes, + cert_id=certificate_bundle.id, + thumbprint=certificate_bundle.x509_thumbprint, + key_id=certificate_bundle.kid, + secret_id=certificate_bundle.sid, + policy=CertificatePolicy._from_certificate_policy_bundle(certificate_bundle.policy), + cer=certificate_bundle.cer, + tags=certificate_bundle.tags, + ) + + @property + def key_id(self): + # type: () -> str + """:rtype: str""" + return self._key_id + + @property + def secret_id(self): + # type: () -> str + """:rtype: str""" + return self._secret_id + + @property + def policy(self): + # type: () -> CertificatePolicy + """The management policy of the certificate. + + :rtype: CertificatePolicy + """ + return self._policy + + @property + def cer(self): + # type: () -> bytes + """The CER contents of the certificate. + + :rtype: bytes + """ + return self._cer + + +class CertificateOperation(object): + # pylint:disable=too-many-instance-attributes + """A certificate operation is returned in case of asynchronous requests. + + :param cert_operation_id: The certificate id. + :type cert_operation_id: str + :param issuer_name: Name of the operation's issuer object or reserved names; + for example, 'Self' or 'Unknown + :type issuer_name: str + :param certificate_type: Type of certificate requested from the issuer provider. + :type certificate_type: str + :param certificate_transparency: Indicates if the certificate this operation is + running for is published to certificate transparency logs. + :type certificate_transparency: bool + :param csr: The certificate signing request (CSR) that is being used in the certificate + operation. + :type csr: bytearray + :param cancellation_requested: Indicates if cancellation was requested on the certificate + operation. + :type cancellation_requested: bool + :param status: Status of the certificate operation. + :type status: str + :param status_details: The status details of the certificate operation + :type status_details: str + :param error: Error encountered, if any, during the certificate operation. + :type ~azure.keyvault.certificates.Error + :param target: Location which contains the result of the certificate operation. + :type target: str + :param request_id: Identifier for the certificate operation. + :type request_id: str + """ + def __init__( + self, + cert_operation_id=None, # type: Optional[str] + issuer_name=None, # type: Optional[str] + certificate_type=None, # type: Optional[str] + certificate_transparency=False, # type: Optional[bool] + csr=None, # type: Optional[bytes] + cancellation_requested=False, # type: Optional[bool] + status=None, # type: Optional[str] + status_details=None, # type: Optional[str] + error=None, # type: Optional[models.Error] + target=None, # type: Optional[str] + request_id=None # type: Optional[str] + ): + # type: (...) -> None + self._id = cert_operation_id + self._vault_id = parse_vault_id(cert_operation_id) + self._issuer_name = issuer_name + self._certificate_type = certificate_type + self._certificate_transparency = certificate_transparency + self._csr = csr + self._cancellation_requested = cancellation_requested + self._status = status + self._status_details = status_details + self._error = error + self._target = target + self._request_id = request_id + + @classmethod + def _from_certificate_operation_bundle(cls, certificate_operation_bundle): + # type: (models.CertificateOperation) -> CertificateOperation + """Construct a CertificateOperation from an autorest-generated CertificateOperation""" + return cls( + cert_operation_id=certificate_operation_bundle.id, + issuer_name=(certificate_operation_bundle.issuer_parameters.name + if certificate_operation_bundle.issuer_parameters else None), + certificate_type=(certificate_operation_bundle.issuer_parameters.certificate_type + if certificate_operation_bundle.issuer_parameters else None), + certificate_transparency=(certificate_operation_bundle.issuer_parameters.certificate_transparency + if certificate_operation_bundle.issuer_parameters else None), + csr=certificate_operation_bundle.csr, + cancellation_requested=certificate_operation_bundle.cancellation_requested, + status=certificate_operation_bundle.status, + status_details=certificate_operation_bundle.status_details, + error=certificate_operation_bundle.error, + target=certificate_operation_bundle.target, + request_id=certificate_operation_bundle.request_id, + ) + + @property + def id(self): + # type: () -> str + """:rtype: str""" + return self._id + + @property + def name(self): + # type: () -> str + """:rtype: str""" + return self._vault_id.name + + @property + def issuer_name(self): + # type: () -> str + """The name of the issuer of the certificate. + + :rtype: str + """ + return self._issuer_name + + @property + def certificate_type(self): + # type: () -> str + """Type of certificate to be requested from the issuer provider. + + :rtype: str + """ + return self._certificate_type + + @property + def certificate_transparency(self): + # type: () -> bool + """Whether certificates generated under this policy should be published to certificate + transparency logs. + + :rtype: bool + """ + return self._certificate_transparency + + @property + def csr(self): + # type: () -> bytes + """The certificate signing request that is being used in this certificate operation. + + :rtype: bytes + """ + return self._csr + + @property + def cancellation_requested(self): + # type: () -> bool + """Whether cancellation was requested on the certificate operation. + + :rtype: bool + """ + return self._cancellation_requested + + @property + def status(self): + # type: () -> str + """:rtype: str""" + return self._status + + @property + def status_details(self): + # type: () -> str + """:rtype: str""" + return self._status_details + + @property + def error(self): + # type: () -> models.Error + """:rtype: models.Error""" + return self._error + + @property + def target(self): + # type: () -> str + """Location which contains the result of the certificate operation. + + :rtype: str + """ + return self._target + + @property + def request_id(self): + # type: () -> str + """Identifier for the certificate operation. + + :rtype: str + """ + return self._request_id + + +class CertificatePolicy(object): + """Management policy for a certificate. + + :param attributes: the certificate attributes. + :type attributes: ~azure.keyvault.certificates.models.CertificateAttributes + :param cert_policy_id: The certificate id. + :type cert_policy_id: str + :param key_properties: Properties of the key backing the certificate. + :type key_properties: ~azure.keyvault.certificates.models.KeyProperties + :param content_type: The media type (MIME type) of the secret backing the certificate. + :type content_type: ~azure.keyvault.certificates.SecretContentType or str + :param subject_name: The subject name of the certificate. Should be a valid X509 + distinguished name. + :type subject_name: str + :param validity_in_months: The duration that the certificate is valid in months. + :type validity_in_months: int + :param lifetime_actions: Actions that will be performed by Key Vault over the lifetime + of a certificate + :type lifetime_actions: Iterable[~azure.keyvault.certificates.LifetimeAction] + :param issuer_name: Name of the referenced issuer object or reserved names; for example, + 'Self' or 'Unknown" + :type issuer_name: str + :param certificate_type: Type of certificate to be requested from the issuer provider. + :type certificate_type: str + :param certificate_transparency: Indicates if the certificates generated under this policy + should be published to certificate transparency logs. + :type certificate_transparency: bool + :param san_emails: Subject alternative emails of the X509 object. Only one out of san_emails, + san_dns_names, and san_upns may be set. + :type san_emails: Iterable[str] + :param san_dns_names: Subject alternative DNS names of the X509 object. Only one out of + san_emails, san_dns_names, and san_upns may be set. + :type san_dns_names: Iterable[str] + :param san_upns: Subject alternative user principal names. Only one out of san_emails, + san_dns_names, and san_upns may be set. + :type san_upns: Iterable[str] + """ + # pylint:disable=too-many-instance-attributes + def __init__( + self, + attributes=None, # type: Optional[models.CertificateAttributes] + cert_policy_id=None, # type: Optional[str] + key_properties=None, # type: Optional[KeyProperties] + content_type=None, # type: Optional[models.SecretContentType] or str + subject_name=None, # type: Optional[str] + validity_in_months=None, # type: Optional[int] + lifetime_actions=None, # type: Optional[list[LifetimeAction]] + issuer_name=None, # type: Optional[str] + certificate_type=None, # type: Optional[str] + certificate_transparency=None, # type: Optional[bool] + **kwargs # type: **Any + ): + # type: (...) -> None + self._attributes = attributes + self._id = cert_policy_id + self._key_properties = key_properties + self._content_type = content_type + self._subject_name = subject_name + self._validity_in_months = validity_in_months + self._lifetime_actions = lifetime_actions + self._issuer_name = issuer_name + self._certificate_type = certificate_type + self._certificate_transparency = certificate_transparency + self._san_emails = kwargs.pop('san_emails', None) + self._san_dns_names = kwargs.pop('san_dns_names', None) + self._san_upns = kwargs.pop('san_upns', None) + + sans = [self._san_emails, self._san_upns, self._san_dns_names] + if len([x for x in sans if x is not None]) > 1: + raise ValueError("You can only set at most one of san_emails, san_dns_names, and san_upns") + + def _to_certificate_policy_bundle(self): + # type: (CertificatePolicy) -> models.CertificatePolicy + + """Construct a version emulating the generated CertificatePolicy from a wrapped CertificatePolicy""" + if self.issuer_name or self.certificate_type or self.certificate_transparency: + issuer_parameters = models.IssuerParameters( + name=self.issuer_name, + certificate_type=self.certificate_type, + certificate_transparency=self.certificate_transparency + ) + else: + issuer_parameters = None + + # pylint:disable=too-many-boolean-expressions + if (self.enabled is not None or + self.not_before is not None or + self.expires is not None or + self.created is not None or + self.updated is not None + or self.recovery_level): + attributes = models.CertificateAttributes( + enabled=self.enabled, + not_before=self.not_before, + expires=self.expires, + created=self.enabled, + updated=self.updated, + recovery_level=self.recovery_level + ) + else: + attributes = None + + if self.lifetime_actions: + lifetime_actions = [] + for lifetime_action in self.lifetime_actions: + lifetime_actions.append( + models.LifetimeAction( + trigger=models.Trigger( + lifetime_percentage=lifetime_action.lifetime_percentage, + days_before_expiry=lifetime_action.days_before_expiry + ), + action=models.Action(action_type=lifetime_action.action_type.value + if not isinstance(lifetime_action.action_type, str) + and lifetime_action.action_type + else lifetime_action.action_type) + ) + ) + else: + lifetime_actions = None + + # pylint:disable=too-many-boolean-expressions + if(self.subject_name or + (self.key_properties and self.key_properties.ekus) or + (self.key_properties and self.key_properties.key_usage) or + self.san_emails or + self.san_upns or + self.san_dns_names or + self.validity_in_months): + if self.key_properties and self.key_properties.key_usage: + key_usage = [k.value if not isinstance(k, str) else k for k in self.key_properties.key_usage] + else: + key_usage = None + + sans = [self._san_emails, self._san_upns, self._san_dns_names] + if len([x for x in sans if x is not None]) > 1: + raise ValueError("You can only set at most one of san_emails, san_dns_names, and san_upns") + + x509_certificate_properties = models.X509CertificateProperties( + subject=self.subject_name, + ekus=self.key_properties.ekus if self.key_properties else None, + subject_alternative_names=models.SubjectAlternativeNames( + emails=self.san_emails, + upns=self.san_upns, + dns_names=self.san_dns_names + ), + key_usage=key_usage, + validity_in_months=self.validity_in_months + ) + else: + x509_certificate_properties = None + + if (self.key_properties and + (self.key_properties.exportable or + self.key_properties.key_type or + self.key_properties.key_size or + self.key_properties.reuse_key or + self.key_properties.curve)): + key_properties = models.KeyProperties( + exportable=self.key_properties.exportable, + key_type=(self.key_properties.key_type.value + if not isinstance(self.key_properties.key_type, str) and self.key_properties.key_type + else self.key_properties.key_type), + key_size=self.key_properties.key_size, + reuse_key=self.key_properties.reuse_key, + curve=(self.key_properties.curve.value + if not isinstance(self.key_properties.curve, str) and self.key_properties.curve + else self.key_properties.curve) + ) + else: + key_properties = None + + if self.content_type: + secret_properties = models.SecretProperties(content_type=self.content_type.value + if not isinstance(self.content_type, str) and self.content_type + else self.content_type) + else: + secret_properties = None + + policy_bundle = models.CertificatePolicy( + id=self.id, + key_properties=key_properties, + secret_properties=secret_properties, + x509_certificate_properties=x509_certificate_properties, + lifetime_actions=lifetime_actions, + issuer_parameters=issuer_parameters, + attributes=attributes + ) + return policy_bundle + + @classmethod + def _from_certificate_policy_bundle(cls, certificate_policy_bundle): + # type: (models.CertificatePolicy) -> CertificatePolicy + """Construct a CertificatePolicy from an autorest-generated CertificatePolicy""" + if certificate_policy_bundle.lifetime_actions: + lifetime_actions = [ + LifetimeAction( + action_type=(ActionType(item.action.action_type) + if item.action.action_type else None), + lifetime_percentage=item.trigger.lifetime_percentage, + days_before_expiry=item.trigger.days_before_expiry, + ) + for item in certificate_policy_bundle.lifetime_actions + ] + else: + lifetime_actions = None + key_properties_bundle = certificate_policy_bundle.key_properties + # pylint:disable=too-many-boolean-expressions + if key_properties_bundle: + if certificate_policy_bundle.x509_certificate_properties and \ + certificate_policy_bundle.x509_certificate_properties.key_usage: + key_usage = [KeyUsageType(k) for k in certificate_policy_bundle.x509_certificate_properties.key_usage] + else: + key_usage = None + + key_properties = KeyProperties( + exportable=certificate_policy_bundle.key_properties.exportable, + key_type=(JsonWebKeyType(certificate_policy_bundle.key_properties.key_type) + if certificate_policy_bundle.key_properties.key_type else None), + key_size=certificate_policy_bundle.key_properties.key_size, + reuse_key=certificate_policy_bundle.key_properties.reuse_key, + curve=(JsonWebKeyCurveName(certificate_policy_bundle.key_properties.curve) + if certificate_policy_bundle.key_properties.curve else None), + ekus=(certificate_policy_bundle.x509_certificate_properties.ekus + if certificate_policy_bundle.x509_certificate_properties else None), + key_usage=key_usage, + ) + else: + key_properties = None + return cls( + attributes=certificate_policy_bundle.attributes, + cert_policy_id=certificate_policy_bundle.id, + issuer_name=(certificate_policy_bundle.issuer_parameters.name + if certificate_policy_bundle.issuer_parameters else None), + certificate_type=(certificate_policy_bundle.issuer_parameters.certificate_type + if certificate_policy_bundle.issuer_parameters else None), + certificate_transparency=(certificate_policy_bundle.issuer_parameters.certificate_transparency + if certificate_policy_bundle.issuer_parameters else None), + lifetime_actions=lifetime_actions, + subject_name=(certificate_policy_bundle.x509_certificate_properties.subject + if certificate_policy_bundle.x509_certificate_properties else None), + key_properties=key_properties, + content_type=(SecretContentType(certificate_policy_bundle.secret_properties.content_type) + if certificate_policy_bundle.secret_properties else None), + san_emails=(certificate_policy_bundle.x509_certificate_properties.subject_alternative_names.emails + if certificate_policy_bundle.x509_certificate_properties and + certificate_policy_bundle.x509_certificate_properties.subject_alternative_names else None), + san_upns=(certificate_policy_bundle.x509_certificate_properties.subject_alternative_names.upns + if certificate_policy_bundle.x509_certificate_properties and + certificate_policy_bundle.x509_certificate_properties.subject_alternative_names else None), + san_dns_names=(certificate_policy_bundle.x509_certificate_properties.subject_alternative_names.dns_names + if certificate_policy_bundle.x509_certificate_properties and + certificate_policy_bundle.x509_certificate_properties.subject_alternative_names else None), + validity_in_months=(certificate_policy_bundle.x509_certificate_properties.validity_in_months + if certificate_policy_bundle.x509_certificate_properties else None) + ) + + @property + def id(self): + # type: () -> str + """:rtype: str""" + return self._id + + @property + def key_properties(self): + # type: () -> models.KeyProperties + """Properties of the key backing the certificate. + + :rtype: KeyProperties + """ + return self._key_properties + + @property + def content_type(self): + # type: () -> models.SecretContentType + """The media type (MIME type). + + :rtype: SecretContentType + """ + return self._content_type + + @property + def subject_name(self): + # type: () -> str + """:rtype: str""" + return self._subject_name + + @property + def san_emails(self): + # type: () -> list[str] + """The subject alternative email addresses. + + :rtype: list[str] + """ + return self._san_emails + + @property + def san_dns_names(self): + # type: () -> list[str] + """The subject alternative domain names. + + :rtype: list[str] + """ + return self._san_dns_names + + @property + def san_upns(self): + # type: () -> list[str] + """The subject alternative user principal names. + + :rtype: list[str] + """ + return self._san_upns + + @property + def validity_in_months(self): + # type: () -> int + """The duration that the certificate is valid for in months. + + :rtype: int + """ + return self._validity_in_months + + @property + def lifetime_actions(self): + # type: () -> list[LifetimeAction] + """Actions and their triggers that will be performed by Key Vault over + the lifetime of the certificate. + + :rtype: list[LifetimeAction] + """ + return self._lifetime_actions + + @property + def issuer_name(self): + # type: () -> str + """Name of the referenced issuer object or reserved names for the issuer + of the certificate. + + :rtype: str + """ + return self._issuer_name + + @property + def certificate_type(self): + # type: () -> str + """Type of certificate requested from the issuer provider. + + :rtype: str + """ + return self._certificate_type + + @property + def certificate_transparency(self): + # type: () -> bool + """Whether the certificates generated under this policy should be published + to certificate transparency logs. + + :rtype: bool + """ + return self._certificate_transparency + + @property + def enabled(self): + # type: () -> bool + """Whether the certificate is enabled or not. + + :rtype: bool + """ + return self._attributes.enabled if self._attributes else None + + @property + def not_before(self): + # type: () -> datetime + """The datetime before which the certificate is not valid. + + :rtype: datetime + """ + return self._attributes.not_before if self._attributes else None + + @property + def expires(self): + # type: () -> datetime + """The datetime when the certificate expires. + + :rtype: datetime + """ + return self._attributes.expires if self._attributes else None + + @property + def created(self): + # type: () -> datetime + """The datetime when the certificate is created. + + :rtype: datetime + """ + return self._attributes.created if self._attributes else None + + @property + def updated(self): + # type: () -> datetime + """The datetime when the certificate was last updated. + + :rtype: datetime + """ + return self._attributes.updated if self._attributes else None + + @property + def recovery_level(self): + # type: () -> models.DeletionRecoveryLevel + """The deletion recovery level currently in effect for the certificate. + + :rtype: DeletionRecoveryLevel + """ + return self._attributes.recovery_level if self._attributes else None + + +class Contact(object): + """The contact information for the vault certificates. + + :param email: Email address of a contact for the certificate. + :type email: str + :param name: Name of a contact for the certificate. + :type name: str + :param phone: phone number of a contact for the certificate. + :type phone: str + """ + + def __init__(self, email=None, name=None, phone=None): + # type: (Optional[str], Optional[str], Optional[str]) -> None + self._email = email + self._name = name + self._phone = phone + + def _to_certificate_contacts_item(self): + # type: (Contact) -> models.Contact + return models.Contact( + email_address=self.email, + name=self.name, + phone=self.phone + ) + + @classmethod + def _from_certificate_contacts_item(cls, contact_item): + # type: (models.Contact) -> Contact + """Construct a Contact from an autorest-generated ContactItem.""" + return cls(email=contact_item.email_address, name=contact_item.name, phone=contact_item.phone) + + @property + def email(self): + # type: () -> str + """:rtype: str""" + return self._email + + @property + def name(self): + # type: () -> str + """:rtype: str""" + return self._name + + @property + def phone(self): + # type: () -> str + """:rtype: str""" + return self._phone + + +class IssuerBase(object): + """The base for the issuer containing the issuer metadata. + + :param issuer_id: the ID of the issuer. + :type issuer_id: str + """ + def __init__(self, issuer_id=None, provider=None): + # type: (Optional[str], Optional[str]) -> None + self._id = issuer_id + self._vault_id = parse_vault_id(issuer_id) + self._provider = provider + + @classmethod + def _from_issuer_item(cls, issuer_item): + # type: (models.CertificateIssuerItem) -> IssuerBase + """Construct a IssuerBase from an autorest-generated CertificateIssuerItem""" + return cls(issuer_id=issuer_item.id, provider=issuer_item.provider) + + @property + def id(self): + # type: () -> str + """:rtype: str""" + return self._id + + @property + def name(self): + # type: () -> str + # Issuer name is listed under version under vault_id + """:rtype: str""" + return self._vault_id.version + + @property + def provider(self): + # type: () -> str + """:rtype: str""" + return self._provider + + @property + def vault_url(self): + # type: () -> str + """The name of the vault with this issuer. + + :rtype: str + """ + return self._vault_id.vault_url + + +class Issuer(IssuerBase): + """The issuer for a Key Vault certificate. + + :param attributes: Attributes of the issuer object. Only populated by server. + :type attributes: ~azure.keyvault.v7_0.models.IssuerAttributes + :param provider: The issuer provider. + :type provider: str + :param issuer_id: The ID of the issuer. + :type issuer_id: str + :param account_id: The username / account name / account id. + :type account_id: str + :param password: The password / secret / account key. + :type password: str + :param organization_id: The ID of the organization. + :type organization_id: str + :param admin_details: Details of the organization administrator. + :type admin_details: List[~azure.keyvault.certificates.AdministratorDetails] + """ + def __init__( + self, + attributes=None, # type: Optional[models.IssuerAttributes] + provider=None, # type: Optional[str] + issuer_id=None, # type: Optional[str] + account_id=None, # type: Optional[str] + password=None, # type: Optional[str] + organization_id=None, # type: Optional[str] + admin_details=None, # type: Optional[List[AdministratorDetails]] + **kwargs # type: **Any + ): + # type: (...) -> None + super(Issuer, self).__init__(issuer_id=issuer_id, provider=provider, **kwargs) + self._attributes = attributes + self._account_id = account_id + self._password = password + self._organization_id = organization_id + self._admin_details = admin_details + + @classmethod + def _from_issuer_bundle(cls, issuer_bundle): + # type: (models.IssuerBundle) -> Issuer + """Construct a Issuer from an autorest-generated IssuerBundle""" + admin_details = [] + admin_details_service = issuer_bundle.organization_details.admin_details + if admin_details_service: + # pylint:disable=protected-access + for admin_detail in admin_details_service: + admin_details.append(AdministratorDetails._from_admin_details_bundle(admin_detail)) + return cls( + attributes=issuer_bundle.attributes, + issuer_id=issuer_bundle.id, + provider=issuer_bundle.provider, + account_id=issuer_bundle.credentials.account_id if issuer_bundle.credentials else None, + password=issuer_bundle.credentials.password if issuer_bundle.credentials else None, + organization_id=issuer_bundle.organization_details.id if issuer_bundle.organization_details else None, + admin_details=admin_details + ) + + @property + def enabled(self): + # type: () -> bool + """Whether the certificate is enabled or not. + + :rtype: bool + """ + return self._attributes.enabled if self._attributes else None + + @property + def created(self): + # type: () -> datetime + """The datetime when the certificate is created. + + :rtype: datetime + """ + return self._attributes.created if self._attributes else None + + @property + def updated(self): + # type: () -> datetime + """The datetime when the certificate was last updated. + + :rtype: datetime + """ + return self._attributes.updated if self._attributes else None + + @property + def account_id(self): + # type: () -> str + """THe username/ account name/ account id. + + :rtype: str + """ + return self._account_id + + @property + def password(self): + # type: () -> str + """The password / secret / account key. + + :rtype: str + """ + return self._password + + @property + def organization_id(self): + # type: () -> str + """:rtype: str""" + return self._organization_id + + @property + def admin_details(self): + # type: () -> List[AdministratorDetails] + """Details of the organization administrator of this issuer. + + :rtype: List[AdministratorDetails] + """ + return self._admin_details + + +class KeyProperties(object): + """Properties of the key pair backing a certificate. + + :param exportable: Indicates if the private key can be exported. + :type exportable: bool + :param key_type: The type of key pair to be used for the certificate. + Possible values include: 'EC', 'EC-HSM', 'RSA', 'RSA-HSM', 'oct' + :type str or ~azure.keyvault.certificates.enums.JsonWebKeyType + :param key_size: The key size in bits. For example: 2048, 3072, or 4096 + for RSA. + :type key_size: int + :param reuse_key: Indicates if the same key pair will be used on certificate + renewal. + :type reuse_key: bool + :param curve: Elliptic curve name. For valid values, see JsonWebKeyCurveName. + Possible values include: 'P-256', 'P-384', 'P-521', 'P-256K' + :type curve: str or ~azure.keyvault.certificates.enums.JsonWebKeyCurveName + :param ekus: The enhanced key usages. + :type ekus: list[str] + :param key_usage: List of key usages. + :type key_usage: list[str or ~azure.keyvault.certificates.KeyUsageType] + """ + def __init__( + self, + exportable=None, # type: Optional[bool] + key_type=None, # type: Optional[JsonWebKeyType] + key_size=None, # type: Optional[str] + reuse_key=None, # type: Optional[bool] + curve=None, # type: Optional[JsonWebKeyCurveName] + ekus=None, # type: Optional[list[str]] + key_usage=None # type: Optional[list[KeyUsageType]] + ): + # type: (...) -> None + self._exportable = exportable + self._key_type = key_type + self._key_size = key_size + self._reuse_key = reuse_key + self._curve = curve + self._ekus = ekus + self._key_usage = key_usage + + @property + def exportable(self): + # type: () -> bool + """Whether the private key can be exported. + + :rtype: bool + """ + return self._exportable + + @property + def key_type(self): + # type: () -> models.JsonWebKeyType + """The type of key pair to be used for the certificate. + + :rtype: models.JsonWebKeyType + """ + return self._key_type + + @property + def key_size(self): + # type: () -> int + """The key size in bits. + + :rtype: int + """ + return self._key_size + + @property + def reuse_key(self): + # type: () -> bool + """Whether the same key pair will be used on certificate renewal. + + :rtype: bool + """ + return self._reuse_key + + @property + def curve(self): + # type: () -> models.JsonWebKeyCurveName + """Elliptic curve name. + + :rtype: models.JsonWebKeyCurveName + """ + return self._curve + + @property + def ekus(self): + # type: () -> list[str] + """The enhanced key usage. + + :rtype: list[str] + """ + return self._ekus + + @property + def key_usage(self): + # type: () -> list[KeyUsageType] + """List of key usages. + + :rtype: list[KeyUsageType] + """ + return self._key_usage + + +class LifetimeAction(object): + """Action and its trigger that will be performed by certificate Vault over the + lifetime of a certificate. + + :param action_type: The type of the action. Possible values include: 'EmailContacts', + 'AutoRenew' + :type action_type: str or ~azure.keyvault.certificates.enums.ActionType + :param lifetime_percentage: Percentage of lifetime at which to trigger. Value + should be between 1 and 99. + :type lifetime_percentage: int + :param days_before_expiry: Days before expiry to attempt renewal. Value should be between + 1 and validity_in_months multiplied by 27. I.e., if validity_in_months is 36, then value + should be between 1 and 972 (36 * 27). + :type days_before_expiry: int + """ + + def __init__(self, action_type, lifetime_percentage=None, days_before_expiry=None): + # type: (ActionType, Optional[int], Optional[int]) -> None + self._lifetime_percentage = lifetime_percentage + self._days_before_expiry = days_before_expiry + self._action_type = action_type + + @property + def lifetime_percentage(self): + # type: () -> int + """Percentage of lifetime at which to trigger. + + :rtype: int + """ + return self._lifetime_percentage + + @property + def days_before_expiry(self): + # type: () -> int + """Days before expiry to attempt renewal. + + :rtype: int + """ + return self._days_before_expiry + + @property + def action_type(self): + # type: () -> str + """The type of the action that will be executed. + Valid values are "EmailContacts" and "AutoRenew" + + :rtype: str or models.ActionType + """ + return self._action_type + + +class DeletedCertificate(Certificate): + """A Deleted Certificate consisting of its previous id, attributes and its + tags, as well as information on when it will be purged. + + :param attributes: The certificate attributes + :type attributes: ~azure.keyvault.certifictaes.CertificateAttributes + :param cert_id: The certificate id. + :type cert_id: str + :param thumbprint: Thumbprint of the certificate. + :type thumbprint: bytes + :param key_id: The key id. + :type key_id: str + :param secret_id: The secret id. + :type secret_id: str + :param policy: The management policy of the deleted certificate. + :type policy: ~azure.keyvault.certificates.CertificatePolicy + :param cer: CER contents of the X509 certificate. + :type cer: bytearray + :param deleted_date: The time when the certificate was deleted, in UTC + :type deleted_date: datetime + :param recovery_id: The url of the recovery object, used to identify and + recover the deleted certificate. + :type recovery_id: str + :param scheduled_purge_date: The time when the certificate is scheduled to + be purged, in UTC + :type scheduled_purge_date: datetime + """ + + def __init__( + self, + attributes=None, # type: Optional[CertificateAttributes] + cert_id=None, # type: Optional[str] + thumbprint=None, # type: Optional[bytes] + key_id=None, # type: Optional[str] + secret_id=None, # type: Optional[str] + policy=None, # type: Optional[CertificatePolicy] + cer=None, # type: Optional[bytes] + deleted_date=None, # type: Optional[datetime] + recovery_id=None, # type: Optional[str] + scheduled_purge_date=None, # type: Optional[datetime] + **kwargs # type: **Any + ): + # type: (...) -> None + super(DeletedCertificate, self).__init__( + policy=policy, + cert_id=cert_id, + thumbprint=thumbprint, + key_id=key_id, + secret_id=secret_id, + attributes=attributes, + cer=cer, + **kwargs + ) + self._deleted_date = deleted_date + self._recovery_id = recovery_id + self._scheduled_purge_date = scheduled_purge_date + + @classmethod + def _from_deleted_certificate_item(cls, deleted_certificate_item): + # type: (models.DeletedCertificateItem) -> DeletedCertificate + """Construct a DeletedCertificate from an autorest-generated DeletedCertificateItem""" + return cls( + attributes=deleted_certificate_item.attributes, + cert_id=deleted_certificate_item.id, + thumbprint=deleted_certificate_item.x509_thumbprint, + key_id=None, + secret_id=None, + policy=None, + cer=None, + deleted_date=deleted_certificate_item.deleted_date, + recovery_id=deleted_certificate_item.recovery_id, + scheduled_purge_date=deleted_certificate_item.scheduled_purge_date, + tags=deleted_certificate_item.tags, + ) + + @classmethod + def _from_deleted_certificate_bundle(cls, deleted_certificate_bundle): + # type: (models.DeletedCertificateBundle) -> DeletedCertificate + """Construct a DeletedCertificate from an autorest-generated DeletedCertificateItem""" + # pylint:disable=protected-access + return cls( + attributes=deleted_certificate_bundle.attributes, + cert_id=deleted_certificate_bundle.id, + thumbprint=deleted_certificate_bundle.x509_thumbprint, + key_id=deleted_certificate_bundle.kid, + secret_id=deleted_certificate_bundle.sid, + policy=CertificatePolicy._from_certificate_policy_bundle(deleted_certificate_bundle.policy), + cer=deleted_certificate_bundle.cer, + deleted_date=deleted_certificate_bundle.deleted_date, + recovery_id=deleted_certificate_bundle.recovery_id, + scheduled_purge_date=deleted_certificate_bundle.scheduled_purge_date, + tags=deleted_certificate_bundle.tags, + ) + + @property + def deleted_date(self): + # type: () -> datetime + """The datetime that the certificate was deleted. + + :rtype: datetime + """ + return self._deleted_date + + @property + def recovery_id(self): + # type: () -> str + """The url of the recovery object, used to identify and recover the deleted certificate. + + :rtype: str + """ + return self._recovery_id + + @property + def scheduled_purge_date(self): + # type: () -> datetime + """The datetime when the certificate is scheduled to be purged. + + :rtype: str + """ + return self._scheduled_purge_date diff --git a/sdk/keyvault/azure-keyvault-certificates/conftest.py b/sdk/keyvault/azure-keyvault-certificates/conftest.py new file mode 100644 index 000000000000..581f07a0c251 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/conftest.py @@ -0,0 +1,39 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import sys +import os + +# Ignore async tests for Python < 3.5 +collect_ignore_glob = [] +if sys.version_info < (3, 5): + collect_ignore_glob.append("tests/*_async.py") + +# get the run identifier for unique test runs +dirname = os.path.dirname(os.path.abspath(__file__)) +seed_filename = os.path.abspath(os.path.join(dirname, "tests", "seed.txt")) + +run_identifier_set = False + +try: + with open(seed_filename, "r") as f: + if os.path.getsize(seed_filename): + os.environ['RUN_IDENTIFIER'] = f.readline().strip() + run_identifier_set = True + + # if file exists but is empty + if not run_identifier_set: + if "RUN_IDENTIFIER" not in os.environ: + print("Please set your RUN_IDENTIFIER environment variable in seed.txt") + raise NameError + with open(seed_filename, "w") as f: + f.write(os.environ["RUN_IDENTIFIER"]) + +except FileNotFoundError: + # if file has not yet been created + if "RUN_IDENTIFIER" not in os.environ: + print("Please set your RUN_IDENTIFIER environment variable in seed.txt") + raise NameError + with open(seed_filename, "w") as f: + f.write(os.environ["RUN_IDENTIFIER"]) diff --git a/sdk/keyvault/azure-keyvault-certificates/dev_requirements.txt b/sdk/keyvault/azure-keyvault-certificates/dev_requirements.txt new file mode 100644 index 000000000000..e4a2fc1ce4b2 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/dev_requirements.txt @@ -0,0 +1,7 @@ +-e ../../core/azure-core +-e ../../../tools/azure-devtools +-e ../../../tools/azure-sdk-tools +-e ../../identity/azure-identity +-e ../azure-mgmt-keyvault +aiohttp>=3.0; python_version >= '3.5' +pytest-asyncio>=0.8.0; python_version > '3.4' diff --git a/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations.py b/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations.py new file mode 100644 index 000000000000..1f55b29ac9b8 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations.py @@ -0,0 +1,88 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import os +from azure.keyvault.certificates import CertificateClient +from azure.identity import DefaultAzureCredential +from azure.core.exceptions import HttpResponseError + +# ---------------------------------------------------------------------------------------------------------- +# Prerequistes - +# +# 1. An Azure Key Vault- +# https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli +# +# 2. Microsoft Azure Key Vault PyPI package - +# https://pypi.python.org/pypi/azure-keyvault-certificates/ +# +# 3. Microsoft Azure Identity package - +# https://pypi.python.org/pypi/azure-identity/ +# +# 4. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL. +# How to do this - https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates#createget-credentials) +# +# ---------------------------------------------------------------------------------------------------------- +# Sample - demonstrates the basic backup and restore operations on a vault(certificates) resource for Azure Key Vault +# +# 1. Create a certificate (create_certificate) +# +# 2. Backup a certificate (backup_certificate) +# +# 3. Delete a certificate (delete_certificate) +# +# 4. Purge a deleted certificate (purge_deleted_certificate) +# +# 5. Restore a certificate (restore_certificate) +# ---------------------------------------------------------------------------------------------------------- + +def run_sample(): + # Instantiate a certificate client that will be used to call the service. + # Notice that the client is using default Azure credentials. + # To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID', + # 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials. + VAULT_URL = os.environ["VAULT_URL"] + credential = DefaultAzureCredential() + client = CertificateClient(vault_url=VAULT_URL, credential=credential) + try: + + print("\n1. Create Certificate") + cert_name = 'BackupRestoreCertificate' + + # Let's create a certificate for your key vault. + # if the certificate already exists in the Key Vault, then a new version of the certificate is created. + # A long running poller is returned for the create certificate operation. + create_certificate_poller = client.create_certificate(name=cert_name) + + # the wait call awaits the completion of the create certificate operation + create_certificate_poller.wait() + print("Certificate with name '{0}' created.".format(cert_name)) + + # Backups are good to have, if in case certificates gets deleted accidentally. + # For long term storage, it is ideal to write the backup to a file. + print("\n2. Create a backup for an existing certificate") + certificate_backup = client.backup_certificate(name=cert_name) + print("Backup created for certificate with name '{0}'.".format(cert_name)) + + # The storage account certificate is no longer in use, so you can delete it. + client.delete_certificate(name=cert_name) + print("Deleted Certificate with name '{0}'".format(cert_name)) + + # In future, if the certificate is required again, we can use the backup value to restore it in the Key Vault. + print("\n3. Restore the certificate using the backed up certificate bytes") + certificate = client.restore_certificate(certificate_backup) + print("Restored Certificate with name '{0}'".format(certificate.name)) + + except HttpResponseError as e: + print("\nrun_sample has caught an error. {0}".format(e.message)) + + finally: + print("\nrun_sample done") + + +if __name__ == "__main__": + try: + run_sample() + + except Exception as e: + print("Top level Error: {0}".format(str(e))) diff --git a/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations_async.py b/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations_async.py new file mode 100644 index 000000000000..f49cedef1202 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations_async.py @@ -0,0 +1,99 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import asyncio +import time +import os +from azure.keyvault.certificates.aio import CertificateClient +from azure.identity.aio import DefaultAzureCredential +from azure.core.exceptions import HttpResponseError + +# ---------------------------------------------------------------------------------------------------------- +# Prerequistes - +# +# 1. An Azure Key Vault- +# https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli +# +# 2. Microsoft Azure Key Vault PyPI package - +# https://pypi.python.org/pypi/azure-keyvault-certificates/ +# +# 3. Microsoft Azure Identity package - +# https://pypi.python.org/pypi/azure-identity/ +# +# 4. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL. +# How to do this - https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates#createget-credentials) +# +# ---------------------------------------------------------------------------------------------------------- +# Sample - demonstrates the basic backup and restore operations on a vault(certificates) resource for Azure Key Vault +# +# 1. Create a certificate (create_certificate) +# +# 2. Backup a certificate (backup_certificate) +# +# 3. Delete a certificate (delete_certificate) +# +# 4. Purge a deleted certificate (purge_deleted_certificate) +# +# 5. Restore a certificate (restore_certificate) +# ---------------------------------------------------------------------------------------------------------- + +async def run_sample(): + # Instantiate a certificate client that will be used to call the service. + # Notice that the client is using default Azure credentials. + # To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID', + # 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials. + VAULT_URL = os.environ["VAULT_URL"] + credential = DefaultAzureCredential() + client = CertificateClient(vault_url=VAULT_URL, credential=credential) + try: + + print("\n1. Create Certificate") + cert_name = 'BackupRestoreCertificate' + + # Let's create a certificate for your key vault. + # if the certificate already exists in the Key Vault, then a new version of the certificate is created. + # An async poller is returned + create_certificate_poller = await client.create_certificate(name=cert_name) + await create_certificate_poller + print("Certificate with name '{0}' created.".format(cert_name)) + + # Backups are good to have, if in case certificates gets deleted accidentally. + # For long term storage, it is ideal to write the backup to a file. + print("\n2. Create a backup for an existing certificate") + certificate_backup = await client.backup_certificate(name=cert_name) + print("Backup created for certificate with name '{0}'.".format(cert_name)) + + # The storage account certificate is no longer in use, so you can delete it. + await client.delete_certificate(name=cert_name) + print("Deleted Certificate with name '{0}'".format(cert_name)) + + # Even though the certificate is deleted, it can still be recovered so its name cannot be reused. + # In order to be able to reuse the name during restoration, we must purge the certificate + # after the initial deletion. + print ("\nPurging certificate...") + await client.purge_deleted_certificate(name=cert_name) + # To ensure certificate is purged on the server side. + time.sleep(30) + print("Purged Certificate with name '{0}'".format(cert_name)) + + # In future, if the certificate is required again, we can use the backup value to restore it in the Key Vault. + print("\n3. Restore the certificate using the backed up certificate bytes") + certificate = await client.restore_certificate(certificate_backup) + print("Restored Certificate with name '{0}'".format(certificate.name)) + + except HttpResponseError as e: + print("\nrun_sample has caught an error. {0}".format(e.message)) + + finally: + print("\nrun_sample done") + + +if __name__ == "__main__": + try: + loop = asyncio.get_event_loop() + loop.run_until_complete(run_sample()) + loop.close() + + except Exception as e: + print("Top level Error: {0}".format(str(e))) \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/samples/hello_world.py b/sdk/keyvault/azure-keyvault-certificates/samples/hello_world.py new file mode 100644 index 000000000000..2b18cca14b21 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/samples/hello_world.py @@ -0,0 +1,115 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import datetime +import os +from azure.identity import DefaultAzureCredential +from azure.keyvault.certificates import CertificateClient, CertificatePolicy, KeyProperties, SecretContentType +from azure.core.exceptions import HttpResponseError + +# ---------------------------------------------------------------------------------------------------------- +# Prerequistes - +# +# 1. An Azure Key Vault- +# https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli +# +# 2. Microsoft Azure Key Vault PyPI package - +# https://pypi.python.org/pypi/azure-keyvault-certificates/ +# +# 3. Microsoft Azure Identity package - +# https://pypi.python.org/pypi/azure-identity/ +# +# 4. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL. +# How to do this - https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates#createget-credentials) +# +# ---------------------------------------------------------------------------------------------------------- +# Sample - demonstrates the basic CRUD operations on a vault(certificate) resource for Azure Key Vault +# +# 1. Create a new certificate (create_certificate) +# +# 2. Get an existing certificate (get_certificate) +# +# 3. Update an existing certificate (update_certificate) +# +# 4. Delete a certificate (delete_certificate) +# +# ---------------------------------------------------------------------------------------------------------- + +def run_sample(): + # Instantiate a certificate client that will be used to call the service. + # Notice that the client is using default Azure credentials. + # To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID', + # 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials. + VAULT_URL = os.environ["VAULT_URL"] + credential = DefaultAzureCredential() + client = CertificateClient(vault_url=VAULT_URL, credential=credential) + try: + # Let's create a certificate for holding bank account credentials valid for 1 year. + # if the certificate already exists in the Key Vault, then a new version of the certificate is created. + print("\n1. Create Certificate") + + # Before creating your certificate, let's create the management policy for your certificate. + # Here you specify the properties of the key, secret, and issuer backing your certificate, + # the X509 component of your certificate, and any lifetime actions you would like to be taken + # on your certificate + + # Alternatively, if you would like to use our default policy, don't pass a policy parameter to + # our certificate creation method + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['sdk.azure-int.net'] + ) + cert_name = "HelloWorldCertificate" + expires = datetime.datetime.utcnow() + datetime.timedelta(days=365) + create_certificate_poller = client.create_certificate(name=cert_name, policy=cert_policy, expires=expires) + create_certificate_poller.wait() + print("Certificate with name '{0}' created".format(cert_name)) + + # Let's get the bank certificate using its name + print("\n2. Get a Certificate by name") + bank_certificate = client.get_certificate(name=cert_name) + print("Certificate with name '{0}' was found with expiration date '{1}'.".format( + bank_certificate.name, + bank_certificate.expires) + ) + + # After one year, the bank account is still active, we need to update the expiry time of the certificate. + # The update method can be used to update the expiry attribute of the certificate. + print("\n3. Update a Certificate by name") + expires = bank_certificate.expires + datetime.timedelta(days=365) + updated_certificate = client.update_certificate(name=bank_certificate.name, expires=expires) + print("Certificate with name '{0}' was updated on date '{1}'".format( + bank_certificate.name, + updated_certificate.updated) + ) + print("Certificate with name '{0}' was updated to expire on '{1}'".format( + bank_certificate.name, + updated_certificate.expires) + ) + + # The bank account was closed, need to delete its credentials from the Key Vault. + print("\n4. Delete Certificate") + deleted_certificate = client.delete_certificate(name=bank_certificate.name) + print("Deleting Certificate..") + print("Certificate with name '{0}' was deleted.".format(deleted_certificate.name)) + + except HttpResponseError as e: + print("\nrun_sample has caught an error. {0}".format(e.message)) + + finally: + print("\nrun_sample done") + + +if __name__ == "__main__": + try: + run_sample() + + except Exception as e: + print("Top level Error: {0}".format(str(e))) diff --git a/sdk/keyvault/azure-keyvault-certificates/samples/hello_world_async.py b/sdk/keyvault/azure-keyvault-certificates/samples/hello_world_async.py new file mode 100644 index 000000000000..df8a0bf95058 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/samples/hello_world_async.py @@ -0,0 +1,110 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import asyncio +import datetime +import os +from azure.identity.aio import DefaultAzureCredential +from azure.keyvault.certificates.aio import CertificateClient +from azure.keyvault.certificates import CertificatePolicy, KeyProperties, SecretContentType +from azure.core.exceptions import HttpResponseError + +# ---------------------------------------------------------------------------------------------------------- +# Prerequistes - +# +# 1. An Azure Key Vault- +# https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli +# +# 2. Microsoft Azure Key Vault PyPI package - +# https://pypi.python.org/pypi/azure-keyvault-certificates/ +# +# 3. Microsoft Azure Identity package - +# https://pypi.python.org/pypi/azure-identity/ +# +# 4. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL. +# How to do this - https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates#createget-credentials) +# +# ---------------------------------------------------------------------------------------------------------- +# Sample - demonstrates the basic CRUD operations on a vault(certificate) resource for Azure Key Vault +# +# 1. Create a new certificate (create_certificate) +# +# 2. Get an existing certificate (get_certificate) +# +# 3. Update an existing certificate (update_certificate) +# +# 4. Delete a certificate (delete_certificate) +# +# ---------------------------------------------------------------------------------------------------------- + +async def run_sample(): + # Instantiate a certificate client that will be used to call the service. + # Notice that the client is using default Azure credentials. + # To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID', + # 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials. + VAULT_URL = os.environ["VAULT_URL"] + credential = DefaultAzureCredential() + client = CertificateClient(vault_url=VAULT_URL, credential=credential) + try: + # Let's create a certificate for holding bank account credentials valid for 1 year. + # if the certificate already exists in the Key Vault, then a new version of the certificate is created. + print("\n1. Create Certificate") + + # Before creating your certificate, let's create the management policy for your certificate. + # Here you specify the properties of the key, secret, and issuer backing your certificate, + # the X509 component of your certificate, and any lifetime actions you would like to be taken + # on your certificate + + # Alternatively, if you would like to use our default policy, don't pass a policy parameter to + # our certificate creation method + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['sdk.azure-int.net'] + ) + cert_name="HelloWorldCertificate" + expires = datetime.datetime.utcnow() + datetime.timedelta(days=365) + create_certificate_poller = await client.create_certificate(name=cert_name, policy=cert_policy, expires=expires) + await create_certificate_poller + print("Certificate with name '{0}' created".format(cert_name)) + + # Let's get the bank certificate using its name + print("\n2. Get a Certificate by name") + bank_certificate = await client.get_certificate(name=cert_name) + print("Certificate with name '{0}' was found with expiration date '{1}'.".format(bank_certificate.name, bank_certificate.expires)) + + # After one year, the bank account is still active, we need to update the expiry time of the certificate. + # The update method can be used to update the expiry attribute of the certificate. + print("\n3. Update a Certificate by name") + expires = bank_certificate.expires + datetime.timedelta(days=365) + updated_certificate = await client.update_certificate(name=bank_certificate.name, expires=expires) + print("Certificate with name '{0}' was updated on date '{1}'".format(bank_certificate.name, updated_certificate.updated)) + print("Certificate with name '{0}' was updated to expire on '{1}'".format(bank_certificate.name, updated_certificate.expires)) + + # The bank account was closed, need to delete its credentials from the Key Vault. + print("\n4. Delete Certificate") + deleted_certificate = await client.delete_certificate(name=bank_certificate.name) + print("Deleting Certificate..") + print("Certificate with name '{0}' was deleted.".format(deleted_certificate.name)) + + except HttpResponseError as e: + print("\nrun_sample has caught an error. {0}".format(e.message)) + + finally: + print("\nrun_sample done") + + +if __name__ == "__main__": + try: + loop = asyncio.get_event_loop() + loop.run_until_complete(run_sample()) + loop.close() + + except Exception as e: + print("Top level Error: {0}".format(str(e))) \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/samples/list_operations.py b/sdk/keyvault/azure-keyvault-certificates/samples/list_operations.py new file mode 100644 index 000000000000..c5e21ce7b7d7 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/samples/list_operations.py @@ -0,0 +1,126 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import datetime +import os +from azure.keyvault.certificates import CertificateClient +from azure.identity import DefaultAzureCredential +from azure.core.exceptions import HttpResponseError + +# ---------------------------------------------------------------------------------------------------------- +# Prerequistes - +# +# 1. An Azure Key Vault- +# https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli +# +# 2. Microsoft Azure Key Vault PyPI package - +# https://pypi.python.org/pypi/azure-keyvault-certificates/ +# +# 3. Microsoft Azure Identity package - +# https://pypi.python.org/pypi/azure-identity/ +# +# 4. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL. +# How to do this - https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates#createget-credentials) +# +# ---------------------------------------------------------------------------------------------------------- +# Sample - demonstrates the basic list operations on a vault(certificate) resource for Azure Key Vault. +# The vault has to be soft-delete enabled to perform one of the following operations: https://docs.microsoft.com/en-us/azure/key-vault/key-vault-ovw-soft-delete +# +# 1. Create certificate (create_certificate) +# +# 2. List certificates from the Key Vault (list_certificates) +# +# 3. List certificate versions from the Key Vault (list_certificate_versions) +# +# 4. List deleted certificates from the Key Vault (list_deleted_certificates). The vault has to be soft-delete enabled +# to perform this operation. +# +# ---------------------------------------------------------------------------------------------------------- + +def run_sample(): + # Instantiate a certificate client that will be used to call the service. Notice that the client is using default + # Azure credentials. To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID', + # 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials. + VAULT_URL = os.environ["VAULT_URL"] + credential = DefaultAzureCredential() + client = CertificateClient(vault_url=VAULT_URL, credential=credential) + try: + # Let's create a certificate for holding storage and bank accounts credentials. If the certificate + # already exists in the Key Vault, then a new version of the certificate is created. + print("\n1. Create Certificate") + bank_cert_name = "BankListCertificate" + storage_cert_name = "StorageListCertificate" + expires = datetime.datetime.utcnow() + datetime.timedelta(days=365) + + bank_certificate_poller = client.create_certificate(name=bank_cert_name, expires=expires) + storage_certificate_poller = client.create_certificate(name=storage_cert_name) + + # await the creation of the bank and storage certificate + bank_certificate_poller.wait() + storage_certificate_poller.wait() + + print("Certificate with name '{0}' was created.".format(bank_cert_name)) + print("Certificate with name '{0}' was created.".format(storage_cert_name)) + + # Let's list the certificates. + print("\n2. List certificates from the Key Vault") + certificates = client.list_certificates() + for certificate in certificates: + print("Certificate with name '{0}' was found.".format(certificate.name)) + + # You find the bank certificate needs to change the expiration date because the bank account credentials will be + # valid for an extra year. Calling create_certificate on an existing certificate creates a new version of the + # certificate in the Key Vault with the new value. + + expires = datetime.datetime.utcnow() + datetime.timedelta(days=365) + + client.create_certificate( + name=bank_cert_name, + expires=expires + ).wait() + print( + "Certificate with name '{0}' was updated with expiration date '{1}'".format( + bank_cert_name, + expires + ) + ) + + # You need to check all the different expiration dates your bank account certificate had previously. Let's print + # all the versions of this certificate. + print("\n3. List versions of the certificate using its name") + certificate_versions = client.list_certificate_versions(bank_cert_name) + for certificate_version in certificate_versions: + print("Bank Certificate with name '{0}' with version '{1}' has expiration date: '{2}'.".format( + certificate_version.name, + certificate_version.version, + certificate_version.expires)) + + # The bank acoount and storage accounts got closed. Let's delete bank and storage accounts certificates. + client.delete_certificate(name=bank_cert_name) + client.delete_certificate(name=storage_cert_name) + + # You can list all the deleted and non-purged certificates, assuming Key Vault is soft-delete enabled. + print("\n3. List deleted certificates from the Key Vault") + deleted_certificates = client.list_deleted_certificates() + for deleted_certificate in deleted_certificates: + print("Certificate with name '{0}' has recovery id '{1}'".format( + deleted_certificate.name, + deleted_certificate.recovery_id)) + + except HttpResponseError as e: + if "(NotSupported)" in e.message: + print("\n{0} Please enable soft delete on Key Vault to perform this operation.".format(e.message)) + else: + print("\nrun_sample has caught an error. {0}".format(e.message)) + + finally: + print("\nrun_sample done") + + +if __name__ == "__main__": + try: + run_sample() + + except Exception as e: + print("Top level Error: {0}".format(str(e))) diff --git a/sdk/keyvault/azure-keyvault-certificates/samples/list_operations_async.py b/sdk/keyvault/azure-keyvault-certificates/samples/list_operations_async.py new file mode 100644 index 000000000000..215198a576b9 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/samples/list_operations_async.py @@ -0,0 +1,123 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import asyncio +import datetime +import time +import os +from azure.keyvault.certificates.aio import CertificateClient +from azure.identity.aio import DefaultAzureCredential +from azure.core.exceptions import HttpResponseError + +# ---------------------------------------------------------------------------------------------------------- +# Prerequistes - +# +# 1. An Azure Key Vault- +# https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli +# +# 2. Microsoft Azure Key Vault PyPI package - +# https://pypi.python.org/pypi/azure-keyvault-certificates/ +# +# 3. Microsoft Azure Identity package - +# https://pypi.python.org/pypi/azure-identity/ +# +# 4. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL. +# How to do this - https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates#createget-credentials) +# +# ---------------------------------------------------------------------------------------------------------- +# Sample - demonstrates the basic list operations on a vault(certificate) resource for Azure Key Vault. +# The vault has to be soft-delete enabled to perform one of the following operations: https://docs.microsoft.com/en-us/azure/key-vault/key-vault-ovw-soft-delete +# +# 1. Create certificate (create_certificate) +# +# 2. List certificates from the Key Vault (list_certificates) +# +# 3. List certificate versions from the Key Vault (list_certificate_versions) +# +# 4. List deleted certificates from the Key Vault (list_deleted_certificates). The vault has to be soft-delete enabled to perform this operation. +# +# ---------------------------------------------------------------------------------------------------------- + +async def run_sample(): + # Instantiate a certificate client that will be used to call the service. Notice that the client is using default Azure credentials. + # To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID', + # 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials. + VAULT_URL = os.environ["VAULT_URL"] + credential = DefaultAzureCredential() + client = CertificateClient(vault_url=VAULT_URL, credential=credential) + try: + # Let's create a certificate for holding storage and bank accounts credentials. If the certificate + # already exists in the Key Vault, then a new version of the certificate is created. + print("\n1. Create Certificate") + bank_cert_name = "BankListCertificate" + storage_cert_name = "StorageListCertificate" + expires = datetime.datetime.utcnow() + datetime.timedelta(days=365) + + bank_certificate_poller = await client.create_certificate(name=bank_cert_name, expires=expires) + storage_certificate_poller = await client.create_certificate(name=storage_cert_name) + + # await the creation of the bank and storage certificate + await bank_certificate_poller + await storage_certificate_poller + + print("Certificate with name '{0}' was created.".format(bank_cert_name)) + print("Certificate with name '{0}' was created.".format(storage_cert_name)) + + # Let's list the certificates. + print("\n2. List certificates from the Key Vault") + certificates = client.list_certificates() + async for certificate in certificates: + print("Certificate with name '{0}' was found.".format(certificate.name)) + + # You find the bank certificate needs to change the expiration date because the bank account credentials will be valid for an extra year. + # Calling create_certificate on an existing certificate creates a new version of the certificate in the Key Vault with the new value. + + expires = datetime.datetime.utcnow() + datetime.timedelta(days=365) + + updated_bank_certificate_poller = await client.create_certificate(name=bank_cert_name, expires=expires) + await updated_bank_certificate_poller + print( + "Certificate with name '{0}' was updated with expiration date '{1}'".format(bank_cert_name, expires) + ) + + # You need to check all the different expiration dates your bank account certificate had previously. Lets print all the versions of this certificate. + print("\n3. List versions of the certificate using its name") + certificate_versions = client.list_certificate_versions(bank_cert_name) + async for certificate_version in certificate_versions: + print("Bank Certificate with name '{0}' with version '{1}' has expiration date: '{2}'.".format(certificate_version.name, certificate_version.version, certificate_version.expires)) + + # The bank acoount and storage accounts got closed. Let's delete bank and storage accounts certificates. + await client.delete_certificate(name=bank_cert_name) + await client.delete_certificate(name=storage_cert_name) + + # To ensure certificate is deleted on the server side. + print("Deleting certificates...") + time.sleep(30) + + # You can list all the deleted and non-purged certificates, assuming Key Vault is soft-delete enabled. + print("\n3. List deleted certificates from the Key Vault") + deleted_certificates = client.list_deleted_certificates() + async for deleted_certificate in deleted_certificates: + print( + "Certificate with name '{0}' has recovery id '{1}'".format(deleted_certificate.name, deleted_certificate.recovery_id) + ) + + except HttpResponseError as e: + if "(NotSupported)" in e.message: + print("\n{0} Please enable soft delete on Key Vault to perform this operation.".format(e.message)) + else: + print("\nrun_sample has caught an error. {0}".format(e.message)) + + finally: + print("\nrun_sample done") + + +if __name__ == "__main__": + try: + loop = asyncio.get_event_loop() + loop.run_until_complete(run_sample()) + loop.close() + + except Exception as e: + print("Top level Error: {0}".format(str(e))) \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/samples/recover_purge_operations.py b/sdk/keyvault/azure-keyvault-certificates/samples/recover_purge_operations.py new file mode 100644 index 000000000000..d713f5d44554 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/samples/recover_purge_operations.py @@ -0,0 +1,101 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import os +from azure.keyvault.certificates import CertificateClient +from azure.identity import DefaultAzureCredential +from azure.core.exceptions import HttpResponseError + +# ---------------------------------------------------------------------------------------------------------- +# Prerequistes - +# +# 1. An Azure Key Vault- +# https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli +# +# 2. Microsoft Azure Key Vault PyPI package - +# https://pypi.python.org/pypi/azure-keyvault-certificates/ +# +# 3. Microsoft Azure Identity package - +# https://pypi.python.org/pypi/azure-identity/ +# +# 4. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL. +# How to do this - https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates#createget-credentials) +# +# ---------------------------------------------------------------------------------------------------------- +# Sample - demonstrates the basic recover and purge operations on a vault(certificate) resource for Azure Key Vault +# +# 1. Create a certificate (create_certificate) +# +# 2. Delete a certificate (delete_certificate) +# +# 3. Recover a deleted certificate (recover_deleted_certificate) +# +# 4. Purge a deleted certificate (purge_deleted_certificate) +# ---------------------------------------------------------------------------------------------------------- + + +def run_sample(): + # Instantiate a certificate client that will be used to call the service. + # Notice that the client is using default Azure credentials. + # To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID', + # 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials. + VAULT_URL = os.environ["VAULT_URL"] + credential = DefaultAzureCredential() + client = CertificateClient(vault_url=VAULT_URL, credential=credential) + try: + # Let's create certificates holding storage and bank accounts credentials. If the certificate + # already exists in the Key Vault, then a new version of the certificate is created. + print("\n1. Create Certificates") + + bank_cert_name = "BankRecoverCertificate" + storage_cert_name = "ServerRecoverCertificate" + + bank_certificate_poller = client.create_certificate(name=bank_cert_name) + storage_certificate_poller = client.create_certificate(name=storage_cert_name) + + bank_certificate_poller.wait() + storage_certificate_poller.wait() + print("Certificate with name '{0}' was created.".format(bank_cert_name)) + print("Certificate with name '{0}' was created.".format(storage_cert_name)) + + # The storage account was closed, need to delete its credentials from the Key Vault. + print("\n2. Delete a Certificate") + deleted_bank_certificate = client.delete_certificate(name=bank_cert_name) + + print("Certificate with name '{0}' was deleted on date {1}.".format( + deleted_bank_certificate.name, + deleted_bank_certificate.deleted_date) + ) + + # We accidentally deleted the bank account certificate. Let's recover it. + # A deleted certificate can only be recovered if the Key Vault is soft-delete enabled. + print("\n3. Recover Deleted Certificate") + recovered_bank_certificate = client.recover_deleted_certificate(deleted_bank_certificate.name) + print("Recovered Certificate with name '{0}'.".format(recovered_bank_certificate.name)) + + # Let's delete the storage certificate now. + # If the keyvault is soft-delete enabled, then for permanent deletion deleted certificate needs to be purged. + client.delete_certificate(name=storage_cert_name) + + # To ensure permanent deletion, we might need to purge the secret. + print("\n4. Purge Deleted Certificate") + client.purge_deleted_certificate(name=storage_cert_name) + print("Certificate has been permanently deleted.") + + except HttpResponseError as e: + if "(NotSupported)" in e.message: + print("\n{0} Please enable soft delete on Key Vault to perform this operation.".format(e.message)) + else: + print("\nrun_sample has caught an error. {0}".format(e.message)) + + finally: + print("\nrun_sample done") + + +if __name__ == "__main__": + try: + run_sample() + + except Exception as e: + print("Top level Error: {0}".format(str(e))) diff --git a/sdk/keyvault/azure-keyvault-certificates/samples/recover_purge_operations_async.py b/sdk/keyvault/azure-keyvault-certificates/samples/recover_purge_operations_async.py new file mode 100644 index 000000000000..75888e2b2d33 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/samples/recover_purge_operations_async.py @@ -0,0 +1,102 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import asyncio +import os +from azure.keyvault.certificates.aio import CertificateClient +from azure.identity.aio import DefaultAzureCredential +from azure.core.exceptions import HttpResponseError + +# ---------------------------------------------------------------------------------------------------------- +# Prerequistes - +# +# 1. An Azure Key Vault- +# https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli +# +# 2. Microsoft Azure Key Vault PyPI package - +# https://pypi.python.org/pypi/azure-keyvault-certificates/ +# +# 3. Microsoft Azure Identity package - +# https://pypi.python.org/pypi/azure-identity/ +# +# 4. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL. +# How to do this - https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates#createget-credentials) +# +# ---------------------------------------------------------------------------------------------------------- +# Sample - demonstrates the basic recover and purge operations on a vault(certificate) resource for Azure Key Vault +# +# 1. Create a certificate (create_certificate) +# +# 2. Delete a certificate (delete_certificate) +# +# 3. Recover a deleted certificate (recover_deleted_certificate) +# +# 4. Purge a deleted certificate (purge_deleted_certificate) +# ---------------------------------------------------------------------------------------------------------- + + +async def run_sample(): + # Instantiate a certificate client that will be used to call the service. + # Notice that the client is using default Azure credentials. + # To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID', + # 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials. + VAULT_URL = os.environ["VAULT_URL"] + credential = DefaultAzureCredential() + client = CertificateClient(vault_url=VAULT_URL, credential=credential) + try: + # Let's create certificates holding storage and bank accounts credentials. If the certificate + # already exists in the Key Vault, then a new version of the certificate is created. + print("\n1. Create Certificates") + bank_cert_name = "BankRecoverCertificate" + storage_cert_name = "ServerRecoverCertificate" + + bank_certificate_poller = await client.create_certificate(name=bank_cert_name) + storage_certificate_poller = await client.create_certificate(name=storage_cert_name) + + await bank_certificate_poller + await storage_certificate_poller + print("Certificate with name '{0}' was created.".format(bank_cert_name)) + print("Certificate with name '{0}' was created.".format(storage_cert_name)) + + # The storage account was closed, need to delete its credentials from the Key Vault. + print("\n2. Delete a Certificate") + deleted_bank_certificate = await client.delete_certificate(name=bank_cert_name) + print("Certificate with name '{0}' was deleted on date {1}.".format( + deleted_bank_certificate.name, + deleted_bank_certificate.deleted_date) + ) + + # We accidentally deleted the bank account certificate. Let's recover it. + # A deleted certificate can only be recovered if the Key Vault is soft-delete enabled. + print("\n3. Recover Deleted Certificate") + recovered_bank_certificate = await client.recover_deleted_certificate(deleted_bank_certificate.name) + print("Recovered Certificate with name '{0}'.".format(recovered_bank_certificate.name)) + + # Let's delete storage account now. + # If the keyvault is soft-delete enabled, then for permanent deletion deleted certificate needs to be purged. + await client.delete_certificate(name=storage_cert_name) + + # To ensure permanent deletion, we might need to purge the secret. + print("\n4. Purge Deleted Certificate") + await client.purge_deleted_certificate(name=storage_cert_name) + print("Certificate has been permanently deleted.") + + except HttpResponseError as e: + if "(NotSupported)" in e.message: + print("\n{0} Please enable soft delete on Key Vault to perform this operation.".format(e.message)) + else: + print("\nrun_sample has caught an error. {0}".format(e.message)) + + finally: + print("\nrun_sample done") + + +if __name__ == "__main__": + try: + loop = asyncio.get_event_loop() + loop.run_until_complete(run_sample()) + loop.close() + + except Exception as e: + print("Top level Error: {0}".format(str(e))) \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/seed.txt b/sdk/keyvault/azure-keyvault-certificates/seed.txt new file mode 100644 index 000000000000..799fcfa589bf --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/seed.txt @@ -0,0 +1 @@ +iscai-msft \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/setup.cfg b/sdk/keyvault/azure-keyvault-certificates/setup.cfg new file mode 100644 index 000000000000..3c6e79cf31da --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/setup.cfg @@ -0,0 +1,2 @@ +[bdist_wheel] +universal=1 diff --git a/sdk/keyvault/azure-keyvault-certificates/setup.py b/sdk/keyvault/azure-keyvault-certificates/setup.py new file mode 100644 index 000000000000..fdec6b0617d0 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/setup.py @@ -0,0 +1,82 @@ +#!/usr/bin/env python + +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +# pylint:disable=missing-docstring + +import re +import os.path +from io import open +from setuptools import find_packages, setup + +# Change the PACKAGE_NAME only to change folder and different name +PACKAGE_NAME = "azure-keyvault-certificates" +PACKAGE_PPRINT_NAME = "Key Vault Certificates" + +# a-b-c => a/b/c +PACKAGE_FOLDER_PATH = PACKAGE_NAME.replace("-", "/") +# a-b-c => a.b.c +NAMESPACE_NAME = PACKAGE_NAME.replace("-", ".") + +# azure v0.x is not compatible with this package +# azure v0.x used to have a __version__ attribute (newer versions don't) +try: + import azure + + try: + VER = azure.__version__ # type: ignore + raise Exception( + "This package is incompatible with azure=={}. ".format(VER) + 'Uninstall it with "pip uninstall azure".' + ) + except AttributeError: + pass +except ImportError: + pass + +# Version extraction inspired from 'requests' +with open(os.path.join(PACKAGE_FOLDER_PATH, "_version.py"), "r") as fd: + VERSION = re.search(r'^VERSION\s*=\s*[\'"]([^\'"]*)[\'"]', fd.read(), re.MULTILINE).group(1) + +if not VERSION: + raise RuntimeError("Cannot find version information") + +with open("README.md", encoding="utf-8") as f: + README = f.read() +with open("HISTORY.md", encoding="utf-8") as f: + HISTORY = f.read() + +setup( + name=PACKAGE_NAME, + version=VERSION, + description="Microsoft Azure {} Client Library for Python".format(PACKAGE_PPRINT_NAME), + long_description=README + "\n\n" + HISTORY, + long_description_content_type="text/markdown", + license="MIT License", + author="Microsoft Corporation", + author_email="azurekeyvault@microsoft.com", + url="https://github.com/Azure/azure-sdk-for-python/tree/master/sdk/keyvault/azure-keyvault-certificates", + classifiers=[ + "Development Status :: 4 - Beta", + "Programming Language :: Python", + "Programming Language :: Python :: 2", + "Programming Language :: Python :: 2.7", + "Programming Language :: Python :: 3", + "Programming Language :: Python :: 3.5", + "Programming Language :: Python :: 3.6", + "Programming Language :: Python :: 3.7", + "License :: OSI Approved :: MIT License", + ], + zip_safe=False, + packages=find_packages( + exclude=[ + "samples", + "tests", + # Exclude packages that will be covered by PEP420 or nspkg + "azure", + ] + ), + install_requires=["azure-core<2.0.0,>=1.0.0b2", "azure-common~=1.1", "msrest>=0.5.0"], + extras_require={":python_version<'3.0'": ["azure-nspkg"], ":python_version<'3.5'": ["typing"]}, +) diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/ca.crt b/sdk/keyvault/azure-keyvault-certificates/tests/ca.crt new file mode 100644 index 000000000000..fb1103ac034f --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/ca.crt @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDazCCAlOgAwIBAgIUYju9zymmCCF7rCaROzfZs0pNgmkwDQYJKoZIhvcNAQEL +BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM +GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0xOTA4MjgyMjU0MTNaFw0xOTA5 +MjcyMjU0MTNaMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEw +HwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggEiMA0GCSqGSIb3DQEB +AQUAA4IBDwAwggEKAoIBAQD0YrMz5atoPmTTxLtCO69kM3E97bdjJgyAVZJS9mP3 +HQyHkFNb09eDeAAzcZLR5nYXX7yweowTWVcIe3k9+Z/tUeVrAlOVe2COaIHAUZIh +jELq/u8257/8MqqbKXhsyrWNAVDyKndDgvbbgxNsUTbMoAe9BCL/5fzowsnPLaCI +MCYRaQJUySbIoTmKi11hF09CFFSkL9nvfQODFyEde6JHPWrVRse2lioPLJeC9LoU +GNNZnbqry+UbHp4vORPp6OQTqBTm1ZVWPzCuYuWUmEe27K7zghEJr/Yx0OLq9kI5 +H960CSOkdhsOTcBkORfhivSQnmOn2RnCPIEsUTzjwXNZAgMBAAGjUzBRMB0GA1Ud +DgQWBBQIAunu6y1BmFSDfFNfTnqFggB0gzAfBgNVHSMEGDAWgBQIAunu6y1BmFSD +fFNfTnqFggB0gzAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQAr ++RM7gbqWRXnWJwE/hV/ZI2hXAhDN4RYQ4fWMJfg/E9wcLeqqRtJhXbqpJW08IZWp +QKcWfrFcfZ3ZxVAi5Ey+iuvD2VeBf9v5RZI4c9JqswS9xG2A1x/BeGcUk1y/q9E5 +4whf5fLSJQVxK+C53yemoHPrBg8zVhLJv5SG7Uw7jcqiQvu2aHGGWPLiO7mmMPtP +qO/I+6FjXuBpNomTqM897MY3Qzg43rpoCilpOpkRtMHknfhFxt05p+Fn73Fb60ru +ZsFRA52lsEBxGmI0QmXGjwkUZFwQTXEDUWwId3VJxoHRZwv1gmHfwhkYt+mNWJDa +mU7AMDzlQRwGC8hpWJRT +-----END CERTIFICATE----- diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/ca.key b/sdk/keyvault/azure-keyvault-certificates/tests/ca.key new file mode 100644 index 000000000000..b9432bead164 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/ca.key @@ -0,0 +1,27 @@ +-----BEGIN RSA PRIVATE KEY----- +MIIEpQIBAAKCAQEA9GKzM+WraD5k08S7QjuvZDNxPe23YyYMgFWSUvZj9x0Mh5BT +W9PXg3gAM3GS0eZ2F1+8sHqME1lXCHt5Pfmf7VHlawJTlXtgjmiBwFGSIYxC6v7v +Nue//DKqmyl4bMq1jQFQ8ip3Q4L224MTbFE2zKAHvQQi/+X86MLJzy2giDAmEWkC +VMkmyKE5iotdYRdPQhRUpC/Z730DgxchHXuiRz1q1UbHtpYqDyyXgvS6FBjTWZ26 +q8vlGx6eLzkT6ejkE6gU5tWVVj8wrmLllJhHtuyu84IRCa/2MdDi6vZCOR/etAkj +pHYbDk3AZDkX4Yr0kJ5jp9kZwjyBLFE848FzWQIDAQABAoIBAHrhegv5SrOy083r +mODX0/wFJcam1dRD2HtbC6UtgNxLPfaYKmH85duUJj23uMRUJkLgf6cZJ3+/J1T7 +iN4Ru0mAKWQiGlcKX2WbxMon+dtmhGtW3n90DgPIkiJMuuGxF5Kb+9CYa7mFi4ya +ntSTDYPcX6e6AcM8KGv9La4/2f0/hQKCN3jZbnQ/GqjnJdxrAV1KV0IMoNPpZmat +Sa0EZ9eiR57/xAe1OxceEt0nO7hAl+jX7tFEGvaNClKG2OMgZ+oHOxI+s9jW8DyD +wRJbd0hxUl/KXLxzyeFTBdLxB+SQtlcr4w5khyt3AvlKd4Iveqkq2FBCtfATYitt ++Ic61IUCgYEA/j4mMdo+qokzACmGJWEquC6yNoUI5aYsHTRVvX0sLpBX7MapIEwM +zHdvMEFBxw8rs7ll1xELW+dnbIZqj/ou43E3+PSgovdFGOA8kQlPpcIIutTEZQh7 +dlWzvAVZr0iO4xfXY2gFQot41fY4yRy8Q14ayo/VjQK4uKlnGqqlmwsCgYEA9hMc +FIAYpit7779tKD+O4vEkMoTkIxqSAZUuOZ5qB5UaF4Y/+MIGZUnrjJlGLnoFQmsP +CVPVMOQKV7yjg0LBadeDHEjESwHJNk0qxPSXWuXGlu01yVkqUehNumSBdnSLBmjR +jNIxPVEmW9d6+eAzIFiTkwqM9cAuLb75DL++iasCgYEAxhqzNEE0dzl0zfmNF29B +FEb+glDi/96dnRv8eywf0yCSAmNBwXLAvkmKD/WpRWxixyX9XrlfOntzMTMDsbBl +/L9pt8kVqiY2Zw3C49h3gVdR6hKD/Z3AZhKdfDJHEbfd7sHTCRgykQmQXFgBI2QK +pguboJ627atjODB3sGWrqMUCgYEA2QoJ3lsNYqM/8TpaQQGuOaSPVK+5uOyakyLN +XqzGwGFWXiFfEz2u/m+wfpZCPIQLV4WuAYAbrb+1D6WmYwPiLESVs8DKwY2Vt3tg +mc9SIC5CdqRKqIkoto264Qf82En6xXB2Q0qxe2+z8ZWhNfv1nDYEE9FeevNCx76F +VCVbHXkCgYEA4+FD1q6iwl9wsAOKFVo+W044/MhKHDsyIED3YOzeRTAWRl2w/KX0 +c5ty2KecGu0cVXoAv2YUttHsuMZfm/QdosZr9UB4CR2lmzRys3LSx6QzCkZeMb/s +QOMs6SYCPXggdXCAu9EVf5+TtYQg7aQNTTuYErlyq2g/tk3un8bHTwI= +-----END RSA PRIVATE KEY----- diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/certificates_async_preparer.py b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_async_preparer.py new file mode 100644 index 000000000000..4c04cde8a44b --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_async_preparer.py @@ -0,0 +1,36 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import asyncio +from unittest.mock import Mock + +from azure.core.credentials import AccessToken +from azure.core.pipeline.transport import AioHttpTransport +from azure.identity.aio import EnvironmentCredential + +from multidict import CIMultiDict, CIMultiDictProxy + +from certificates_preparer import VaultClientPreparer + +from certificates_vault_client_async import VaultClient + + +class AiohttpTestTransport(AioHttpTransport): + """Workaround to vcrpy bug: https://github.com/kevin1024/vcrpy/pull/461 + """ + async def send(self, request, **config): + response = await super(AiohttpTestTransport, self).send(request, **config) + if not isinstance(response.headers, CIMultiDictProxy): + response.headers = CIMultiDictProxy(CIMultiDict(response.internal_response.headers)) + response.content_type = response.headers.get("content-type") + return response + + +class AsyncVaultClientPreparer(VaultClientPreparer): + def create_vault_client(self, vault_uri): + if self.is_live: + credential = EnvironmentCredential() + else: + credential = Mock(get_token=asyncio.coroutine(lambda _: AccessToken("fake-token", 0))) + return VaultClient(vault_uri, credential, transport=AiohttpTestTransport()) \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/certificates_async_test_case.py b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_async_test_case.py new file mode 100644 index 000000000000..fa5faa223ed8 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_async_test_case.py @@ -0,0 +1,53 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import asyncio +import functools + +from certificates_test_case import KeyVaultTestCase + + +class AsyncKeyVaultTestCase(KeyVaultTestCase): + @staticmethod + def await_prepared_test(test_fn): + """Synchronous wrapper for async test methods. Used to avoid making changes + upstream to AbstractPreparer (which doesn't await the functions it wraps) + """ + + @functools.wraps(test_fn) + def run(test_class_instance, *args, **kwargs): + vault_client = kwargs.get("vault_client") + loop = asyncio.get_event_loop() + return loop.run_until_complete(test_fn(test_class_instance, vault_client)) + + return run + + async def _poll_until_no_exception(self, fn, *resource_names, expected_exception, max_retries=20, retry_delay=3): + """polling helper for live tests because some operations take an unpredictable amount of time to complete""" + + for name in resource_names: + for i in range(max_retries): + try: + # TODO: better for caller to apply args to fn; could also gather + await fn(name) + break + except expected_exception: + if i == max_retries - 1: + raise + if self.is_live: + await asyncio.sleep(retry_delay) + + async def _poll_until_exception(self, fn, *resource_names, expected_exception, max_retries=20, retry_delay=3): + """polling helper for live tests because some operations take an unpredictable amount of time to complete""" + + for name in resource_names: + for _ in range(max_retries): + try: + # TODO: better for caller to apply args to fn; could also gather + await fn(name) + if self.is_live: + await asyncio.sleep(retry_delay) + except expected_exception: + return + self.fail("expected exception {expected_exception} was not raised") \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/certificates_helpers.py b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_helpers.py new file mode 100644 index 000000000000..8acb3d5f646b --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_helpers.py @@ -0,0 +1,72 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import json + +try: + from unittest import mock +except ImportError: # python < 3.3 + import mock # type: ignore + + +class Request: + def __init__( + self, url=None, url_substring=None, method=None, required_headers={}, required_data={}, required_params={} + ): + self.method = method + self.url = url + self.url_substring = url_substring + self.required_headers = required_headers + self.required_data = required_data + self.required_params = required_params + + def assert_matches(self, request): + if self.url: + assert request.url.split("?")[0] == self.url + if self.url_substring: + assert self.url_substring in request.url + if self.method: + assert request.method == self.method + for param, expected_value in self.required_params.items(): + assert request.query.get(param) == expected_value + for header, expected_value in self.required_headers.items(): + assert request.headers.get(header) == expected_value + for field, expected_value in self.required_data.items(): + assert request.body.get(field) == expected_value + + +def mock_response(status_code=200, headers={}, json_payload=None): + response = mock.Mock(status_code=status_code, headers=headers) + if json_payload is not None: + response.text = lambda: json.dumps(json_payload) + response.headers["content-type"] = "application/json" + response.content_type = ["application/json"] + return response + + +def validating_transport(requests, responses): + if len(requests) != len(responses): + raise ValueError("each request must have one response") + + sessions = zip(requests, responses) + sessions = (s for s in sessions) # 2.7's zip returns a list, and nesting a generator doesn't break it for 3.x + + def validate_request(request, **kwargs): + expected_request, response = next(sessions) + expected_request.assert_matches(request) + return response + + return mock.Mock(send=validate_request) + + +try: + import asyncio + + def async_validating_transport(requests, responses): + sync_transport = validating_transport(requests, responses) + return mock.Mock(send=asyncio.coroutine(sync_transport.send)) + + +except ImportError: + pass diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/certificates_preparer.py b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_preparer.py new file mode 100644 index 000000000000..fb4f3d3ae6c2 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_preparer.py @@ -0,0 +1,151 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import time +import os + +try: + from unittest.mock import Mock +except ImportError: # python < 3.3 + from mock import Mock + +from azure.core.credentials import AccessToken +from azure.identity import EnvironmentCredential + +from azure.mgmt.keyvault import KeyVaultManagementClient +from azure.mgmt.keyvault.models import ( + SecretPermissions, + KeyPermissions, + CertificatePermissions, + StoragePermissions, + Permissions, + Sku, + SkuName, + AccessPolicyEntry, + VaultProperties, + VaultCreateOrUpdateParameters, +) +from azure_devtools.scenario_tests.exceptions import AzureTestError + +from devtools_testutils import AzureMgmtPreparer, ResourceGroupPreparer +from devtools_testutils.resource_testcase import RESOURCE_GROUP_PARAM + +from certificates_vault_client import VaultClient + + +DEFAULT_PERMISSIONS = Permissions( + keys=[perm.value for perm in KeyPermissions], + secrets=[perm.value for perm in SecretPermissions], + certificates=[perm.value for perm in CertificatePermissions], + storage=[perm.value for perm in StoragePermissions], +) +DEFAULT_SKU = SkuName.premium.value + + +class VaultClientPreparer(AzureMgmtPreparer): + def __init__( + self, + sku=None, + permissions=None, + enabled_for_deployment=True, + enabled_for_disk_encryption=True, + enabled_for_template_deployment=True, + enable_soft_delete=None, + name_prefix="vault", + location="westus", + parameter_name="vault_client", + resource_group_parameter_name=RESOURCE_GROUP_PARAM, + disable_recording=True, + playback_fake_resource=None, + client_kwargs=None, + ): + # incorporate a unicode integer representation of run identifier into key vault name for uniqueness + name_prefix += ''.join(str(ord(c)) for c in os.environ['RUN_IDENTIFIER'])[:10] + + super(VaultClientPreparer, self).__init__( + name_prefix, + 24, + disable_recording=disable_recording, + playback_fake_resource=playback_fake_resource, + client_kwargs=client_kwargs, + ) + self.sku = sku or DEFAULT_SKU + self.permissions = permissions or DEFAULT_PERMISSIONS + self.enabled_for_deployment = enabled_for_deployment + self.enabled_for_disk_encryption = enabled_for_disk_encryption + self.enabled_for_template_deployment = enabled_for_template_deployment + self.enable_soft_delete = enable_soft_delete + self.location = location + self.resource_group_parameter_name = resource_group_parameter_name + self.parameter_name = parameter_name + self.creds_parameter = "credentials" + self.parameter_name_for_location = "location" + + def _get_resource_group(self, **kwargs): + try: + return kwargs[self.resource_group_parameter_name] + except KeyError: + template = ( + "To create a key vault a resource group is required. Please add " + "decorator @{} in front of this storage account preparer." + ) + raise AzureTestError(template.format(ResourceGroupPreparer.__name__)) + + def create_resource(self, name, **kwargs): + if self.is_live: + # create a vault with the management client + group = self._get_resource_group(**kwargs).name + access_policies = [ + AccessPolicyEntry( + tenant_id=self.test_class_instance.settings.TENANT_ID, + object_id=self.test_class_instance.settings.CLIENT_OID, + permissions=self.permissions, + ) + ] + properties = VaultProperties( + tenant_id=self.test_class_instance.settings.TENANT_ID, + sku=Sku(name=self.sku), + access_policies=access_policies, + vault_uri=None, + enabled_for_deployment=self.enabled_for_deployment, + enabled_for_disk_encryption=self.enabled_for_disk_encryption, + enabled_for_template_deployment=self.enabled_for_template_deployment, + enable_soft_delete=self.enable_soft_delete, + enable_purge_protection=None, + ) + parameters = VaultCreateOrUpdateParameters(location=self.location, properties=properties) + + self.management_client = self.create_mgmt_client(KeyVaultManagementClient) + + # ARM may return not found at first even though the resource group has been created + retries = 4 + for i in range(retries): + try: + vault = self.management_client.vaults.create_or_update(group, name, parameters).result() + except Exception as ex: + if "ResourceGroupNotFound" not in str(ex) or i == retries - 1: + raise + time.sleep(3) + vault_uri = vault.properties.vault_uri + else: + # playback => we need only the uri used in the recording + vault_uri = "https://{}.vault.azure.net/".format(name) + + client = self.create_vault_client(vault_uri) + + return {self.parameter_name: client} + + def create_vault_client(self, vault_uri): + if self.is_live: + credential = EnvironmentCredential() + else: + credential = Mock(get_token=lambda _: AccessToken("fake-token", 0)) + return VaultClient(vault_uri, credential) + + def remove_resource(self, name, **kwargs): + if self.is_live: + group = self._get_resource_group(**kwargs).name + self.management_client.vaults.delete(group, name) + if self.enable_soft_delete: + self.management_client.vaults.purge_deleted(name, self.location).wait() diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/certificates_test_case.py b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_test_case.py new file mode 100644 index 000000000000..273e8540fdd3 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_test_case.py @@ -0,0 +1,41 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import time + +from devtools_testutils import AzureMgmtTestCase + + +class KeyVaultTestCase(AzureMgmtTestCase): + def setUp(self): + self.list_test_size = 7 + super(KeyVaultTestCase, self).setUp() + + def tearDown(self): + super(KeyVaultTestCase, self).tearDown() + + def _poll_until_no_exception(self, fn, expected_exception, max_retries=20, retry_delay=3): + """polling helper for live tests because some operations take an unpredictable amount of time to complete""" + + for i in range(max_retries): + try: + return fn() + except expected_exception: + if i == max_retries - 1: + raise + if self.is_live: + time.sleep(retry_delay) + + def _poll_until_exception(self, fn, expected_exception, max_retries=20, retry_delay=3): + """polling helper for live tests because some operations take an unpredictable amount of time to complete""" + + for _ in range(max_retries): + try: + fn() + if self.is_live: + time.sleep(retry_delay) + except expected_exception: + return + + self.fail("expected exception {expected_exception} was not raised") \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/certificates_vault_client.py b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_vault_client.py new file mode 100644 index 000000000000..c3a606776598 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_vault_client.py @@ -0,0 +1,33 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +try: + from typing import TYPE_CHECKING +except ImportError: + TYPE_CHECKING = False + +from azure.keyvault.certificates._shared import KeyVaultClientBase +from azure.keyvault.certificates import CertificateClient + +if TYPE_CHECKING: + # pylint:disable=unused-import + from azure.core.credentials import TokenCredential + from azure.core.pipeline.transport import HttpTransport + from typing import Any, Optional + + +class VaultClient(KeyVaultClientBase): + def __init__(self, vault_url, credential, transport=None, api_version=None, **kwargs): + # type: (str, TokenCredential, Optional[HttpTransport], Optional[str], **Any) -> None + super(VaultClient, self).__init__( + vault_url, credential, transport=transport, api_version=api_version, **kwargs + ) + self._certificates = CertificateClient(self.vault_url, credential, generated_client=self._client, **kwargs) + + @property + def certificates(self): + """ + :rtype: ~azure.keyvault.certificates.CertificateClient + """ + return self._certificates \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/certificates_vault_client_async.py b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_vault_client_async.py new file mode 100644 index 000000000000..58c4c4472c3c --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/certificates_vault_client_async.py @@ -0,0 +1,37 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from typing import Any, TYPE_CHECKING +from azure.core.pipeline.transport import HttpTransport + +from azure.keyvault.certificates.aio import CertificateClient +from azure.keyvault.certificates._shared import AsyncKeyVaultClientBase + +if TYPE_CHECKING: + try: + from azure.core.credentials import TokenCredential + except ImportError: + # TokenCredential is a typing_extensions.Protocol; we don't depend on that package + pass + +KEY_VAULT_SCOPE = "https://vault.azure.net/.default" + + +class VaultClient(AsyncKeyVaultClientBase): + def __init__( + self, + vault_url: str, + credential: "TokenCredential", + transport: HttpTransport = None, + api_version: str = None, + **kwargs: Any + ) -> None: + super(VaultClient, self).__init__( + vault_url, credential, transport=transport, api_version=api_version, **kwargs + ) + self._certificates = CertificateClient(self.vault_url, credential, generated_client=self._client, **kwargs) + + @property + def certificates(self): + return self._certificates \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_async_request_cancellation_and_deletion.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_async_request_cancellation_and_deletion.yaml new file mode 100644 index 000000000000..0963c8d359c5 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_async_request_cancellation_and_deletion.yaml @@ -0,0 +1,239 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:59:36 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"68f9cb3739f940a497ebb70db267f75b"}'} + headers: + cache-control: [no-cache] + content-length: ['1357'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:59:37 GMT'] + expires: ['-1'] + location: ['https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0&request_id=68f9cb3739f940a497ebb70db267f75b'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: '{"cancellation_requested": true}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['32'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":true,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"68f9cb3739f940a497ebb70db267f75b"}'} + headers: + cache-control: [no-cache] + content-length: ['1356'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:59:39 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuuXdQCfMz7TZJf12Q2rT/1YSJMu6R+P9uu7iPIwWWtpFBctjrM+yD+20efGM025ErGB0kvppU8dowp1sA9DVFZdvbTlbkqWMhuc+D46nAu4IdNoHkaXxfEuVDa7BMTlQxFW+HbpXb3ktpZh9uMOEuSWUKH13zRwFG7tN3DXxb3ohK8mp6WVVqcvFwdmAX/J1KsWx0ULtl4D/2BUGmmxdedLJX+r4UJ30jGCjiKIEAgny+ec6hQPuyV0nJ+Dz8q2VyrJejUQw7a+R9UJZqaZnPaNAQO/zvCsV3B4Tkj1aJi1MxnNAstG1IZxcdPVi3ExXpLPabA+1mTDJBy8DkTb02QIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAKxoMvRA/+AmbaOrGD/0SdoUCwSPUfagIgb279MV6WwqxgoZK4E2qa69UG9GJN9WS0YdVj6MDBX89qNN7dcvJHcGFSN+yGdH9aeLvdhCsguB51LtJJaVFoS+J5tUW6W0hzg35Meg15/iMV9bo9k+NtNhXVnMjGLXowSm0HuKqqzHErLYdHMpWRFQ3lJVf7jTSABJS7uxubx9RlrLxTvLMgIbRCHJuIDBYsPHbyvZKlj2ZsAjfVcoTrBp6ht/huJW59/OUm6KhEuZZxXlwkwwZjFoXJMPC+h3Or/8GGV8Ar38o5zOveUUzYItxfLxWf+rzE7fg+eMJLM9keWZ9HdiSc8=","cancellation_requested":true,"status":"cancelled","request_id":"68f9cb3739f940a497ebb70db267f75b"}'} + headers: + cache-control: [no-cache] + content-length: ['1191'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:59:48 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":true,"status":"cancelled","request_id":"68f9cb3739f940a497ebb70db267f75b"}'} + headers: + cache-control: [no-cache] + content-length: ['1191'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:59:53 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuuXdQCfMz7TZJf12Q2rT/1YSJMu6R+P9uu7iPIwWWtpFBctjrM+yD+20efGM025ErGB0kvppU8dowp1sA9DVFZdvbTlbkqWMhuc+D46nAu4IdNoHkaXxfEuVDa7BMTlQxFW+HbpXb3ktpZh9uMOEuSWUKH13zRwFG7tN3DXxb3ohK8mp6WVVqcvFwdmAX/J1KsWx0ULtl4D/2BUGmmxdedLJX+r4UJ30jGCjiKIEAgny+ec6hQPuyV0nJ+Dz8q2VyrJejUQw7a+R9UJZqaZnPaNAQO/zvCsV3B4Tkj1aJi1MxnNAstG1IZxcdPVi3ExXpLPabA+1mTDJBy8DkTb02QIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAKxoMvRA/+AmbaOrGD/0SdoUCwSPUfagIgb279MV6WwqxgoZK4E2qa69UG9GJN9WS0YdVj6MDBX89qNN7dcvJHcGFSN+yGdH9aeLvdhCsguB51LtJJaVFoS+J5tUW6W0hzg35Meg15/iMV9bo9k+NtNhXVnMjGLXowSm0HuKqqzHErLYdHMpWRFQ3lJVf7jTSABJS7uxubx9RlrLxTvLMgIbRCHJuIDBYsPHbyvZKlj2ZsAjfVcoTrBp6ht/huJW59/OUm6KhEuZZxXlwkwwZjFoXJMPC+h3Or/8GGV8Ar38o5zOveUUzYItxfLxWf+rzE7fg+eMJLM9keWZ9HdiSc8=","cancellation_requested":true,"status":"cancelled","request_id":"68f9cb3739f940a497ebb70db267f75b"}'} + headers: + cache-control: [no-cache] + content-length: ['1191'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:59:54 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"error":{"code":"PendingCertificateNotFound","message":"Pending + certificate not found: asyncCanceledDeletedCert"}}'} + headers: + cache-control: [no-cache] + content-length: ['115'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:59:54 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/0bf600da458d481c9cae04183cd4c1e2","attributes":{"enabled":false,"nbf":1567640977,"exp":1630799977,"created":1567641578,"updated":1567641578,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997e1551c58.vault.azure.net/certificates/asyncCanceledDeletedCert/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567641578,"updated":1567641578}}}'} + headers: + cache-control: [no-cache] + content-length: ['942'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:59:54 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_backup_restore.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_backup_restore.yaml new file mode 100644 index 000000000000..2364e733f01e --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_backup_restore.yaml @@ -0,0 +1,243 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {}, "validity_months": + 24}, "lifetime_actions": [{"trigger": {"lifetime_percentage": 2}, "action": + {"action_type": "EmailContacts"}}], "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['375'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d96877fff2664cdfad57127b48fbf023"}'} + headers: + cache-control: [no-cache] + content-length: ['1305'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:17 GMT'] + expires: ['-1'] + location: ['https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/pending?api-version=7.0&request_id=d96877fff2664cdfad57127b48fbf023'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/pending","issuer":{"name":"Self"},"csr":"MIICqjCCAZICAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1OV0z4yLSrVQi7kpAB9VCuxtd1JvdtpsY2vJQr17r/mB8XSu3xwN0ASTPA25br0QJCJ8sSDdi9xcvdlkR2dJIp2NQzrTkK3vEgz5LizBM42IqdtRwz6avFfe7rH0c+FHUNEkte6L1UAOZ+ZmaiONlXO+B9BKAVjIwz/Obbm/FMNJL5aBQTP/uDTv3yQoRm+e/Vl+++BtonKzuZ+eXUq79WHk7PkGYyz7ByxYxsYFpcYg8qBavsX2FYBNQTR3G19VjgzrRHqgHmn9+0eOzchFL5/yI/yp0+hzQrdb0Pb2tN2uSG8m5Z8PtZzxeHGcHssGryZ1dRB5LB4Ad4avINa9XQIDAQABoEswSQYJKoZIhvcNAQkOMTwwOjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAKZ1WODbQcoL1q3ALUvbLR3RxkrfM0AY5A9bgTVmuvnwJbjop2RXp/lHGRPgdP6llMMTh7CXlIfxb23jgTZn1UnleEZyudskvQVGigiHztExe8sg3Fz6lAmQEgs7QkWT7/AqEYDe1767EuzK7yvz8bUyqnja96HaizHBtdeUouUqRr5FUU6Dz0M0td4ENtJofwf+G76Y3nb3HZ88ksg6efbnUoF560uInJE5x9nOwL4/N1A1OUfrcmsYLI9pYV8HQDBRNYSLFdzCpUm7AJgchq26+nTPsySy65xFM9PYtlLK+CueWR44rlwQcL8zItvFUtSPFG8kFGLxp17wkJjfZeo=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d96877fff2664cdfad57127b48fbf023"}'} + headers: + cache-control: [no-cache] + content-length: ['1305'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:17 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d96877fff2664cdfad57127b48fbf023"}'} + headers: + cache-control: [no-cache] + content-length: ['1305'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:27 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a","request_id":"d96877fff2664cdfad57127b48fbf023"}'} + headers: + cache-control: [no-cache] + content-length: ['1225'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:37 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/backup?api-version=7.0 + response: + body: {string: '{"value":"&AzureKeyVaultKeyBackupV1.microsoft.comeyJraWQiOiI0Mzg1YjA3Yi1kNTQ3LTQyZTUtYWU5ZS02MTBkYzM5ZGZhZjgiLCJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.KwWo14NyWy4aDps2UWjJR6zSeeAviEOXPgBezuE--yjHdWua-8lnVT08OSOy_ZYCt0-7eJlmLJq--biIEb3G_sZa6lTYotzlgDZAklg2RdRaLRE15RkBbgMa9wxO5Pby7_S6CU0GX3it_LsGrBJfPIo11jOzUhx7gprrjHwupgphfO9yo-G3lFP7vZmfR3hV1uGHILYmzWqsOQoR8OqZ__WbFd8RMhobZUnfQl6C1Bn7jP_NPEqJGxx8l7LEcLkVWZVLEI3EcoCFsF1WrNSv8tbPooYixx_FUgKVB2yZ1p9mi8_xwNXlHGNxJEgwwWdqoyn1ArQXuyyxTFRc-UwuMg.uU41vM75VusQ6fiXE8-HZg.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.WsKiBKBehHy4OqieoiifMQ"}'} + headers: + cache-control: [no-cache] + content-length: ['42692'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:42 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/b0c12a088c7945a4ab7167916bd62033","kid":"https://vault105115999796da121a.vault.azure.net/keys/cert96da121a/b0c12a088c7945a4ab7167916bd62033","sid":"https://vault105115999796da121a.vault.azure.net/secrets/cert96da121a/b0c12a088c7945a4ab7167916bd62033","x5t":"8e1PyG6osgreirsHjmBBcctrmx0","cer":"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","attributes":{"enabled":true,"nbf":1567638573,"exp":1630797573,"created":1567639174,"updated":1567639174,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":2},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639157}},"pending":{"id":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2358'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:43 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "&AzureKeyVaultKeyBackupV1.microsoft.comeyJraWQiOiI0Mzg1YjA3Yi1kNTQ3LTQyZTUtYWU5ZS02MTBkYzM5ZGZhZjgiLCJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.KwWo14NyWy4aDps2UWjJR6zSeeAviEOXPgBezuE--yjHdWua-8lnVT08OSOy_ZYCt0-7eJlmLJq--biIEb3G_sZa6lTYotzlgDZAklg2RdRaLRE15RkBbgMa9wxO5Pby7_S6CU0GX3it_LsGrBJfPIo11jOzUhx7gprrjHwupgphfO9yo-G3lFP7vZmfR3hV1uGHILYmzWqsOQoR8OqZ__WbFd8RMhobZUnfQl6C1Bn7jP_NPEqJGxx8l7LEcLkVWZVLEI3EcoCFsF1WrNSv8tbPooYixx_FUgKVB2yZ1p9mi8_xwNXlHGNxJEgwwWdqoyn1ArQXuyyxTFRc-UwuMg.uU41vM75VusQ6fiXE8-HZg.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.WsKiBKBehHy4OqieoiifMQ"}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['42693'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999796da121a.vault.azure.net/certificates/restore?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/b0c12a088c7945a4ab7167916bd62033","kid":"https://vault105115999796da121a.vault.azure.net/keys/cert96da121a/b0c12a088c7945a4ab7167916bd62033","sid":"https://vault105115999796da121a.vault.azure.net/secrets/cert96da121a/b0c12a088c7945a4ab7167916bd62033","x5t":"8e1PyG6osgreirsHjmBBcctrmx0","cer":"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","attributes":{"enabled":true,"nbf":1567638573,"exp":1630797573,"created":1567639174,"updated":1567639174,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999796da121a.vault.azure.net/certificates/cert96da121a/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":2},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639157}}}'} + headers: + cache-control: [no-cache] + content-length: ['2247'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:43 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_crud_contacts.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_crud_contacts.yaml new file mode 100644 index 000000000000..db8edc2e362f --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_crud_contacts.yaml @@ -0,0 +1,150 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997851e11ad.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:15 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"contacts": [{"email": "admin@contoso.com", "name": "John Doe", "phone": + "1111111111"}, {"email": "admin2@contoso.com", "name": "John Doe2", "phone": + "2222222222"}]}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['166'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997851e11ad.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997851e11ad.vault.azure.net/certificates/contacts","contacts":[{"email":"admin@contoso.com","name":"John + Doe","phone":"1111111111"},{"email":"admin2@contoso.com","name":"John Doe2","phone":"2222222222"}]}'} + headers: + cache-control: [no-cache] + content-length: ['231'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997851e11ad.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997851e11ad.vault.azure.net/certificates/contacts","contacts":[{"email":"admin@contoso.com","name":"John + Doe","phone":"1111111111"},{"email":"admin2@contoso.com","name":"John Doe2","phone":"2222222222"}]}'} + headers: + cache-control: [no-cache] + content-length: ['231'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997851e11ad.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997851e11ad.vault.azure.net/certificates/contacts","contacts":[{"email":"admin@contoso.com","name":"John + Doe","phone":"1111111111"},{"email":"admin2@contoso.com","name":"John Doe2","phone":"2222222222"}]}'} + headers: + cache-control: [no-cache] + content-length: ['231'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997851e11ad.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"error":{"code":"ContactsNotFound","message":"Contacts not found"}}'} + headers: + cache-control: [no-cache] + content-length: ['68'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_crud_issuer.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_crud_issuer.yaml new file mode 100644 index 000000000000..2ef485be9691 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_crud_issuer.yaml @@ -0,0 +1,236 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:29:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"provider": "Test", "credentials": {"account_id": "keyvaultuser"}, "org_details": + {"admin_details": [{"first_name": "John", "last_name": "Doe", "email": "admin@microsoft.com", + "phone": "4255555555"}]}, "attributes": {"enabled": true}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['235'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer","provider":"Test","credentials":{"account_id":"keyvaultuser"},"org_details":{"zip":0,"admin_details":[{"first_name":"John","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639758,"updated":1567639758}}'} + headers: + cache-control: [no-cache] + content-length: ['351'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:29:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer","provider":"Test","credentials":{"account_id":"keyvaultuser"},"org_details":{"zip":0,"admin_details":[{"first_name":"John","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639758,"updated":1567639758}}'} + headers: + cache-control: [no-cache] + content-length: ['351'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:29:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"provider": "Test", "credentials": {"account_id": "keyvaultuser2"}, "org_details": + {"admin_details": [{"first_name": "John", "last_name": "Doe", "email": "admin@microsoft.com", + "phone": "4255555555"}]}, "attributes": {"enabled": true}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['236'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer2?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer2","provider":"Test","credentials":{"account_id":"keyvaultuser2"},"org_details":{"zip":0,"admin_details":[{"first_name":"John","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639759,"updated":1567639759}}'} + headers: + cache-control: [no-cache] + content-length: ['353'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:29:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997629d10e9.vault.azure.net/certificates/issuers?api-version=7.0 + response: + body: {string: '{"value":[{"id":"https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer","provider":"Test"},{"id":"https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer2","provider":"Test"}],"nextLink":null}'} + headers: + cache-control: [no-cache] + content-length: ['234'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:29:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"org_details": {"admin_details": [{"first_name": "Jane", "last_name": + "Doe", "email": "admin@microsoft.com", "phone": "4255555555"}]}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['135'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer","provider":"Test","credentials":{"account_id":"keyvaultuser"},"org_details":{"zip":0,"admin_details":[{"first_name":"Jane","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639758,"updated":1567639759}}'} + headers: + cache-control: [no-cache] + content-length: ['351'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:29:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer","provider":"Test","credentials":{"account_id":"keyvaultuser"},"org_details":{"zip":0,"admin_details":[{"first_name":"Jane","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639758,"updated":1567639759}}'} + headers: + cache-control: [no-cache] + content-length: ['351'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:29:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997629d10e9.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateIssuerNotFound","message":"Issuer + not found"}}'} + headers: + cache-control: [no-cache] + content-length: ['75'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:29:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_crud_operations.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_crud_operations.yaml new file mode 100644 index 000000000000..0b17ea13af55 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_crud_operations.yaml @@ -0,0 +1,298 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": true}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=DefaultPolicy", "sans": {}, "key_usage": ["cRLSign", + "dataEncipherment", "digitalSignature", "keyAgreement", "keyCertSign", "keyEncipherment"], + "validity_months": 12}, "lifetime_actions": [{"trigger": {"days_before_expiry": + 90}, "action": {"action_type": "AutoRenew"}}], "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['484'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"0ad7a15761f54258972f474f1a25f64c"}'} + headers: + cache-control: [no-cache] + content-length: ['1301'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:17 GMT'] + expires: ['-1'] + location: ['https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending?api-version=7.0&request_id=0ad7a15761f54258972f474f1a25f64c'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"0ad7a15761f54258972f474f1a25f64c"}'} + headers: + cache-control: [no-cache] + content-length: ['1301'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:17 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"0ad7a15761f54258972f474f1a25f64c"}'} + headers: + cache-control: [no-cache] + content-length: ['1301'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:28 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292","request_id":"0ad7a15761f54258972f474f1a25f64c"}'} + headers: + cache-control: [no-cache] + content-length: ['1221'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:38 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292","request_id":"0ad7a15761f54258972f474f1a25f64c"}'} + headers: + cache-control: [no-cache] + content-length: ['1221'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:42 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/be2db5afe8254b12bfab6288356c6814","kid":"https://vault1051159997aa0f1292.vault.azure.net/keys/certaa0f1292/be2db5afe8254b12bfab6288356c6814","sid":"https://vault1051159997aa0f1292.vault.azure.net/secrets/certaa0f1292/be2db5afe8254b12bfab6288356c6814","x5t":"c9mMcpiL9GyrNCL0fRXobh-D1dE","cer":"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","attributes":{"enabled":true,"nbf":1567638573,"exp":1599261573,"created":1567639173,"updated":1567639173,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":true},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=DefaultPolicy","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["cRLSign","dataEncipherment","digitalSignature","keyAgreement","keyCertSign","keyEncipherment"],"validity_months":12,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"days_before_expiry":90},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639157}},"pending":{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2405'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:43 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"tags": {"tag1": "updated_value1"}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['36'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/be2db5afe8254b12bfab6288356c6814","kid":"https://vault1051159997aa0f1292.vault.azure.net/keys/certaa0f1292/be2db5afe8254b12bfab6288356c6814","sid":"https://vault1051159997aa0f1292.vault.azure.net/secrets/certaa0f1292/be2db5afe8254b12bfab6288356c6814","x5t":"c9mMcpiL9GyrNCL0fRXobh-D1dE","cer":"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","attributes":{"enabled":true,"nbf":1567638573,"exp":1599261573,"created":1567639173,"updated":1567639183,"recoveryLevel":"Purgeable"},"tags":{"tag1":"updated_value1"},"policy":{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":true},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=DefaultPolicy","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["cRLSign","dataEncipherment","digitalSignature","keyAgreement","keyCertSign","keyEncipherment"],"validity_months":12,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"days_before_expiry":90},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639157}},"pending":{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2438'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:43 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/be2db5afe8254b12bfab6288356c6814","kid":"https://vault1051159997aa0f1292.vault.azure.net/keys/certaa0f1292/be2db5afe8254b12bfab6288356c6814","sid":"https://vault1051159997aa0f1292.vault.azure.net/secrets/certaa0f1292/be2db5afe8254b12bfab6288356c6814","x5t":"c9mMcpiL9GyrNCL0fRXobh-D1dE","cer":"MIIDNjCCAh6gAwIBAgIQRS2V4duQSEukqXtK6MyzZTANBgkqhkiG9w0BAQsFADAYMRYwFAYDVQQDEw1EZWZhdWx0UG9saWN5MB4XDTE5MDkwNDIzMDkzM1oXDTIwMDkwNDIzMTkzM1owGDEWMBQGA1UEAxMNRGVmYXVsdFBvbGljeTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANE7PJWZZ5y3ccM5lgl6b75S04htH9ejlyXpKXIHKV+YLOhLVWFUyrb2io/dzjPFVQr4L3rGWJn/WfaqvrWD/sFqHPIZt9F+ZfZKOyKhC93JwtvqE8mobu93caZBnsa0wRi5skXu0HouCdLIO6buDdjROXWuLfyjLdcPVx9nnyAT9Dxow2qwV7mtFj20RPMrkQhuFcc+D1ETLvbz4tnZ2WogD05MLWzqt5LY4KBBSfMvTa/Et4e6qnTt9NuxNQjVdQt/u8tiBorjTKeo3nHeMMaPdPHp6lPY/Idigg4Gcx4m4Y4iZW10HX3jd/fE1uO2Dx8ft/Ex9YNnDUuDDTnFfqkCAwEAAaN8MHowDgYDVR0PAQH/BAQDAgG+MAkGA1UdEwQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMB8GA1UdIwQYMBaAFNEaYaYSgQDmTip5+vSHeNlUXQ9FMB0GA1UdDgQWBBTRGmGmEoEA5k4qefr0h3jZVF0PRTANBgkqhkiG9w0BAQsFAAOCAQEAxRnNOPdrA5N+bOohh3/KYZ0fHfwDokTbPiae1GnkXGepydrpfp9A53iXL1k97/ZpxaO8IcIj3KA95aHbH68K9lzmz68gL2X7Zz3yxXc9XXkuYx61+4f1uvIrb2v9ZHioXWKedUj9zkNW8LmLg5rs2rjhP8RGMioAmZlb1/Bead0BQCjaj6Rz2WWGVfwkOl/GxgXgNBodUcsG3we+4N4CGOyZoswpYyNO3Hk9vtR3M43Hjm/E2IARHeZsca7WAE3EvlD7gyK6kB1+h1GyPtO4rY0WeMLR3JFIRm8uaBxUqu2uOKTJV6xHP6TX6VgyB9AI33iFk2YYnjpNLSSFlOQqng==","attributes":{"enabled":true,"nbf":1567638573,"exp":1599261573,"created":1567639173,"updated":1567639183,"recoveryLevel":"Purgeable"},"tags":{"tag1":"updated_value1"},"policy":{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":true},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=DefaultPolicy","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["cRLSign","dataEncipherment","digitalSignature","keyAgreement","keyCertSign","keyEncipherment"],"validity_months":12,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"days_before_expiry":90},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639157}},"pending":{"id":"https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2438'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:44 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa0f1292.vault.azure.net/certificates/certaa0f1292/be2db5afe8254b12bfab6288356c6814?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Certificate + not found: certaa0f1292/versions/be2db5afe8254b12bfab6288356c6814"}}'} + headers: + cache-control: [no-cache] + content-length: ['130'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:44 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_get_pending_certificate_signing_request.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_get_pending_certificate_signing_request.yaml new file mode 100644 index 000000000000..5ae1e0462349 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_get_pending_certificate_signing_request.yaml @@ -0,0 +1,239 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Thu, 05 Sep 2019 16:24:04 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/N3pOz7/NgPk2khYGnX6CfM0uVfLWZ3/+DvnzahhrpaBi1SRBMIk7OiFcd8bx1PfMLQC/E9MD8LbHhAvQgehpmBvR8U2Kk7d3ndFoTSG/Q97qKJyxbq3JKBMLQhcwFUWkLD1ynmO/cKGc1H/aR8pZwZUKeDytHb8O1IWfe+fJUS5Y7lkZsq0o2WtUR6Ssr1ZaZdvAQ8YoHmjahQNHR+jqN9Xvriw8it2THzLkVneUF9znXWJaRpV4GoLcDW00NgvDx6xbLz05K8vcYJwurL8sl62zq732nFZLFtqeChsFd1ozRv1NiIYEc1ZDr7IWBHAjXWnJaePOsr8rxLK0rF1kwIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAFArkimvS6tFp0IaYgk7S83Zqxn5ovCL91scXY705MVDke3mslvW3R+UUfCGp6NEqsanUspxMSJsfLmcHU24JKQSzxfUlJkE/hFHZNAIRgseYJ5ZOvXds/jxo26a7CqlwL9IwdSRDHjRN5JPTbb7GwkBXjahCryvdJ2DMDLAz/ucDtiIRK7D7xQuFDH+UWyFDBA3ij45/qpwrBtOU7vxqnWHcQPwAL7mkrR0h1zuwpyLO8f3IRlf1gxhcr8IdtKeo0jPZcogfURygyjOxBqjhkCpalSDAT/Gg6KrEatQG21rL0YD/OdRPYxzQKcvGFBTyAzo3Zfbc5wrwP0utZ/64xE=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"3345089b55c44826834bfdc2ec1045e7"}'} + headers: + cache-control: [no-cache] + content-length: ['1350'] + content-type: [application/json; charset=utf-8] + date: ['Thu, 05 Sep 2019 16:24:05 GMT'] + expires: ['-1'] + location: ['https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0&request_id=3345089b55c44826834bfdc2ec1045e7'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"3345089b55c44826834bfdc2ec1045e7"}'} + headers: + cache-control: [no-cache] + content-length: ['1350'] + content-type: [application/json; charset=utf-8] + date: ['Thu, 05 Sep 2019 16:24:05 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"3345089b55c44826834bfdc2ec1045e7"}'} + headers: + cache-control: [no-cache] + content-length: ['1350'] + content-type: [application/json; charset=utf-8] + date: ['Thu, 05 Sep 2019 16:24:15 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert","request_id":"3345089b55c44826834bfdc2ec1045e7"}'} + headers: + cache-control: [no-cache] + content-length: ['1275'] + content-type: [application/json; charset=utf-8] + date: ['Thu, 05 Sep 2019 16:24:25 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/pkcs10] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0 + response: + body: {string: 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} + headers: + cache-control: [no-cache] + content-length: ['956'] + content-type: [application/pkcs10; charset=utf-8] + date: ['Thu, 05 Sep 2019 16:24:31 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert","request_id":"3345089b55c44826834bfdc2ec1045e7"}'} + headers: + cache-control: [no-cache] + content-length: ['1275'] + content-type: [application/json; charset=utf-8] + date: ['Thu, 05 Sep 2019 16:24:31 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/c74aae98732c4f1dae1dd6c12efc5cef","kid":"https://vault1051159997dda41c5d.vault.azure.net/keys/unknownIssuerCert/c74aae98732c4f1dae1dd6c12efc5cef","sid":"https://vault1051159997dda41c5d.vault.azure.net/secrets/unknownIssuerCert/c74aae98732c4f1dae1dd6c12efc5cef","x5t":"zQtID9Qb0JVBh62VLQeFJVeduCg","cer":"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","attributes":{"enabled":true,"nbf":1567700060,"exp":1630859060,"created":1567700660,"updated":1567700660,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567700645,"updated":1567700645}},"pending":{"id":"https://vault1051159997dda41c5d.vault.azure.net/certificates/unknownIssuerCert/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2457'] + content-type: [application/json; charset=utf-8] + date: ['Thu, 05 Sep 2019 16:24:32 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_list.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_list.yaml new file mode 100644 index 000000000000..8b1f0305ef79 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_list.yaml @@ -0,0 +1,278 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997f5650dfd.vault.azure.net/certificates/cert0f5650dfd/import?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997f5650dfd.vault.azure.net/certificates/cert0f5650dfd/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert0f5650dfd/a8440275644e4c7db6b05ad4dd7ef495","kid":"https://vault1051159997f5650dfd.vault.azure.net/keys/cert0f5650dfd/a8440275644e4c7db6b05ad4dd7ef495","sid":"https://vault1051159997f5650dfd.vault.azure.net/secrets/cert0f5650dfd/a8440275644e4c7db6b05ad4dd7ef495","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639157,"updated":1567639157,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert0f5650dfd/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639157}}}'} + headers: + cache-control: [no-cache] + content-length: ['1834'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:17 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997f5650dfd.vault.azure.net/certificates/cert1f5650dfd/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert1f5650dfd/89cc3c94944344929ab98ebcc8b6c05e","kid":"https://vault1051159997f5650dfd.vault.azure.net/keys/cert1f5650dfd/89cc3c94944344929ab98ebcc8b6c05e","sid":"https://vault1051159997f5650dfd.vault.azure.net/secrets/cert1f5650dfd/89cc3c94944344929ab98ebcc8b6c05e","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639158,"updated":1567639158,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert1f5650dfd/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639158,"updated":1567639158}}}'} + headers: + cache-control: [no-cache] + content-length: ['1834'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:17 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997f5650dfd.vault.azure.net/certificates/cert2f5650dfd/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert2f5650dfd/3d56ceb6aa4640d68366f63f90c8420b","kid":"https://vault1051159997f5650dfd.vault.azure.net/keys/cert2f5650dfd/3d56ceb6aa4640d68366f63f90c8420b","sid":"https://vault1051159997f5650dfd.vault.azure.net/secrets/cert2f5650dfd/3d56ceb6aa4640d68366f63f90c8420b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639158,"updated":1567639158,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert2f5650dfd/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639158,"updated":1567639158}}}'} + headers: + cache-control: [no-cache] + content-length: ['1834'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997f5650dfd.vault.azure.net/certificates/cert3f5650dfd/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert3f5650dfd/49291ed29e014e7fa2e5c605b02c5040","kid":"https://vault1051159997f5650dfd.vault.azure.net/keys/cert3f5650dfd/49291ed29e014e7fa2e5c605b02c5040","sid":"https://vault1051159997f5650dfd.vault.azure.net/secrets/cert3f5650dfd/49291ed29e014e7fa2e5c605b02c5040","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639159,"updated":1567639159,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert3f5650dfd/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639159,"updated":1567639159}}}'} + headers: + cache-control: [no-cache] + content-length: ['1834'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997f5650dfd.vault.azure.net/certificates/cert4f5650dfd/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert4f5650dfd/c57d442a78c94b11b0977be867981481","kid":"https://vault1051159997f5650dfd.vault.azure.net/keys/cert4f5650dfd/c57d442a78c94b11b0977be867981481","sid":"https://vault1051159997f5650dfd.vault.azure.net/secrets/cert4f5650dfd/c57d442a78c94b11b0977be867981481","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639159,"updated":1567639159,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert4f5650dfd/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639159,"updated":1567639159}}}'} + headers: + cache-control: [no-cache] + content-length: ['1834'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997f5650dfd.vault.azure.net/certificates/cert5f5650dfd/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert5f5650dfd/b47c72b0bc6647dbaff5a0c8fdbdf260","kid":"https://vault1051159997f5650dfd.vault.azure.net/keys/cert5f5650dfd/b47c72b0bc6647dbaff5a0c8fdbdf260","sid":"https://vault1051159997f5650dfd.vault.azure.net/secrets/cert5f5650dfd/b47c72b0bc6647dbaff5a0c8fdbdf260","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert5f5650dfd/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639160,"updated":1567639160}}}'} + headers: + cache-control: [no-cache] + content-length: ['1834'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997f5650dfd.vault.azure.net/certificates/cert6f5650dfd/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert6f5650dfd/1628cb77ea0d488ca9d9a1b470194b4c","kid":"https://vault1051159997f5650dfd.vault.azure.net/keys/cert6f5650dfd/1628cb77ea0d488ca9d9a1b470194b4c","sid":"https://vault1051159997f5650dfd.vault.azure.net/secrets/cert6f5650dfd/1628cb77ea0d488ca9d9a1b470194b4c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert6f5650dfd/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639160,"updated":1567639160}}}'} + headers: + cache-control: [no-cache] + content-length: ['1834'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997f5650dfd.vault.azure.net/certificates?api-version=7.0 + response: + body: {string: '{"value":[{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert0f5650dfd","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639157,"updated":1567639157},"subject":""},{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert1f5650dfd","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639158,"updated":1567639158},"subject":""},{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert2f5650dfd","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639158,"updated":1567639158},"subject":""},{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert3f5650dfd","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639159,"updated":1567639159},"subject":""},{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert4f5650dfd","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639159,"updated":1567639159},"subject":""},{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert5f5650dfd","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160},"subject":""},{"id":"https://vault1051159997f5650dfd.vault.azure.net/certificates/cert6f5650dfd","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160},"subject":""}],"nextLink":null}'} + headers: + cache-control: [no-cache] + content-length: ['1700'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:20 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_list_certificate_versions.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_list_certificate_versions.yaml new file mode 100644 index 000000000000..b6a3992c8ddc --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_list_certificate_versions.yaml @@ -0,0 +1,278 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/import?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:17 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/f10a12d1e7b947419a4b1dfce77bd596","kid":"https://vault105115999779c016b7.vault.azure.net/keys/certver79c016b7/f10a12d1e7b947419a4b1dfce77bd596","sid":"https://vault105115999779c016b7.vault.azure.net/secrets/certver79c016b7/f10a12d1e7b947419a4b1dfce77bd596","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639158,"updated":1567639158,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639158,"updated":1567639158}}}'} + headers: + cache-control: [no-cache] + content-length: ['1842'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/27babdb35bcd4157bba6b93133e7945f","kid":"https://vault105115999779c016b7.vault.azure.net/keys/certver79c016b7/27babdb35bcd4157bba6b93133e7945f","sid":"https://vault105115999779c016b7.vault.azure.net/secrets/certver79c016b7/27babdb35bcd4157bba6b93133e7945f","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639158,"updated":1567639158,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639158,"updated":1567639158}}}'} + headers: + cache-control: [no-cache] + content-length: ['1842'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/64e1841b1648463c8e301a53da6d3f3e","kid":"https://vault105115999779c016b7.vault.azure.net/keys/certver79c016b7/64e1841b1648463c8e301a53da6d3f3e","sid":"https://vault105115999779c016b7.vault.azure.net/secrets/certver79c016b7/64e1841b1648463c8e301a53da6d3f3e","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639159,"updated":1567639159,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639158,"updated":1567639159}}}'} + headers: + cache-control: [no-cache] + content-length: ['1842'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/d89d0db0dbb64a57973f8259f3315038","kid":"https://vault105115999779c016b7.vault.azure.net/keys/certver79c016b7/d89d0db0dbb64a57973f8259f3315038","sid":"https://vault105115999779c016b7.vault.azure.net/secrets/certver79c016b7/d89d0db0dbb64a57973f8259f3315038","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639159,"updated":1567639159,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639158,"updated":1567639159}}}'} + headers: + cache-control: [no-cache] + content-length: ['1842'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/b37c81dcf5904c40a59c89ba060b1977","kid":"https://vault105115999779c016b7.vault.azure.net/keys/certver79c016b7/b37c81dcf5904c40a59c89ba060b1977","sid":"https://vault105115999779c016b7.vault.azure.net/secrets/certver79c016b7/b37c81dcf5904c40a59c89ba060b1977","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639158,"updated":1567639160}}}'} + headers: + cache-control: [no-cache] + content-length: ['1842'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:19 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/0281e0ffeda3447d8e9f91a6b3129f2b","kid":"https://vault105115999779c016b7.vault.azure.net/keys/certver79c016b7/0281e0ffeda3447d8e9f91a6b3129f2b","sid":"https://vault105115999779c016b7.vault.azure.net/secrets/certver79c016b7/0281e0ffeda3447d8e9f91a6b3129f2b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639158,"updated":1567639160}}}'} + headers: + cache-control: [no-cache] + content-length: ['1842'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:20 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/522e128240ff447aa3c936772e1b2dd1","kid":"https://vault105115999779c016b7.vault.azure.net/keys/certver79c016b7/522e128240ff447aa3c936772e1b2dd1","sid":"https://vault105115999779c016b7.vault.azure.net/secrets/certver79c016b7/522e128240ff447aa3c936772e1b2dd1","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639158,"updated":1567639160}}}'} + headers: + cache-control: [no-cache] + content-length: ['1842'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:20 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/versions?api-version=7.0 + response: + body: {string: '{"value":[{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/0281e0ffeda3447d8e9f91a6b3129f2b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160},"subject":""},{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/27babdb35bcd4157bba6b93133e7945f","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639158,"updated":1567639158},"subject":""},{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/522e128240ff447aa3c936772e1b2dd1","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160},"subject":""},{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/64e1841b1648463c8e301a53da6d3f3e","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639159,"updated":1567639159},"subject":""},{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/b37c81dcf5904c40a59c89ba060b1977","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639160,"updated":1567639160},"subject":""},{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/d89d0db0dbb64a57973f8259f3315038","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639159,"updated":1567639159},"subject":""},{"id":"https://vault105115999779c016b7.vault.azure.net/certificates/certver79c016b7/f10a12d1e7b947419a4b1dfce77bd596","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639158,"updated":1567639158},"subject":""}],"nextLink":null}'} + headers: + cache-control: [no-cache] + content-length: ['1945'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:20 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_list_versions.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_list_versions.yaml new file mode 100644 index 000000000000..ef2f735ded20 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_list_versions.yaml @@ -0,0 +1,380 @@ +interactions: +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/40e7303d7e8e41d3a9127f549fdb1172","kid":"https://vault864e11d5.vault.azure.net/keys/certver864e11d5/40e7303d7e8e41d3a9127f549fdb1172","sid":"https://vault864e11d5.vault.azure.net/secrets/certver864e11d5/40e7303d7e8e41d3a9127f549fdb1172","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1563401405,"updated":1563401405,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1563401405,"updated":1563401405}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Wed, 17 Jul 2019 22:10:06 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/eef3e63ac6d54529aa567664880a0c7c","kid":"https://vault864e11d5.vault.azure.net/keys/certver864e11d5/eef3e63ac6d54529aa567664880a0c7c","sid":"https://vault864e11d5.vault.azure.net/secrets/certver864e11d5/eef3e63ac6d54529aa567664880a0c7c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1563401406,"updated":1563401406,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1563401405,"updated":1563401406}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Wed, 17 Jul 2019 22:10:06 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/072a06b649fd4c4f90ac9cf75217dce4","kid":"https://vault864e11d5.vault.azure.net/keys/certver864e11d5/072a06b649fd4c4f90ac9cf75217dce4","sid":"https://vault864e11d5.vault.azure.net/secrets/certver864e11d5/072a06b649fd4c4f90ac9cf75217dce4","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1563401407,"updated":1563401407,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1563401405,"updated":1563401407}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Wed, 17 Jul 2019 22:10:07 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/6d9c31e087d74638a62ee47dfae41608","kid":"https://vault864e11d5.vault.azure.net/keys/certver864e11d5/6d9c31e087d74638a62ee47dfae41608","sid":"https://vault864e11d5.vault.azure.net/secrets/certver864e11d5/6d9c31e087d74638a62ee47dfae41608","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1563401407,"updated":1563401407,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1563401405,"updated":1563401407}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Wed, 17 Jul 2019 22:10:07 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/f853d025b860485b9b1fdafeb0465516","kid":"https://vault864e11d5.vault.azure.net/keys/certver864e11d5/f853d025b860485b9b1fdafeb0465516","sid":"https://vault864e11d5.vault.azure.net/secrets/certver864e11d5/f853d025b860485b9b1fdafeb0465516","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1563401407,"updated":1563401407,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1563401405,"updated":1563401407}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Wed, 17 Jul 2019 22:10:07 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/64553d50d646465f928a59ce719f24b2","kid":"https://vault864e11d5.vault.azure.net/keys/certver864e11d5/64553d50d646465f928a59ce719f24b2","sid":"https://vault864e11d5.vault.azure.net/secrets/certver864e11d5/64553d50d646465f928a59ce719f24b2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1563401408,"updated":1563401408,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1563401405,"updated":1563401408}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Wed, 17 Jul 2019 22:10:08 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/37bef912f0fc4f46bcd196c8b8513e2e","kid":"https://vault864e11d5.vault.azure.net/keys/certver864e11d5/37bef912f0fc4f46bcd196c8b8513e2e","sid":"https://vault864e11d5.vault.azure.net/secrets/certver864e11d5/37bef912f0fc4f46bcd196c8b8513e2e","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1563401408,"updated":1563401408,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault864e11d5.vault.azure.net/certificates/certver864e11d5/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1563401405,"updated":1563401408}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Wed, 17 Jul 2019 22:10:08 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_lst_versions.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_lst_versions.yaml new file mode 100644 index 000000000000..263e3ee8ca30 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_lst_versions.yaml @@ -0,0 +1,428 @@ +interactions: +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.7.2 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/ef910c91df49425ab0909f847c971ea2","kid":"https://vault74b5116c.vault.azure.net/keys/certver74b5116c/ef910c91df49425ab0909f847c971ea2","sid":"https://vault74b5116c.vault.azure.net/secrets/certver74b5116c/ef910c91df49425ab0909f847c971ea2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110297,"updated":1562110297,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1562110297,"updated":1562110297}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 02 Jul 2019 23:31:38 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.26;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.7.2 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/ea9afeaafc0e4257a5cf430725877245","kid":"https://vault74b5116c.vault.azure.net/keys/certver74b5116c/ea9afeaafc0e4257a5cf430725877245","sid":"https://vault74b5116c.vault.azure.net/secrets/certver74b5116c/ea9afeaafc0e4257a5cf430725877245","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110298,"updated":1562110298,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1562110297,"updated":1562110298}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 02 Jul 2019 23:31:38 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.26;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.7.2 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/447e151392b641c29cf8b42805d27d8f","kid":"https://vault74b5116c.vault.azure.net/keys/certver74b5116c/447e151392b641c29cf8b42805d27d8f","sid":"https://vault74b5116c.vault.azure.net/secrets/certver74b5116c/447e151392b641c29cf8b42805d27d8f","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110299,"updated":1562110299,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1562110297,"updated":1562110299}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 02 Jul 2019 23:31:39 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.26;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.7.2 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/06c17c5072114f4db7f93273f5c0c4b6","kid":"https://vault74b5116c.vault.azure.net/keys/certver74b5116c/06c17c5072114f4db7f93273f5c0c4b6","sid":"https://vault74b5116c.vault.azure.net/secrets/certver74b5116c/06c17c5072114f4db7f93273f5c0c4b6","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110299,"updated":1562110299,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1562110297,"updated":1562110299}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 02 Jul 2019 23:31:39 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.26;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.7.2 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/cb8748730cbb4c58af71535f52519a7a","kid":"https://vault74b5116c.vault.azure.net/keys/certver74b5116c/cb8748730cbb4c58af71535f52519a7a","sid":"https://vault74b5116c.vault.azure.net/secrets/certver74b5116c/cb8748730cbb4c58af71535f52519a7a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110300,"updated":1562110300,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1562110297,"updated":1562110300}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 02 Jul 2019 23:31:39 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.26;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.7.2 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/1d26f8d39dc04660bc77246e5ce6950c","kid":"https://vault74b5116c.vault.azure.net/keys/certver74b5116c/1d26f8d39dc04660bc77246e5ce6950c","sid":"https://vault74b5116c.vault.azure.net/secrets/certver74b5116c/1d26f8d39dc04660bc77246e5ce6950c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110300,"updated":1562110300,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1562110297,"updated":1562110300}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 02 Jul 2019 23:31:40 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.26;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '3339' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.7.2 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/import?api-version=7.0 + response: + body: + string: '{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/69da2ff6abd145a3a9d1ad352fcbdd90","kid":"https://vault74b5116c.vault.azure.net/keys/certver74b5116c/69da2ff6abd145a3a9d1ad352fcbdd90","sid":"https://vault74b5116c.vault.azure.net/secrets/certver74b5116c/69da2ff6abd145a3a9d1ad352fcbdd90","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110300,"updated":1562110300,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1562110297,"updated":1562110300}}}' + headers: + cache-control: + - no-cache + content-length: + - '1802' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 02 Jul 2019 23:31:40 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.26;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + User-Agent: + - python/3.7.2 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b1 azsdk-python-azure-keyvault/7.0 + method: GET + uri: https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/versions?api-version=7.0 + response: + body: + string: '{"value":[{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/06c17c5072114f4db7f93273f5c0c4b6","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110299,"updated":1562110299},"subject":""},{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/1d26f8d39dc04660bc77246e5ce6950c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110300,"updated":1562110300},"subject":""},{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/447e151392b641c29cf8b42805d27d8f","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110299,"updated":1562110299},"subject":""},{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/69da2ff6abd145a3a9d1ad352fcbdd90","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110300,"updated":1562110300},"subject":""},{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/cb8748730cbb4c58af71535f52519a7a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110300,"updated":1562110300},"subject":""},{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/ea9afeaafc0e4257a5cf430725877245","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110298,"updated":1562110298},"subject":""},{"id":"https://vault74b5116c.vault.azure.net/certificates/certver74b5116c/ef910c91df49425ab0909f847c971ea2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1562110297,"updated":1562110297},"subject":""}],"nextLink":null}' + headers: + cache-control: + - no-cache + content-length: + - '1875' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 02 Jul 2019 23:31:40 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.26;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_merge_certificate.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_merge_certificate.yaml new file mode 100644 index 000000000000..83584e568d3f --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_merge_certificate.yaml @@ -0,0 +1,213 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"policy": {"x509_props": {"subject": "CN=MyCert", "sans": {}}, "issuer": + {"name": "Unknown", "cert_transparency": false}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['123'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"1b3de19bb3fe41fd95f2c9bdfec1b705"}'} + headers: + cache-control: [no-cache] + content-length: ['1230'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:17 GMT'] + expires: ['-1'] + location: ['https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending?api-version=7.0&request_id=1b3de19bb3fe41fd95f2c9bdfec1b705'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"MIICoTCCAYkCAQAwETEPMA0GA1UEAxMGTXlDZXJ0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAn38bKr0WcxqY8S5Onn/ke8qA4RxOdIame/V+3oziSxcr0LuJB0jWOktyB+elROvmIKYWBtFz91UtXEtBDFc7auUa2yZifbVcNDVtRN13TbqdgEfNkBEMd7KWFWCsoDBjZ1TgHb0AKkM3AjH6L7CKf3yyod/AhdxLXCCFLgkdZskt0+TaAwSPtfcOvj0jujEBo0/8wcGOfJ+DyBnFsNpMXpIxGQo2QGGtkcCnE3qZt0hpLL+pCU41dac0BQhudu5fxmdRQSMtX+OrL6FLLz7TTkssBKSkTlYFOoW9XapvQTk/8aIkDwVEOnQ6ZRCDRSkMP+na/FfQX9dsHAslyrhZxQIDAQABoEswSQYJKoZIhvcNAQkOMTwwOjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAInhmSpCoLoGBrLhsWNclsSJg0ztuo4tOEIcoa454Gh7X+0J50Ce2XhL9MtwPKF2QFSwnVA4IQq2xyonHgqc7bSfAv3Af/eoJ2vtM0NLzFQyKC5ai2jW6gZhBa90bfIaESNCA7eAC3I52gl3LlfGijYKm5DMNgr7dSiaWogIZ1X2ahanaGrag0knVIa5hJWm9CbxT4Lk6cnHTunOGpblMg+3Ljump++RX3i25Qixhij7u17lzlBp1nhq0NUOwr25EDpdkTs6CUYVjWvJa0Lxujm8ySUukJrkS1dOslzPSdLmF8SiK5M+3FLhrhsCpmJ4zT+lMd2fXlvnJYbJd9Rgz54=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"1b3de19bb3fe41fd95f2c9bdfec1b705"}'} + headers: + cache-control: [no-cache] + content-length: ['1230'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:17 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"1b3de19bb3fe41fd95f2c9bdfec1b705"}'} + headers: + cache-control: [no-cache] + content-length: ['1230'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:27 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"1b3de19bb3fe41fd95f2c9bdfec1b705"}'} + headers: + cache-control: [no-cache] + content-length: ['1230'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:38 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"1b3de19bb3fe41fd95f2c9bdfec1b705"}'} + headers: + cache-control: [no-cache] + content-length: ['1230'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:48 GMT'] + expires: ['-1'] + pragma: [no-cache] + retry-after: ['10'] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"x5c": ["TUlJQ3lqQ0NBYklDQVFFd0RRWUpLb1pJaHZjTkFRRUxCUUF3UlRFTE1Ba0dBMVVFQmhNQ1FWVXhFekFSQmdOVkJBZ01DbE52YldVdFUzUmhkR1V4SVRBZkJnTlZCQW9NR0VsdWRHVnlibVYwSUZkcFpHZHBkSE1nVUhSNUlFeDBaREFlRncweE9UQTVNRFF5TXpFNU5EaGFGdzB4T1RBNU1EUXlNekl3TkRoYU1CRXhEekFOQmdOVkJBTVRCazE1UTJWeWREQ0NBU0l3RFFZSktvWklodmNOQVFFQkJRQURnZ0VQQURDQ0FRb0NnZ0VCQUo5L0d5cTlGbk1hbVBFdVRwNS81SHZLZ09FY1RuU0dwbnYxZnQ2TTRrc1hLOUM3aVFkSTFqcExjZ2ZucFVUcjVpQ21GZ2JSYy9kVkxWeExRUXhYTzJybEd0c21ZbjIxWERRMWJVVGRkMDI2bllCSHpaQVJESGV5bGhWZ3JLQXdZMmRVNEIyOUFDcEROd0l4K2krd2luOThzcUhmd0lYY1Mxd2doUzRKSFdiSkxkUGsyZ01FajdYM0RyNDlJN294QWFOUC9NSEJqbnlmZzhnWnhiRGFURjZTTVJrS05rQmhyWkhBcHhONm1iZElhU3kvcVFsT05YV25OQVVJYm5idVg4Wm5VVUVqTFYvanF5K2hTeTgrMDA1TExBU2twRTVXQlRxRnZWMnFiMEU1UC9HaUpBOEZSRHAwT21VUWcwVXBERC9wMnZ4WDBGL1hiQndMSmNxNFdjVUNBd0VBQVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVpLT0daOC9OQmd0WTFid3RRRXcxZVVVelU4Ri8ra0RCeHAyODl5aTBWczcvZzVkdms2OE00V2xRNjYwUVIxMGdIbU9NUWxvSHZvMGxJbXFRYUl3eCtldnBxdlJhVGZCNjVQRGVpSG5iVG5MSzFtL3c0akJPVTZ1SmFFWEdDeTI5Ym12dWRaQW42c0VqeENUWXJlTDVBWnN6YmVPM1dsMVo1ZkQxc2NRQnZkKytyRWVKZWVLMmxKaWM0bHpOUE5nZHFocVVUY3lZcFdOU3dFNFRyeXlYeXJ0VlhSRDVMTEZkMGszTkxkcWVna2tkU0xtZWNKam45blE2elZSbTBieWZOelhqUGJNYWZQL3k2VzJSejdhdXJnUVlMR21wZGxxZVdxT0JOL0t4aXlzZWNxaEFPYW43MkJ0aXF0cG5mK1BycVQ1YUxFWlJJeFdxdjI5akMxMnVpZz09"]}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['1293'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending/merge?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/f8458998787a4b46860305081b9d73d4","kid":"https://vault1051159997cf0f1333.vault.azure.net/keys/mergeCertificate/f8458998787a4b46860305081b9d73d4","sid":"https://vault1051159997cf0f1333.vault.azure.net/secrets/mergeCertificate/f8458998787a4b46860305081b9d73d4","x5t":"QIQJzdaI6u8ueFwhLOSmsZJBKKU","cer":"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","attributes":{"enabled":true,"nbf":1567639188,"exp":1567639248,"created":1567639188,"updated":1567639188,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=MyCert","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":12,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown","cert_transparency":false},"attributes":{"enabled":true,"created":1567639158,"updated":1567639158}},"pending":{"id":"https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2251'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:49 GMT'] + expires: ['-1'] + location: ['https://vault1051159997cf0f1333.vault.azure.net/certificates/mergeCertificate?api-version=7.0'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 201, message: Created} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_policy.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_policy.yaml new file mode 100644 index 000000000000..d7617cd8c7ba --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_policy.yaml @@ -0,0 +1,150 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/import?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/e5f19bc3645d4551b1ce5461b841c40d","kid":"https://vault105115999712a60ed1.vault.azure.net/keys/policyCertificate/e5f19bc3645d4551b1ce5461b841c40d","sid":"https://vault105115999712a60ed1.vault.azure.net/secrets/policyCertificate/e5f19bc3645d4551b1ce5461b841c40d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639157,"updated":1567639157,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639157}}}'} + headers: + cache-control: [no-cache] + content-length: ['1850'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/policy?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639157}}'} + headers: + cache-control: [no-cache] + content-length: ['550'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"key_props": {"exportable": true, "kty": "RSA", "key_size": 2048, "reuse_key": + false}, "secret_props": {"contentType": "application/x-pkcs12"}, "issuer": {"name": + "Self"}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['172'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/policy?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639158}}'} + headers: + cache-control: [no-cache] + content-length: ['547'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/policy?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999712a60ed1.vault.azure.net/certificates/policyCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639157,"updated":1567639158}}'} + headers: + cache-control: [no-cache] + content-length: ['547'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:19:18 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_recover_and_purge.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_recover_and_purge.yaml new file mode 100644 index 000000000000..58347438833f --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client.test_recover_and_purge.yaml @@ -0,0 +1,1481 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/import?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:22 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639223,"updated":1567639223,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639223,"updated":1567639223}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:23 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:24 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:24 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639225,"updated":1567639225}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:24 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639225,"updated":1567639225}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:25 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:25 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:26 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg0cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg0cfef134b/e87b2f82700843468571834ed3595795","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg0cfef134b/e87b2f82700843468571834ed3595795","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg0cfef134b/e87b2f82700843468571834ed3595795","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg0cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:26 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg1cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg1cfef134b/01a6e6e9dea34bc9afe36b9fb60275f4","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg1cfef134b/01a6e6e9dea34bc9afe36b9fb60275f4","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg1cfef134b/01a6e6e9dea34bc9afe36b9fb60275f4","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639227,"updated":1567639227,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg1cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639227,"updated":1567639227}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:27 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg2cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg2cfef134b/91929d99df0a46d7a330e2ceaba2c17c","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg2cfef134b/91929d99df0a46d7a330e2ceaba2c17c","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg2cfef134b/91929d99df0a46d7a330e2ceaba2c17c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639227,"updated":1567639227,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg2cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639227,"updated":1567639227}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:27 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg3cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg3cfef134b/8a86147655404b6d8c131fe9d14a07f2","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg3cfef134b/8a86147655404b6d8c131fe9d14a07f2","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg3cfef134b/8a86147655404b6d8c131fe9d14a07f2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639228,"updated":1567639228,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg3cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639228,"updated":1567639228}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:27 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg4cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg4cfef134b/07f8e58772b247b99c564318f03dc623","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg4cfef134b/07f8e58772b247b99c564318f03dc623","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg4cfef134b/07f8e58772b247b99c564318f03dc623","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639228,"updated":1567639228,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg4cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639228,"updated":1567639228}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:28 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg5cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg5cfef134b/d39302e4f1ba4123a1d290a0eecb1677","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg5cfef134b/d39302e4f1ba4123a1d290a0eecb1677","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg5cfef134b/d39302e4f1ba4123a1d290a0eecb1677","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639229,"updated":1567639229,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg5cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639229,"updated":1567639229}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:28 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg6cfef134b/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg6cfef134b/ad7cdf4d396c4fc4a569feb738cc8825","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg6cfef134b/ad7cdf4d396c4fc4a569feb738cc8825","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg6cfef134b/ad7cdf4d396c4fc4a569feb738cc8825","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639229,"updated":1567639229,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg6cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639229,"updated":1567639229}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:28 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec0cfef134b","deletedDate":1567639229,"scheduledPurgeDate":1575415229,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639223,"updated":1567639223,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639223,"updated":1567639223}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:29 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec1cfef134b","deletedDate":1567639229,"scheduledPurgeDate":1575415229,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:29 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec2cfef134b","deletedDate":1567639229,"scheduledPurgeDate":1575415229,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:29 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec3cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639225,"updated":1567639225}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:29 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec4cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639225,"updated":1567639225}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:29 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec5cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:29 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec6cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:29 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg0cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg0cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg0cfef134b/e87b2f82700843468571834ed3595795","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg0cfef134b/e87b2f82700843468571834ed3595795","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg0cfef134b/e87b2f82700843468571834ed3595795","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg0cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg1cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg1cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg1cfef134b/01a6e6e9dea34bc9afe36b9fb60275f4","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg1cfef134b/01a6e6e9dea34bc9afe36b9fb60275f4","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg1cfef134b/01a6e6e9dea34bc9afe36b9fb60275f4","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639227,"updated":1567639227,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg1cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639227,"updated":1567639227}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg2cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg2cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg2cfef134b/91929d99df0a46d7a330e2ceaba2c17c","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg2cfef134b/91929d99df0a46d7a330e2ceaba2c17c","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg2cfef134b/91929d99df0a46d7a330e2ceaba2c17c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639227,"updated":1567639227,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg2cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639227,"updated":1567639227}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg3cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg3cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg3cfef134b/8a86147655404b6d8c131fe9d14a07f2","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg3cfef134b/8a86147655404b6d8c131fe9d14a07f2","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg3cfef134b/8a86147655404b6d8c131fe9d14a07f2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639228,"updated":1567639228,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg3cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639228,"updated":1567639228}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg4cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg4cfef134b","deletedDate":1567639231,"scheduledPurgeDate":1575415231,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg4cfef134b/07f8e58772b247b99c564318f03dc623","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg4cfef134b/07f8e58772b247b99c564318f03dc623","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg4cfef134b/07f8e58772b247b99c564318f03dc623","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639228,"updated":1567639228,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg4cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639228,"updated":1567639228}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg5cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg5cfef134b","deletedDate":1567639231,"scheduledPurgeDate":1575415231,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg5cfef134b/d39302e4f1ba4123a1d290a0eecb1677","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg5cfef134b/d39302e4f1ba4123a1d290a0eecb1677","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg5cfef134b/d39302e4f1ba4123a1d290a0eecb1677","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639229,"updated":1567639229,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg5cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639229,"updated":1567639229}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certprg6cfef134b?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg6cfef134b","deletedDate":1567639231,"scheduledPurgeDate":1575415231,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg6cfef134b/ad7cdf4d396c4fc4a569feb738cc8825","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certprg6cfef134b/ad7cdf4d396c4fc4a569feb738cc8825","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certprg6cfef134b/ad7cdf4d396c4fc4a569feb738cc8825","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639229,"updated":1567639229,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg6cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639229,"updated":1567639229}}}'} + headers: + cache-control: [no-cache] + content-length: ['2015'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates?api-version=7.0 + response: + body: {string: '{"value":[{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg0cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg0cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg1cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg1cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639227,"updated":1567639227,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg2cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg2cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639227,"updated":1567639227,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg3cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg3cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639228,"updated":1567639228,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg4cfef134b","deletedDate":1567639231,"scheduledPurgeDate":1575415231,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg4cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639228,"updated":1567639228,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg5cfef134b","deletedDate":1567639231,"scheduledPurgeDate":1575415231,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg5cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639229,"updated":1567639229,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg6cfef134b","deletedDate":1567639231,"scheduledPurgeDate":1575415231,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certprg6cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639229,"updated":1567639229,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec0cfef134b","deletedDate":1567639229,"scheduledPurgeDate":1575415229,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639223,"updated":1567639223,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec1cfef134b","deletedDate":1567639229,"scheduledPurgeDate":1575415229,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec2cfef134b","deletedDate":1567639229,"scheduledPurgeDate":1575415229,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec3cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec4cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec5cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec6cfef134b","deletedDate":1567639230,"scheduledPurgeDate":1575415230,"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"}}],"nextLink":null}'} + headers: + cache-control: [no-cache] + content-length: ['5991'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:01 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec0cfef134b/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639223,"updated":1567639223,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639223,"updated":1567639223}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:01 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec1cfef134b/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:01 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec2cfef134b/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:01 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec3cfef134b/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639225,"updated":1567639225}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:01 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec4cfef134b/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639225,"updated":1567639225}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:02 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec5cfef134b/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:02 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certrec6cfef134b/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:02 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: ['*/*'] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg0cfef134b?api-version=7.0 + response: + body: {string: ''} + headers: + cache-control: [no-cache] + date: ['Wed, 04 Sep 2019 23:21:02 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 204, message: No Content} +- request: + body: null + headers: + Accept: ['*/*'] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg1cfef134b?api-version=7.0 + response: + body: {string: ''} + headers: + cache-control: [no-cache] + date: ['Wed, 04 Sep 2019 23:21:02 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 204, message: No Content} +- request: + body: null + headers: + Accept: ['*/*'] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg2cfef134b?api-version=7.0 + response: + body: {string: ''} + headers: + cache-control: [no-cache] + date: ['Wed, 04 Sep 2019 23:21:02 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 204, message: No Content} +- request: + body: null + headers: + Accept: ['*/*'] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg3cfef134b?api-version=7.0 + response: + body: {string: ''} + headers: + cache-control: [no-cache] + date: ['Wed, 04 Sep 2019 23:21:02 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 204, message: No Content} +- request: + body: null + headers: + Accept: ['*/*'] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg4cfef134b?api-version=7.0 + response: + body: {string: ''} + headers: + cache-control: [no-cache] + date: ['Wed, 04 Sep 2019 23:21:03 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 204, message: No Content} +- request: + body: null + headers: + Accept: ['*/*'] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg5cfef134b?api-version=7.0 + response: + body: {string: ''} + headers: + cache-control: [no-cache] + date: ['Wed, 04 Sep 2019 23:21:03 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 204, message: No Content} +- request: + body: null + headers: + Accept: ['*/*'] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates/certprg6cfef134b?api-version=7.0 + response: + body: {string: ''} + headers: + cache-control: [no-cache] + date: ['Wed, 04 Sep 2019 23:21:03 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 204, message: No Content} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfef134b.vault.azure.net/deletedcertificates?api-version=7.0 + response: + body: {string: '{"value":[],"nextLink":null}'} + headers: + cache-control: [no-cache] + content-length: ['28'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:33 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec0cfef134b/c83c94bc1b064ec89c9b29ed19b624f0","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639223,"updated":1567639223,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec0cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639223,"updated":1567639223}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:33 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec1cfef134b/45ccdf842d31424eba5f46aaaccb0d3a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec1cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:33 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec2cfef134b/1ad2aa1f68254665a23ac6f677037381","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639224,"updated":1567639224,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec2cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:33 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec3cfef134b/fc826f21aee34432ad64c75341305f91","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec3cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639225,"updated":1567639225}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:34 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec4cfef134b/6fb5d40623e048d9bd273f4810ac6418","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639225,"updated":1567639225,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec4cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639225,"updated":1567639225}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:34 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec5cfef134b/d7bb2298bf9b40269f47a70b59e2d6ae","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec5cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:34 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","kid":"https://vault1051159997cfef134b.vault.azure.net/keys/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","sid":"https://vault1051159997cfef134b.vault.azure.net/secrets/certrec6cfef134b/53f5af916be14bf6a08e868ae39befe4","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639226,"updated":1567639226,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997cfef134b.vault.azure.net/certificates/certrec6cfef134b/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639226,"updated":1567639226}}}'} + headers: + cache-control: [no-cache] + content-length: ['1858'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:34 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_async_request_cancellation_and_deletion.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_async_request_cancellation_and_deletion.yaml new file mode 100644 index 000000000000..2df8fbf54347 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_async_request_cancellation_and_deletion.yaml @@ -0,0 +1,232 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:53:35 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"4f8d628b429345988cb98c1197723d3f"}'} + headers: + cache-control: no-cache + content-length: '1357' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:53:37 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '9', '5', a, a, '1', e, d, '5', ., v, a, u, l, t, + ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, a, + s, y, n, c, C, a, n, c, e, l, e, d, D, e, l, e, t, e, d, C, e, r, t, /, p, + e, n, d, i, n, g, '?', a, p, i, '-', v, e, r, s, i, o, n, '=', '7', ., '0', + '&', r, e, q, u, e, s, t, _, i, d, '=', '4', f, '8', d, '6', '2', '8', b, + '4', '2', '9', '3', '4', '5', '9', '8', '8', c, b, '9', '8', c, '1', '1', + '9', '7', '7', '2', '3', d, '3', f] + pragma: no-cache + retry-after: '10' + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert/create, api-version=7.0, ''] +- request: + body: '{"cancellation_requested": true}' + headers: + Accept: [application/json] + Content-Length: ['32'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":true,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"4f8d628b429345988cb98c1197723d3f"}'} + headers: {cache-control: no-cache, content-length: '1356', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:53:37 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":true,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"4f8d628b429345988cb98c1197723d3f"}'} + headers: {cache-control: no-cache, content-length: '1356', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:53:37 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":true,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"4f8d628b429345988cb98c1197723d3f"}'} + headers: {cache-control: no-cache, content-length: '1356', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:53:48 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":true,"status":"cancelled","request_id":"4f8d628b429345988cb98c1197723d3f"}'} + headers: {cache-control: no-cache, content-length: '1191', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:53:58 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":true,"status":"cancelled","request_id":"4f8d628b429345988cb98c1197723d3f"}'} + headers: {cache-control: no-cache, content-length: '1191', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:54:03 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAz9FPUNV/o3Otk5SDzRxVGgpZpug1A73sZgraPgkAj+EdPKxHGsxsLdH15CeK2FvklVoxvIk9vOOp5SIkL4eWbWrQJ6qKrKex41MMGq4anzq8I4wG6RB3zFAkWfVSHXsriVsHJc1U6N0ffYGktNA6C2UEsauYQ8ihOJ034d0FCbsaDGlFwwrY0KAei7a+bzyiXXah/kXGF28FheNWvPWEITnrw+QIYph0pZnJhH5nsI+JCVQa7GEjUueHuRH3P0IAVMXywCe3fv9A//Vkxcb2H19Stz6Knrf+e4rO3jK2UxI1ss6Nc0Ub0h6b7nj3e4x8dntcDezEINJ4rvqHLTNzpwIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAD4AltGjOY6hsqMsUmKP3W7NzBIFsDH6UIXY/Nn0krev5GGiPEdo6Ikq76GfIRJKsqrPfhSLb1DQFEBr4KIpLzQEoacJpZtVJs6r4ihyl6q8UTfKKR8vDIIVxzEmZnxaYKSdm+JyOmbMCKIX0zYikvA01XGrzvcxw57ZRdDwWo5p0odnVxQZsfE7dbmqVMh4wi91PVGPxGzGDrGFqp/9zA9X5Av3u5fM239D7gvvH2BPNL7RVPGJj24wqPdOAW1e0z1g5M4tGpoQPqPmVlQvwbrFidpkFescwBz0VPU4J4aiwt3Uyz7GE6/AY3t7olw9r4KLAreB8yPIP+kl2taG/P0=","cancellation_requested":true,"status":"cancelled","request_id":"4f8d628b429345988cb98c1197723d3f"}'} + headers: {cache-control: no-cache, content-length: '1191', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:54:03 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/pending?api-version=7.0 + response: + body: {string: '{"error":{"code":"PendingCertificateNotFound","message":"Pending + certificate not found: asyncCanceledDeletedCert"}}'} + headers: {cache-control: no-cache, content-length: '115', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:54:03 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/ba6914d440934266b3fd9ef55c35908c","attributes":{"enabled":false,"nbf":1567640617,"exp":1630799617,"created":1567641217,"updated":1567641217,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999795aa1ed5.vault.azure.net/certificates/asyncCanceledDeletedCert/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567641217,"updated":1567641217}}}'} + headers: {cache-control: no-cache, content-length: '942', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:54:03 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999795aa1ed5.vault.azure.net, + /certificates/asyncCanceledDeletedCert, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_backup_restore.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_backup_restore.yaml new file mode 100644 index 000000000000..1b20ac9e891f --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_backup_restore.yaml @@ -0,0 +1,210 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:19:58 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997cfa1497.vault.azure.net, + /certificates/certcfa1497/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {}, "validity_months": + 24}, "lifetime_actions": [{"trigger": {"lifetime_percentage": 2}, "action": + {"action_type": "EmailContacts"}}], "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['375'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"9003453483304d8c9c191b06e2e396e4"}'} + headers: + cache-control: no-cache + content-length: '1303' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:19:59 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', c, f, a, '1', '4', '9', '7', ., v, a, u, l, t, ., + a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, c, e, + r, t, c, f, a, '1', '4', '9', '7', /, p, e, n, d, i, n, g, '?', a, p, i, '-', + v, e, r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, t, _, i, d, + '=', '9', '0', '0', '3', '4', '5', '3', '4', '8', '3', '3', '0', '4', d, '8', + c, '9', c, '1', '9', '1', b, '0', '6', e, '2', e, '3', '9', '6', e, '4'] + pragma: no-cache + retry-after: '10' + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997cfa1497.vault.azure.net, + /certificates/certcfa1497/create, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"9003453483304d8c9c191b06e2e396e4"}'} + headers: {cache-control: no-cache, content-length: '1303', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:19:59 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997cfa1497.vault.azure.net, + /certificates/certcfa1497/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending","issuer":{"name":"Self"},"csr":"MIICqjCCAZICAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqD1scIVrdmfjlAWncS4iyAjroA8v5+2QXaGW5J7BWK/FJQ1gWb4466HtNE3rhXkVg0LxKrDGN+6VSVTe+qAPv1RT2X0++PcLsTEY5DYH/bs3bav72ftX6h5c6TA+NrBO1I34B57HknTmNLtKX1IR6TAtFnGeOB7hw8X0G8CJyFCV0vXUPcONAkWMtUhP2eI6KpwDTpkffOeBnPuCcGT6EHg9gjvmldFxxkVbqdhwObR01o+Bi2ar42MFN/35BQJQpXPAlLNj+w+Jy/+OPOC3Md/BSMud+bfDp0k3dWW1KegGq4Xh2xrqoWo1L7En4Ypf9EVdIWzKVq/zKNRxQ5KypQIDAQABoEswSQYJKoZIhvcNAQkOMTwwOjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAHxWDCITt43yBQ/6D6H9IuR4pfvwYNnTV5ErnKOU7AERpiYfSW3ViFfj4ybgudKcLV4NRd6+ip0IA2i0OqHapNhb+zoM86K/rZxbPZvaHF+IqhbM3rIaoRKkA1Bd5R8UpJX+Wp7rIVFmyv3RVloW43J5/ihHmrwE5QWs50xox9EUVkGfQ9ou8XTuV/gu9iWaxZ04qMo8dCU/00jKW5zok3X500+xr4MgcOqsBKPHw/EfZIXaS8iuY6AML/DqOIm8xEERcdutLwyD1o9LXWcW3OpsRHrvRmhWN9vo/NbcyWGeeVG3TrRwteMVwBr09fbyvwKGdQBDSDZH/Mbtrz6kwuo=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"9003453483304d8c9c191b06e2e396e4"}'} + headers: {cache-control: no-cache, content-length: '1303', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:09 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997cfa1497.vault.azure.net, + /certificates/certcfa1497/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497","request_id":"9003453483304d8c9c191b06e2e396e4"}'} + headers: {cache-control: no-cache, content-length: '1221', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:19 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997cfa1497.vault.azure.net, + /certificates/certcfa1497/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending","issuer":{"name":"Self"},"csr":"MIICqjCCAZICAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqD1scIVrdmfjlAWncS4iyAjroA8v5+2QXaGW5J7BWK/FJQ1gWb4466HtNE3rhXkVg0LxKrDGN+6VSVTe+qAPv1RT2X0++PcLsTEY5DYH/bs3bav72ftX6h5c6TA+NrBO1I34B57HknTmNLtKX1IR6TAtFnGeOB7hw8X0G8CJyFCV0vXUPcONAkWMtUhP2eI6KpwDTpkffOeBnPuCcGT6EHg9gjvmldFxxkVbqdhwObR01o+Bi2ar42MFN/35BQJQpXPAlLNj+w+Jy/+OPOC3Md/BSMud+bfDp0k3dWW1KegGq4Xh2xrqoWo1L7En4Ypf9EVdIWzKVq/zKNRxQ5KypQIDAQABoEswSQYJKoZIhvcNAQkOMTwwOjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAHxWDCITt43yBQ/6D6H9IuR4pfvwYNnTV5ErnKOU7AERpiYfSW3ViFfj4ybgudKcLV4NRd6+ip0IA2i0OqHapNhb+zoM86K/rZxbPZvaHF+IqhbM3rIaoRKkA1Bd5R8UpJX+Wp7rIVFmyv3RVloW43J5/ihHmrwE5QWs50xox9EUVkGfQ9ou8XTuV/gu9iWaxZ04qMo8dCU/00jKW5zok3X500+xr4MgcOqsBKPHw/EfZIXaS8iuY6AML/DqOIm8xEERcdutLwyD1o9LXWcW3OpsRHrvRmhWN9vo/NbcyWGeeVG3TrRwteMVwBr09fbyvwKGdQBDSDZH/Mbtrz6kwuo=","cancellation_requested":false,"status":"completed","target":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497","request_id":"9003453483304d8c9c191b06e2e396e4"}'} + headers: {cache-control: no-cache, content-length: '1221', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:25 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997cfa1497.vault.azure.net, + /certificates/certcfa1497/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/backup?api-version=7.0 + response: + body: {string: '{"value":"&AzureKeyVaultKeyBackupV1.microsoft.comeyJraWQiOiI0Mzg1YjA3Yi1kNTQ3LTQyZTUtYWU5ZS02MTBkYzM5ZGZhZjgiLCJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.dFZYR-1zjcN25pysdDKOHlR9FsdaKCUWdMuO91ldCz2hkZxVPNR8zh-YzJeyFQbvSDYSYRTh_mE7fJMtJacqEveNtKH896CPw-_bUBYfdKIHDEGR2hFfg6c4Xhtyvi4lvBJp2WrE3WHBQ8GX-8Ygi0F672IOBJ8mqvaxbF2Ccjpe5wSLsXuVbNvfJgYOmKgjsS1YIsJ2XHKbp5FQGYrYke9wKfjV-Kqyt6DM5301XK7gTxFU8mvQwrFwM6ttjwhSAUx4Z2QCH1pXdM-CMst2TdBAjOn2e-2HUv5crxvhHsRO8HqS9x0IKTbypJJnoywp0ja5vesAkAXpRadv9ouoKg.v4nqllFr9s5q-Itql7EJ7Q.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.XL2EAlzgpsjOLFctGvxMcg"}'} + headers: {cache-control: no-cache, content-length: '42664', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:25 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997cfa1497.vault.azure.net, + /certificates/certcfa1497/backup, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/ed4a81ce38bd4aff9a320a54999365bb","kid":"https://vault1051159997cfa1497.vault.azure.net/keys/certcfa1497/ed4a81ce38bd4aff9a320a54999365bb","sid":"https://vault1051159997cfa1497.vault.azure.net/secrets/certcfa1497/ed4a81ce38bd4aff9a320a54999365bb","x5t":"EGCdbDY5NxW2aWAyaffevJ0T5WI","cer":"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","attributes":{"enabled":true,"nbf":1567638614,"exp":1630797614,"created":1567639214,"updated":1567639214,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":2},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639199,"updated":1567639199}},"pending":{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/pending"}}'} + headers: {cache-control: no-cache, content-length: '2348', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:26 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997cfa1497.vault.azure.net, + /certificates/certcfa1497, api-version=7.0, ''] +- request: + body: '{"value": "&AzureKeyVaultKeyBackupV1.microsoft.comeyJraWQiOiI0Mzg1YjA3Yi1kNTQ3LTQyZTUtYWU5ZS02MTBkYzM5ZGZhZjgiLCJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.dFZYR-1zjcN25pysdDKOHlR9FsdaKCUWdMuO91ldCz2hkZxVPNR8zh-YzJeyFQbvSDYSYRTh_mE7fJMtJacqEveNtKH896CPw-_bUBYfdKIHDEGR2hFfg6c4Xhtyvi4lvBJp2WrE3WHBQ8GX-8Ygi0F672IOBJ8mqvaxbF2Ccjpe5wSLsXuVbNvfJgYOmKgjsS1YIsJ2XHKbp5FQGYrYke9wKfjV-Kqyt6DM5301XK7gTxFU8mvQwrFwM6ttjwhSAUx4Z2QCH1pXdM-CMst2TdBAjOn2e-2HUv5crxvhHsRO8HqS9x0IKTbypJJnoywp0ja5vesAkAXpRadv9ouoKg.v4nqllFr9s5q-Itql7EJ7Q.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.XL2EAlzgpsjOLFctGvxMcg"}' + headers: + Accept: [application/json] + Content-Length: ['42665'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997cfa1497.vault.azure.net/certificates/restore?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/ed4a81ce38bd4aff9a320a54999365bb","kid":"https://vault1051159997cfa1497.vault.azure.net/keys/certcfa1497/ed4a81ce38bd4aff9a320a54999365bb","sid":"https://vault1051159997cfa1497.vault.azure.net/secrets/certcfa1497/ed4a81ce38bd4aff9a320a54999365bb","x5t":"EGCdbDY5NxW2aWAyaffevJ0T5WI","cer":"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","attributes":{"enabled":true,"nbf":1567638614,"exp":1630797614,"created":1567639214,"updated":1567639214,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997cfa1497.vault.azure.net/certificates/certcfa1497/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":2},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639199,"updated":1567639199}}}'} + headers: {cache-control: no-cache, content-length: '2239', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:26 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997cfa1497.vault.azure.net, + /certificates/restore, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_crud_contacts.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_crud_contacts.yaml new file mode 100644 index 000000000000..97fb342eebc8 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_crud_contacts.yaml @@ -0,0 +1,109 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997f8b2142a.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:19:58 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997f8b2142a.vault.azure.net, + /certificates/contacts, api-version=7.0, ''] +- request: + body: '{"contacts": [{"email": "admin@contoso.com", "name": "John Doe", "phone": + "1111111111"}, {"email": "admin2@contoso.com", "name": "John Doe2", "phone": + "2222222222"}]}' + headers: + Accept: [application/json] + Content-Length: ['166'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997f8b2142a.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f8b2142a.vault.azure.net/certificates/contacts","contacts":[{"email":"admin@contoso.com","name":"John + Doe","phone":"1111111111"},{"email":"admin2@contoso.com","name":"John Doe2","phone":"2222222222"}]}'} + headers: {cache-control: no-cache, content-length: '231', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:19:58 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997f8b2142a.vault.azure.net, + /certificates/contacts, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997f8b2142a.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f8b2142a.vault.azure.net/certificates/contacts","contacts":[{"email":"admin@contoso.com","name":"John + Doe","phone":"1111111111"},{"email":"admin2@contoso.com","name":"John Doe2","phone":"2222222222"}]}'} + headers: {cache-control: no-cache, content-length: '231', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:19:58 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997f8b2142a.vault.azure.net, + /certificates/contacts, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997f8b2142a.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997f8b2142a.vault.azure.net/certificates/contacts","contacts":[{"email":"admin@contoso.com","name":"John + Doe","phone":"1111111111"},{"email":"admin2@contoso.com","name":"John Doe2","phone":"2222222222"}]}'} + headers: {cache-control: no-cache, content-length: '231', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:19:58 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997f8b2142a.vault.azure.net, + /certificates/contacts, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997f8b2142a.vault.azure.net/certificates/contacts?api-version=7.0 + response: + body: {string: '{"error":{"code":"ContactsNotFound","message":"Contacts not found"}}'} + headers: {cache-control: no-cache, content-length: '68', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:19:58 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997f8b2142a.vault.azure.net, + /certificates/contacts, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_crud_issuer.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_crud_issuer.yaml new file mode 100644 index 000000000000..9946c6f321e6 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_crud_issuer.yaml @@ -0,0 +1,171 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:30:01 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997d1371366.vault.azure.net, + /certificates/issuers/issuer, api-version=7.0, ''] +- request: + body: '{"provider": "Test", "credentials": {"account_id": "keyvaultuser"}, "org_details": + {"admin_details": [{"first_name": "John", "last_name": "Doe", "email": "admin@microsoft.com", + "phone": "4255555555"}]}, "attributes": {"enabled": true}}' + headers: + Accept: [application/json] + Content-Length: ['235'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer","provider":"Test","credentials":{"account_id":"keyvaultuser"},"org_details":{"zip":0,"admin_details":[{"first_name":"John","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639802,"updated":1567639802}}'} + headers: {cache-control: no-cache, content-length: '351', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:30:01 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997d1371366.vault.azure.net, + /certificates/issuers/issuer, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer","provider":"Test","credentials":{"account_id":"keyvaultuser"},"org_details":{"zip":0,"admin_details":[{"first_name":"John","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639802,"updated":1567639802}}'} + headers: {cache-control: no-cache, content-length: '351', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:30:01 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997d1371366.vault.azure.net, + /certificates/issuers/issuer, api-version=7.0, ''] +- request: + body: '{"provider": "Test", "credentials": {"account_id": "keyvaultuser2"}, "org_details": + {"admin_details": [{"first_name": "John", "last_name": "Doe", "email": "admin@microsoft.com", + "phone": "4255555555"}]}, "attributes": {"enabled": true}}' + headers: + Accept: [application/json] + Content-Length: ['236'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PUT + uri: https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer2?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer2","provider":"Test","credentials":{"account_id":"keyvaultuser2"},"org_details":{"zip":0,"admin_details":[{"first_name":"John","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639802,"updated":1567639802}}'} + headers: {cache-control: no-cache, content-length: '353', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:30:01 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997d1371366.vault.azure.net, + /certificates/issuers/issuer2, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d1371366.vault.azure.net/certificates/issuers?api-version=7.0 + response: + body: {string: '{"value":[{"id":"https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer","provider":"Test"},{"id":"https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer2","provider":"Test"}],"nextLink":null}'} + headers: {cache-control: no-cache, content-length: '234', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:30:02 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997d1371366.vault.azure.net, + /certificates/issuers, api-version=7.0, ''] +- request: + body: '{"org_details": {"admin_details": [{"first_name": "Jane", "last_name": + "Doe", "email": "admin@microsoft.com", "phone": "4255555555"}]}}' + headers: + Accept: [application/json] + Content-Length: ['135'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer","provider":"Test","credentials":{"account_id":"keyvaultuser"},"org_details":{"zip":0,"admin_details":[{"first_name":"Jane","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639802,"updated":1567639802}}'} + headers: {cache-control: no-cache, content-length: '351', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:30:02 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997d1371366.vault.azure.net, + /certificates/issuers/issuer, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer","provider":"Test","credentials":{"account_id":"keyvaultuser"},"org_details":{"zip":0,"admin_details":[{"first_name":"Jane","last_name":"Doe","email":"admin@microsoft.com","phone":"4255555555"}]},"attributes":{"enabled":true,"created":1567639802,"updated":1567639802}}'} + headers: {cache-control: no-cache, content-length: '351', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:30:02 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997d1371366.vault.azure.net, + /certificates/issuers/issuer, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d1371366.vault.azure.net/certificates/issuers/issuer?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateIssuerNotFound","message":"Issuer + not found"}}'} + headers: {cache-control: no-cache, content-length: '75', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:30:02 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997d1371366.vault.azure.net, + /certificates/issuers/issuer, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_crud_operations.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_crud_operations.yaml new file mode 100644 index 000000000000..2d46202f6de7 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_crud_operations.yaml @@ -0,0 +1,212 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:24 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999722ac150f.vault.azure.net, + /certificates/cert22ac150f/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": true}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=DefaultPolicy", "sans": {}, "key_usage": ["cRLSign", + "dataEncipherment", "digitalSignature", "keyAgreement", "keyCertSign", "keyEncipherment"], + "validity_months": 12}, "lifetime_actions": [{"trigger": {"days_before_expiry": + 90}, "action": {"action_type": "AutoRenew"}}], "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['484'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"68f6010e6fe44437a8cbb97e8f055798"}'} + headers: + cache-control: no-cache + content-length: '1301' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:20:25 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '2', '2', a, c, '1', '5', '0', f, ., v, a, u, l, + t, ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, + c, e, r, t, '2', '2', a, c, '1', '5', '0', f, /, p, e, n, d, i, n, g, '?', + a, p, i, '-', v, e, r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, + t, _, i, d, '=', '6', '8', f, '6', '0', '1', '0', e, '6', f, e, '4', '4', + '4', '3', '7', a, '8', c, b, b, '9', '7', e, '8', f, '0', '5', '5', '7', '9', + '8'] + pragma: no-cache + retry-after: '10' + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999722ac150f.vault.azure.net, + /certificates/cert22ac150f/create, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"68f6010e6fe44437a8cbb97e8f055798"}'} + headers: {cache-control: no-cache, content-length: '1301', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:25 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999722ac150f.vault.azure.net, + /certificates/cert22ac150f/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f","request_id":"68f6010e6fe44437a8cbb97e8f055798"}'} + headers: {cache-control: no-cache, content-length: '1221', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:34 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999722ac150f.vault.azure.net, + /certificates/cert22ac150f/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f","request_id":"68f6010e6fe44437a8cbb97e8f055798"}'} + headers: {cache-control: no-cache, content-length: '1221', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:39 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999722ac150f.vault.azure.net, + /certificates/cert22ac150f/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773","kid":"https://vault105115999722ac150f.vault.azure.net/keys/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773","sid":"https://vault105115999722ac150f.vault.azure.net/secrets/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773","x5t":"AEMlW2rPp6a3Cbi5PvQZxSz4cWQ","cer":"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","attributes":{"enabled":true,"nbf":1567638631,"exp":1599261631,"created":1567639231,"updated":1567639231,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":true},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=DefaultPolicy","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["cRLSign","dataEncipherment","digitalSignature","keyAgreement","keyCertSign","keyEncipherment"],"validity_months":12,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"days_before_expiry":90},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}},"pending":{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending"}}'} + headers: {cache-control: no-cache, content-length: '2405', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:39 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999722ac150f.vault.azure.net, + /certificates/cert22ac150f/, api-version=7.0, ''] +- request: + body: '{"tags": {"tag1": "updated_value1"}}' + headers: + Accept: [application/json] + Content-Length: ['36'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773","kid":"https://vault105115999722ac150f.vault.azure.net/keys/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773","sid":"https://vault105115999722ac150f.vault.azure.net/secrets/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773","x5t":"AEMlW2rPp6a3Cbi5PvQZxSz4cWQ","cer":"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","attributes":{"enabled":true,"nbf":1567638631,"exp":1599261631,"created":1567639231,"updated":1567639240,"recoveryLevel":"Purgeable"},"tags":{"tag1":"updated_value1"},"policy":{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":true},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=DefaultPolicy","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["cRLSign","dataEncipherment","digitalSignature","keyAgreement","keyCertSign","keyEncipherment"],"validity_months":12,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"days_before_expiry":90},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}},"pending":{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending"}}'} + headers: {cache-control: no-cache, content-length: '2438', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:40 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999722ac150f.vault.azure.net, + /certificates/cert22ac150f/, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773","kid":"https://vault105115999722ac150f.vault.azure.net/keys/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773","sid":"https://vault105115999722ac150f.vault.azure.net/secrets/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773","x5t":"AEMlW2rPp6a3Cbi5PvQZxSz4cWQ","cer":"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","attributes":{"enabled":true,"nbf":1567638631,"exp":1599261631,"created":1567639231,"updated":1567639240,"recoveryLevel":"Purgeable"},"tags":{"tag1":"updated_value1"},"policy":{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":true},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=DefaultPolicy","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["cRLSign","dataEncipherment","digitalSignature","keyAgreement","keyCertSign","keyEncipherment"],"validity_months":12,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"days_before_expiry":90},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639224,"updated":1567639224}},"pending":{"id":"https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/pending"}}'} + headers: {cache-control: no-cache, content-length: '2438', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:40 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999722ac150f.vault.azure.net, + /certificates/cert22ac150f, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999722ac150f.vault.azure.net/certificates/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Certificate + not found: cert22ac150f/versions/fb40469e0a6243eb8ce6cbc27828d773"}}'} + headers: {cache-control: no-cache, content-length: '130', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:40 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999722ac150f.vault.azure.net, + /certificates/cert22ac150f/fb40469e0a6243eb8ce6cbc27828d773, api-version=7.0, + ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_get_pending_certificate_signing_request.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_get_pending_certificate_signing_request.yaml new file mode 100644 index 000000000000..dee1a94521cd --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_get_pending_certificate_signing_request.yaml @@ -0,0 +1,168 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Thu, 05 Sep 2019 16:22:01 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999791f91eda.vault.azure.net, + /certificates/unknownIssuerCert/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"a318767ca464424b8be2884bdf6330a1"}'} + headers: + cache-control: no-cache + content-length: '1350' + content-type: application/json; charset=utf-8 + date: Thu, 05 Sep 2019 16:22:03 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '9', '1', f, '9', '1', e, d, a, ., v, a, u, l, t, + ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, u, + n, k, n, o, w, n, I, s, s, u, e, r, C, e, r, t, /, p, e, n, d, i, n, g, '?', + a, p, i, '-', v, e, r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, + t, _, i, d, '=', a, '3', '1', '8', '7', '6', '7', c, a, '4', '6', '4', '4', + '2', '4', b, '8', b, e, '2', '8', '8', '4', b, d, f, '6', '3', '3', '0', a, + '1'] + pragma: no-cache + retry-after: '10' + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999791f91eda.vault.azure.net, + /certificates/unknownIssuerCert/create, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"a318767ca464424b8be2884bdf6330a1"}'} + headers: {cache-control: no-cache, content-length: '1350', content-type: application/json; + charset=utf-8, date: 'Thu, 05 Sep 2019 16:22:03 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999791f91eda.vault.azure.net, + /certificates/unknownIssuerCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxbU51ptGzzdu3Xr7kYqfrEjMJICwFAOptntIdzN9m921agYMClCwK5Kf7TtI52idPM7NLWIiqxzy0kbxggzvjUOa905hYVNb2uuszhU37UVtv+N56nqCGjkLJbEZsXb5xbiZ2wHXAI07arU0fFxjP6ZKQXQcfJsQdTNN+2LWUyTAsOBeWEcRP9S/8wMG23mU6/kHQ6/e5dpiO7P4xmjDcgvGFZCPBE0I20xLnmmmMbKxIyKO0+9ZNCTRhE74jZqFr/QeQaST+IV9k79xcsUgH7v7g6zu71fvIDmnUzggmbEVC20vJoTPI1tGIN1Q1JNJzhpaXj90G852bRtgiiMSMQIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAJ7gRT3ZOv3LBEOXWbJ1TTfJfEHnxbCerl8CoOUiffyOphdMyH9vcmJnaGrFIzDw9zwdNVI0OSWfxRI1LNymzcR0h1Ixgr1BmRD1FM5WeWb1aIve8cOgHUatfhSmht43JNW/f1bRf+ZnyH4OYLwr1L8pWMxAgFn1s/6ZMnMwlbHpGHRo3UPoEYGK96bAPj/GYNtzXwSSozWjKKajvig0haL1oe1yqsJy1JiYDkcmOX57iMMXVM75VgSkyvUY93Po0nOa+aGzaU7XdUCTH9IIcP0hkvoy4trNX52bv04rrGD0lzZLGfLN8y63eeFczm4IMfFOxTYH9gEgm9RgP1VVab8=","cancellation_requested":false,"status":"completed","target":"https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert","request_id":"a318767ca464424b8be2884bdf6330a1"}'} + headers: {cache-control: no-cache, content-length: '1275', content-type: application/json; + charset=utf-8, date: 'Thu, 05 Sep 2019 16:22:12 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999791f91eda.vault.azure.net, + /certificates/unknownIssuerCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/pkcs10] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0 + response: + body: {string: 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} + headers: {cache-control: no-cache, content-length: '956', content-type: application/pkcs10; + charset=utf-8, date: 'Thu, 05 Sep 2019 16:22:18 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999791f91eda.vault.azure.net, + /certificates/unknownIssuerCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert","request_id":"a318767ca464424b8be2884bdf6330a1"}'} + headers: {cache-control: no-cache, content-length: '1275', content-type: application/json; + charset=utf-8, date: 'Thu, 05 Sep 2019 16:22:18 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999791f91eda.vault.azure.net, + /certificates/unknownIssuerCert/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/009522c64d6844459ec8276a902634ff","kid":"https://vault105115999791f91eda.vault.azure.net/keys/unknownIssuerCert/009522c64d6844459ec8276a902634ff","sid":"https://vault105115999791f91eda.vault.azure.net/secrets/unknownIssuerCert/009522c64d6844459ec8276a902634ff","x5t":"OuQ4J9F8bZQlUUo3IG42RP6SV44","cer":"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","attributes":{"enabled":true,"nbf":1567699927,"exp":1630858927,"created":1567700527,"updated":1567700527,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567700523,"updated":1567700523}},"pending":{"id":"https://vault105115999791f91eda.vault.azure.net/certificates/unknownIssuerCert/pending"}}'} + headers: {cache-control: no-cache, content-length: '2457', content-type: application/json; + charset=utf-8, date: 'Thu, 05 Sep 2019 16:22:19 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999791f91eda.vault.azure.net, + /certificates/unknownIssuerCert, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_list.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_list.yaml new file mode 100644 index 000000000000..20d60f4e56d1 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_list.yaml @@ -0,0 +1,206 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999752a3107a.vault.azure.net/certificates/cert052a3107a/import?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:02 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999752a3107a.vault.azure.net, + /certificates/cert052a3107a/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999752a3107a.vault.azure.net/certificates/cert052a3107a/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert052a3107a/b3a18e55c0a943d98dc09ff68223e1d9","kid":"https://vault105115999752a3107a.vault.azure.net/keys/cert052a3107a/b3a18e55c0a943d98dc09ff68223e1d9","sid":"https://vault105115999752a3107a.vault.azure.net/secrets/cert052a3107a/b3a18e55c0a943d98dc09ff68223e1d9","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639203,"updated":1567639203,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert052a3107a/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639203,"updated":1567639203}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:03 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999752a3107a.vault.azure.net, + /certificates/cert052a3107a/import, api-version=7.0, ''] +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999752a3107a.vault.azure.net/certificates/cert152a3107a/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert152a3107a/81d0cd13c1524863b262f32608a7b05e","kid":"https://vault105115999752a3107a.vault.azure.net/keys/cert152a3107a/81d0cd13c1524863b262f32608a7b05e","sid":"https://vault105115999752a3107a.vault.azure.net/secrets/cert152a3107a/81d0cd13c1524863b262f32608a7b05e","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639203,"updated":1567639203,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert152a3107a/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639203,"updated":1567639203}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:03 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999752a3107a.vault.azure.net, + /certificates/cert152a3107a/import, api-version=7.0, ''] +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999752a3107a.vault.azure.net/certificates/cert252a3107a/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert252a3107a/26ee16cb9adb4bb0bab9b126559614fa","kid":"https://vault105115999752a3107a.vault.azure.net/keys/cert252a3107a/26ee16cb9adb4bb0bab9b126559614fa","sid":"https://vault105115999752a3107a.vault.azure.net/secrets/cert252a3107a/26ee16cb9adb4bb0bab9b126559614fa","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639204,"updated":1567639204,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert252a3107a/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639204,"updated":1567639204}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:03 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999752a3107a.vault.azure.net, + /certificates/cert252a3107a/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999752a3107a.vault.azure.net/certificates/cert352a3107a/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert352a3107a/f72774f5726348599c1f185667ac1480","kid":"https://vault105115999752a3107a.vault.azure.net/keys/cert352a3107a/f72774f5726348599c1f185667ac1480","sid":"https://vault105115999752a3107a.vault.azure.net/secrets/cert352a3107a/f72774f5726348599c1f185667ac1480","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639204,"updated":1567639204,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert352a3107a/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639204,"updated":1567639204}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:04 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999752a3107a.vault.azure.net, + /certificates/cert352a3107a/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999752a3107a.vault.azure.net/certificates/cert452a3107a/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert452a3107a/a2ce32439fab4e62b3ae1e4789d5a41a","kid":"https://vault105115999752a3107a.vault.azure.net/keys/cert452a3107a/a2ce32439fab4e62b3ae1e4789d5a41a","sid":"https://vault105115999752a3107a.vault.azure.net/secrets/cert452a3107a/a2ce32439fab4e62b3ae1e4789d5a41a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639204,"updated":1567639204,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert452a3107a/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639204,"updated":1567639204}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:04 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999752a3107a.vault.azure.net, + /certificates/cert452a3107a/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999752a3107a.vault.azure.net/certificates/cert552a3107a/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert552a3107a/a3459b7ba72b46d1aa723fef42bc939b","kid":"https://vault105115999752a3107a.vault.azure.net/keys/cert552a3107a/a3459b7ba72b46d1aa723fef42bc939b","sid":"https://vault105115999752a3107a.vault.azure.net/secrets/cert552a3107a/a3459b7ba72b46d1aa723fef42bc939b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639205,"updated":1567639205,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert552a3107a/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639205,"updated":1567639205}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:04 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999752a3107a.vault.azure.net, + /certificates/cert552a3107a/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999752a3107a.vault.azure.net/certificates/cert652a3107a/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert652a3107a/5dba53eee9dd4ab991b29c455171c72d","kid":"https://vault105115999752a3107a.vault.azure.net/keys/cert652a3107a/5dba53eee9dd4ab991b29c455171c72d","sid":"https://vault105115999752a3107a.vault.azure.net/secrets/cert652a3107a/5dba53eee9dd4ab991b29c455171c72d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639205,"updated":1567639205,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert652a3107a/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639205,"updated":1567639205}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:05 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999752a3107a.vault.azure.net, + /certificates/cert652a3107a/import, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999752a3107a.vault.azure.net/certificates?api-version=7.0 + response: + body: {string: '{"value":[{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert052a3107a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639203,"updated":1567639203},"subject":""},{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert152a3107a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639203,"updated":1567639203},"subject":""},{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert252a3107a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639204,"updated":1567639204},"subject":""},{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert352a3107a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639204,"updated":1567639204},"subject":""},{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert452a3107a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639204,"updated":1567639204},"subject":""},{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert552a3107a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639205,"updated":1567639205},"subject":""},{"id":"https://vault105115999752a3107a.vault.azure.net/certificates/cert652a3107a","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639205,"updated":1567639205},"subject":""}],"nextLink":null}'} + headers: {cache-control: no-cache, content-length: '1700', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999752a3107a.vault.azure.net, + /certificates, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_list_certificate_versions.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_list_certificate_versions.yaml new file mode 100644 index 000000000000..3f4d0b4438bb --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_list_certificate_versions.yaml @@ -0,0 +1,206 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/import?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:29 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997b3f1934.vault.azure.net, + /certificates/certverb3f1934/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/4d8ffa107ccd45b287d6e0ee2b3a99f3","kid":"https://vault1051159997b3f1934.vault.azure.net/keys/certverb3f1934/4d8ffa107ccd45b287d6e0ee2b3a99f3","sid":"https://vault1051159997b3f1934.vault.azure.net/secrets/certverb3f1934/4d8ffa107ccd45b287d6e0ee2b3a99f3","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639230,"updated":1567639230,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639230,"updated":1567639230}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:30 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997b3f1934.vault.azure.net, + /certificates/certverb3f1934/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/6fa2920c894e48edaedc40770b4d009c","kid":"https://vault1051159997b3f1934.vault.azure.net/keys/certverb3f1934/6fa2920c894e48edaedc40770b4d009c","sid":"https://vault1051159997b3f1934.vault.azure.net/secrets/certverb3f1934/6fa2920c894e48edaedc40770b4d009c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639230,"updated":1567639230,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639230,"updated":1567639230}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:31 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997b3f1934.vault.azure.net, + /certificates/certverb3f1934/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/bbc7f4e436864777a46d0b778be456b2","kid":"https://vault1051159997b3f1934.vault.azure.net/keys/certverb3f1934/bbc7f4e436864777a46d0b778be456b2","sid":"https://vault1051159997b3f1934.vault.azure.net/secrets/certverb3f1934/bbc7f4e436864777a46d0b778be456b2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639231,"updated":1567639231,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639230,"updated":1567639231}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:31 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997b3f1934.vault.azure.net, + /certificates/certverb3f1934/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/9b3f82690366445f9135bce43ea2b0e7","kid":"https://vault1051159997b3f1934.vault.azure.net/keys/certverb3f1934/9b3f82690366445f9135bce43ea2b0e7","sid":"https://vault1051159997b3f1934.vault.azure.net/secrets/certverb3f1934/9b3f82690366445f9135bce43ea2b0e7","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639231,"updated":1567639231,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639230,"updated":1567639231}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:31 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997b3f1934.vault.azure.net, + /certificates/certverb3f1934/import, api-version=7.0, ''] +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/fe3422b9a2884b0ab28b8743ee46494c","kid":"https://vault1051159997b3f1934.vault.azure.net/keys/certverb3f1934/fe3422b9a2884b0ab28b8743ee46494c","sid":"https://vault1051159997b3f1934.vault.azure.net/secrets/certverb3f1934/fe3422b9a2884b0ab28b8743ee46494c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639232,"updated":1567639232,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639230,"updated":1567639232}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:32 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997b3f1934.vault.azure.net, + /certificates/certverb3f1934/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/1eaf5deaa261444abaddf2d3cddbf282","kid":"https://vault1051159997b3f1934.vault.azure.net/keys/certverb3f1934/1eaf5deaa261444abaddf2d3cddbf282","sid":"https://vault1051159997b3f1934.vault.azure.net/secrets/certverb3f1934/1eaf5deaa261444abaddf2d3cddbf282","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639232,"updated":1567639232,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639230,"updated":1567639232}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:32 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997b3f1934.vault.azure.net, + /certificates/certverb3f1934/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/20d520370ea64167899498a78f3b9699","kid":"https://vault1051159997b3f1934.vault.azure.net/keys/certverb3f1934/20d520370ea64167899498a78f3b9699","sid":"https://vault1051159997b3f1934.vault.azure.net/secrets/certverb3f1934/20d520370ea64167899498a78f3b9699","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639232,"updated":1567639232,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639230,"updated":1567639232}}}'} + headers: {cache-control: no-cache, content-length: '1834', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:32 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997b3f1934.vault.azure.net, + /certificates/certverb3f1934/import, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/versions?api-version=7.0 + response: + body: {string: '{"value":[{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/1eaf5deaa261444abaddf2d3cddbf282","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639232,"updated":1567639232},"subject":""},{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/20d520370ea64167899498a78f3b9699","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639232,"updated":1567639232},"subject":""},{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/4d8ffa107ccd45b287d6e0ee2b3a99f3","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639230,"updated":1567639230},"subject":""},{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/6fa2920c894e48edaedc40770b4d009c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639230,"updated":1567639230},"subject":""},{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/9b3f82690366445f9135bce43ea2b0e7","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639231,"updated":1567639231},"subject":""},{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/bbc7f4e436864777a46d0b778be456b2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639231,"updated":1567639231},"subject":""},{"id":"https://vault1051159997b3f1934.vault.azure.net/certificates/certverb3f1934/fe3422b9a2884b0ab28b8743ee46494c","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639232,"updated":1567639232},"subject":""}],"nextLink":null}'} + headers: {cache-control: no-cache, content-length: '1931', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:32 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault1051159997b3f1934.vault.azure.net, + /certificates/certverb3f1934/versions, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_merge_certificate.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_merge_certificate.yaml new file mode 100644 index 000000000000..cd953c23936a --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_merge_certificate.yaml @@ -0,0 +1,183 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:19:58 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974ca615b0.vault.azure.net, + /certificates/mergeCertificate/create, api-version=7.0, ''] +- request: + body: '{"policy": {"x509_props": {"subject": "CN=MyCert", "sans": {}}, "issuer": + {"name": "Unknown", "cert_transparency": false}}}' + headers: + Accept: [application/json] + Content-Length: ['123'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"0f7101bc540444a68d2c23dc21fef5cc"}'} + headers: + cache-control: no-cache + content-length: '1230' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:19:59 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '4', c, a, '6', '1', '5', b, '0', ., v, a, u, l, + t, ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, + m, e, r, g, e, C, e, r, t, i, f, i, c, a, t, e, /, p, e, n, d, i, n, g, '?', + a, p, i, '-', v, e, r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, + t, _, i, d, '=', '0', f, '7', '1', '0', '1', b, c, '5', '4', '0', '4', '4', + '4', a, '6', '8', d, '2', c, '2', '3', d, c, '2', '1', f, e, f, '5', c, c] + pragma: no-cache + retry-after: '10' + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974ca615b0.vault.azure.net, + /certificates/mergeCertificate/create, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"MIICoTCCAYkCAQAwETEPMA0GA1UEAxMGTXlDZXJ0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmGxLfDM8uEO6PClPjXlNCk+wwT533ScmOgFPOpFNST+WikkEIFanReG/tD/Y/1Gl7af3ytlH/NL3bcFh2f41KjasjdbWmZUPoghVYwgug1mvP9zACfa1Uu4FOyMbj+g/sCzcmHF4atoa+VTVPbRU+qJxTmzk7WPAiQxZC6dDtsBfV5qROxrl1TcdOO2g0xh2JdUMBlo0fNN+mzoaCfnzc/GxBQEUNawzBwOzNVyQhClFn60J/oARdpmMB/dzMEmyvcHZazklf5tL6I4C+0xq7WWLpil309lu4XTWVsaDHVHYhXA2eMVhr39HDKKInfVxPiq+oGLibzg4cwZmgdCiFQIDAQABoEswSQYJKoZIhvcNAQkOMTwwOjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBADG3VStfoMZpoYnp5a2eRk18mkbUBOCm7bQL18h6Pj+Qr7y+ZlBuUqGwMfzWF4ZodvShG7gNJ12zfCZYX+8AYAPIjzQ0uszwAexcvxL4mI03kaeB0ArDCAT1ieK/8QHaJWTba7OyaR5YNIXO44E5qH0gQ2ldXHZca6Q525j2+ux817SJV7WFDtiSwHXepUyd/mN/8yikFRoKI8KDzImqp0I9kL7eURvvNEMdfcC1b+GTdB1ZSSxEjAp0pJtlYcDDIIBZLwc4231JSNSW+/hJ2dNSrUKuvVVTHnlH2XJM/RFMAMKiJuA5FurFJG4zXkZz0tiEAepU4+FEjJpoAllM24o=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"0f7101bc540444a68d2c23dc21fef5cc"}'} + headers: {cache-control: no-cache, content-length: '1230', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:00 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974ca615b0.vault.azure.net, + /certificates/mergeCertificate/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"0f7101bc540444a68d2c23dc21fef5cc"}'} + headers: {cache-control: no-cache, content-length: '1230', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:10 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974ca615b0.vault.azure.net, + /certificates/mergeCertificate/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"0f7101bc540444a68d2c23dc21fef5cc"}'} + headers: {cache-control: no-cache, content-length: '1230', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:20 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974ca615b0.vault.azure.net, + /certificates/mergeCertificate/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending","issuer":{"name":"Unknown"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Please Perform Merge to complete the request.","request_id":"0f7101bc540444a68d2c23dc21fef5cc"}'} + headers: {cache-control: no-cache, content-length: '1230', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:31 GMT', expires: '-1', pragma: no-cache, + retry-after: '10', server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974ca615b0.vault.azure.net, + /certificates/mergeCertificate/pending, api-version=7.0, ''] +- request: + body: '{"x5c": ["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"]}' + headers: + Accept: [application/json] + Content-Length: ['1293'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending/merge?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/f569bd2e9204432e83be21b5d0482cc8","kid":"https://vault10511599974ca615b0.vault.azure.net/keys/mergeCertificate/f569bd2e9204432e83be21b5d0482cc8","sid":"https://vault10511599974ca615b0.vault.azure.net/secrets/mergeCertificate/f569bd2e9204432e83be21b5d0482cc8","x5t":"2Jp1hsImwkL1g5HLthACVt9kiAk","cer":"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","attributes":{"enabled":true,"nbf":1567639231,"exp":1567639291,"created":1567639231,"updated":1567639231,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=MyCert","sans":{},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":12,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown","cert_transparency":false},"attributes":{"enabled":true,"created":1567639200,"updated":1567639200}},"pending":{"id":"https://vault10511599974ca615b0.vault.azure.net/certificates/mergeCertificate/pending"}}'} + headers: + cache-control: no-cache + content-length: '2251' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:20:31 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '4', c, a, '6', '1', '5', b, '0', ., v, a, u, l, + t, ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, + m, e, r, g, e, C, e, r, t, i, f, i, c, a, t, e, '?', a, p, i, '-', v, e, r, + s, i, o, n, '=', '7', ., '0'] + pragma: no-cache + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 201, message: Created} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974ca615b0.vault.azure.net, + /certificates/mergeCertificate/pending/merge, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_policy.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_policy.yaml new file mode 100644 index 000000000000..9ef9186d7739 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_policy.yaml @@ -0,0 +1,110 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/import?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:05 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999774cf114e.vault.azure.net, + /certificates/policyCertificate/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/c3178ec2a3eb40f79a23f9105b2a6d05","kid":"https://vault105115999774cf114e.vault.azure.net/keys/policyCertificate/c3178ec2a3eb40f79a23f9105b2a6d05","sid":"https://vault105115999774cf114e.vault.azure.net/secrets/policyCertificate/c3178ec2a3eb40f79a23f9105b2a6d05","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639266,"updated":1567639266,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639266,"updated":1567639266}}}'} + headers: {cache-control: no-cache, content-length: '1850', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999774cf114e.vault.azure.net, + /certificates/policyCertificate/import, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/policy?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639266,"updated":1567639266}}'} + headers: {cache-control: no-cache, content-length: '550', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999774cf114e.vault.azure.net, + /certificates/policyCertificate/policy, api-version=7.0, ''] +- request: + body: '{"key_props": {"exportable": true, "kty": "RSA", "key_size": 2048, "reuse_key": + false}, "secret_props": {"contentType": "application/x-pkcs12"}, "issuer": {"name": + "Self"}}' + headers: + Accept: [application/json] + Content-Length: ['172'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/policy?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639266,"updated":1567639266}}'} + headers: {cache-control: no-cache, content-length: '547', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999774cf114e.vault.azure.net, + /certificates/policyCertificate/policy, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/policy?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999774cf114e.vault.azure.net/certificates/policyCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639266,"updated":1567639266}}'} + headers: {cache-control: no-cache, content-length: '547', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999774cf114e.vault.azure.net, + /certificates/policyCertificate/policy, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_recover_and_purge.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_recover_and_purge.yaml new file mode 100644 index 000000000000..8d0408cb4800 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_client_async.test_recover_and_purge.yaml @@ -0,0 +1,1037 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/import?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:37 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec04d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639238,"updated":1567639238}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:37 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec04d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639238,"updated":1567639238}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:38 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec14d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639239,"updated":1567639239}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:39 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec24d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "MIIJOwIBAzCCCPcGCSqGSIb3DQEHAaCCCOgEggjkMIII4DCCBgkGCSqGSIb3DQEHAaCCBfoEggX2MIIF8jCCBe4GCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj15YH9pOE58AICB9AEggTYLrI+SAru2dBZRQRlJY7XQ3LeLkah2FcRR3dATDshZ2h0IA2oBrkQIdsLyAAWZ32qYR1qkWxLHn9AqXgu27AEbOk35+pITZaiy63YYBkkpR+pDdngZt19Z0PWrGwHEq5z6BHS2GLyyN8SSOCbdzCz7blj3+7IZYoMj4WOPgOm/tQ6U44SFWek46QwN2zeA4i97v7ftNNns27ms52jqfhOvTA9c/wyfZKAY4aKJfYYUmycKjnnRl012ldS2lOkASFt+lu4QCa72IY6ePtRudPCvmzRv2pkLYS6z3cI7omT8nHP3DymNOqLbFqr5O2M1ZYaLC63Q3xt3eVvbcPh3N08D1hHkhz/KDTvkRAQpvrW8ISKmgDdmzN55Pe55xHfSWGB7gPw8sZea57IxFzWHTK2yvTslooWoosmGxanYY2IG/no3EbPOWDKjPZ4ilYJe5JJ2immlxPz+2e2EOCKpDI+7fzQcRz3PTd3BK+budZ8aXX8aW/lOgKS8WmxZoKnOJBNWeTNWQFugmktXfdPHAdxMhjUXqeGQd8wTvZ4EzQNNafovwkI7IV/ZYoa++RGofVR3ZbRSiBNF6TDj/qXFt0wN/CQnsGAmQAGNiN+D4mY7i25dtTu/Jc7OxLdhAUFpHyJpyrYWLfvOiS5WYBeEDHkiPUa/8eZSPA3MXWZR1RiuDvuNqMjct1SSwdXADTtF68l/US1ksU657+XSC+6ly1A/upz+X71+C4Ho6W0751j5ZMT6xKjGh5pee7MVuduxIzXjWIy3YSd0fIT3U0A5NLEvJ9rfkx6JiHjRLx6V1tqsrtT6BsGtmCQR1UCJPLqsKVDvAINx3cPA/CGqr5OX2BGZlAihGmN6n7gv8w4O0k0LPTAe5YefgXN3m9pE867N31GtHVZaJ/UVgDNYS2jused4rw76ZWN41akx2QN0JSeMJqHXqVz6AKfz8ICS/dFnEGyBNpXiMRxrY/QPKi/wONwqsbDxRW7vZRVKs78pBkE0ksaShlZk5GkeayDWC/7Hi/NqUFtIloK9XB3paLxo1DGu5qqaF34jZdktzkXp0uZqpp+FfKZaiovMjt8F7yHCPk+LYpRsU2Cyc9DVoDA6rIgf+uEP4jppgehsxyT0lJHax2t869R2jYdsXwYUXjgwHIV0voj7bJYPGFlFjXOp6ZW86scsHM5xfsGQoK2Fp838VT34SHE1ZXU/puM7rviREHYW72pfpgGZUILQMohuTPnd8tFtAkbrmjLDo+k9xx7HUvgoFTiNNWuq/cRjr70FKNguMMTIrid+HwfmbRoaxENWdLcOTNeascER2a+37UQolKD5ksrPJG6RdNA7O2pzp3micDYRs/+s28cCIxO//J/d4nsgHp6RTuCu4+Jm9k0YTw2Xg75b2cWKrxGnDUgyIlvNPaZTB5QbMid4x44/lE0LLi9kcPQhRgrK07OnnrMgZvVGjt1CLGhKUv7KFc3xV1r1rwKkosxnoG99oCoTQtregcX5rIMjHgkc1IdflGJkZzaWMkYVFOJ4Weynz008i4ddkske5vabZs37Lb8iggUYNBYZyGzalruBgnQyK4fz38Fae4nWYjyildVfgyo/fCePR2ovOfphx9OQJi+M9BoFmPrAg+8ARDZ+R+5yzYuEc9ZoVX7nkp7LTGB3DANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBXBgkqhkiG9w0BCRQxSh5IAGEAOAAwAGQAZgBmADgANgAtAGUAOQA2AGUALQA0ADIAMgA0AC0AYQBhADEAMQAtAGIAZAAxADkANABkADUAYQA2AGIANwA3MF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggLPBgkqhkiG9w0BBwagggLAMIICvAIBADCCArUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEGMA4ECNX+VL2MxzzWAgIH0ICCAojmRBO+CPfVNUO0s+BVuwhOzikAGNBmQHNChmJ/pyzPbMUbx7tO63eIVSc67iERda2WCEmVwPigaVQkPaumsfp8+L6iV/BMf5RKlyRXcwh0vUdu2Qa7qadD+gFQ2kngf4Dk6vYo2/2HxayuIf6jpwe8vql4ca3ZtWXfuRix2fwgltM0bMz1g59d7x/glTfNqxNlsty0A/rWrPJjNbOPRU2XykLuc3AtlTtYsQ32Zsmu67A7UNBw6tVtkEXlFDqhavEhUEO3dvYqMY+QLxzpZhA0q44ZZ9/ex0X6QAFNK5wuWxCbupHWsgxRwKftrxyszMHsAvNoNcTlqcctee+ecNwTJQa1/MDbnhO6/qHA7cfG1qYDq8Th635vGNMW1w3sVS7l0uEvdayAsBHWTcOC2tlMa5bfHrhY8OEIqj5bN5H9RdFy8G/W239tjDu1OYjBDydiBqzBn8HG1DSj1Pjc0kd/82d4ZU0308KFTC3yGcRad0GnEH0Oi3iEJ9HbriUbfVMbXNHOF+MktWiDVqzndGMKmuJSdfTBKvGFvejAWVO5E4mgLvoaMmbchc3BO7sLeraHnJN5hvMBaLcQI38N86mUfTR8AP6AJ9c2k514KaDLclm4z6J8dMz60nUeo5D3YD09G6BavFHxSvJ8MF0Lu5zOFzEePDRFm9mH8W0N/sFlIaYfD/GWU/w44mQucjaBk95YtqOGRIj58tGDWr8iUdHwaYKGqU24zGeRae9DhFXPzZshV1ZGsBQFRaoYkyLAwdJWIXTi+c37YaC8FRSEnnNmS79Dou1Kc3BvK4EYKAD2KxjtUebrV174gD0Q+9YuJ0GXOTspBvCFd5VT2Rw5zDNrA/J3F5fMCk4wOzAfMAcGBSsOAwIaBBSxgh2xyF+88V4vAffBmZXv8Txt4AQU4O/NX4MjxSodbE7ApNAMIvrtREwCAgfQ", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639239,"updated":1567639239}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:39 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec34d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:39 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec44d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:40 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec54d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/3447274e3da841109e34e81801b27c86","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec64d8615c8/3447274e3da841109e34e81801b27c86","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec64d8615c8/3447274e3da841109e34e81801b27c86","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:40 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec64d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg04d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg04d8615c8/134e6d0a13044377a980a28a1a6b2659","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg04d8615c8/134e6d0a13044377a980a28a1a6b2659","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg04d8615c8/134e6d0a13044377a980a28a1a6b2659","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639241,"updated":1567639241,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg04d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639241,"updated":1567639241}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:40 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg04d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg14d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg14d8615c8/2625cf0a208d48fd8657a07f78e4c7c9","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg14d8615c8/2625cf0a208d48fd8657a07f78e4c7c9","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg14d8615c8/2625cf0a208d48fd8657a07f78e4c7c9","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639241,"updated":1567639241,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg14d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639241,"updated":1567639241}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:41 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg14d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg24d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg24d8615c8/3feef9d4d99445ecb45ef3505f54f961","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg24d8615c8/3feef9d4d99445ecb45ef3505f54f961","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg24d8615c8/3feef9d4d99445ecb45ef3505f54f961","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639241,"updated":1567639241,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg24d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639241,"updated":1567639241}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:41 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg24d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg34d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg34d8615c8/96c60fef0e52499c807bab76037c0ac2","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg34d8615c8/96c60fef0e52499c807bab76037c0ac2","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg34d8615c8/96c60fef0e52499c807bab76037c0ac2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639242,"updated":1567639242,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg34d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639242,"updated":1567639242}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:42 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg34d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg44d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg44d8615c8/43d5e1bdbed2465d97795b1e0422455f","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg44d8615c8/43d5e1bdbed2465d97795b1e0422455f","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg44d8615c8/43d5e1bdbed2465d97795b1e0422455f","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639242,"updated":1567639242,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg44d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639242,"updated":1567639242}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:42 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg44d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg54d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg54d8615c8/c65292a3f2094713b65c35410d16dd7d","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg54d8615c8/c65292a3f2094713b65c35410d16dd7d","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg54d8615c8/c65292a3f2094713b65c35410d16dd7d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639243,"updated":1567639243,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg54d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639243,"updated":1567639243}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:42 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg54d8615c8/import, api-version=7.0, ''] +- request: + body: '{"value": "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", + "pwd": "123", "policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}}}' + headers: + Accept: [application/json] + Content-Length: ['3339'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg64d8615c8/import?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg64d8615c8/a6de48fe152c4bc68c1f936f6ad32e0d","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg64d8615c8/a6de48fe152c4bc68c1f936f6ad32e0d","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg64d8615c8/a6de48fe152c4bc68c1f936f6ad32e0d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639243,"updated":1567639243,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg64d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639243,"updated":1567639243}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:42 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg64d8615c8/import, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec04d8615c8","deletedDate":1567639243,"scheduledPurgeDate":1575415243,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639238,"updated":1567639238}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:43 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec04d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec14d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639238,"updated":1567639238}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:43 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec14d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec24d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639239,"updated":1567639239}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:43 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec24d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec34d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639239,"updated":1567639239}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:43 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec34d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec44d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:43 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec44d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec54d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:43 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec54d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec64d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/3447274e3da841109e34e81801b27c86","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec64d8615c8/3447274e3da841109e34e81801b27c86","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec64d8615c8/3447274e3da841109e34e81801b27c86","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:43 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec64d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg04d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg04d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg04d8615c8/134e6d0a13044377a980a28a1a6b2659","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg04d8615c8/134e6d0a13044377a980a28a1a6b2659","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg04d8615c8/134e6d0a13044377a980a28a1a6b2659","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639241,"updated":1567639241,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg04d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639241,"updated":1567639241}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:44 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg04d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg14d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg14d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg14d8615c8/2625cf0a208d48fd8657a07f78e4c7c9","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg14d8615c8/2625cf0a208d48fd8657a07f78e4c7c9","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg14d8615c8/2625cf0a208d48fd8657a07f78e4c7c9","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639241,"updated":1567639241,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg14d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639241,"updated":1567639241}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:44 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg14d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg24d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg24d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg24d8615c8/3feef9d4d99445ecb45ef3505f54f961","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg24d8615c8/3feef9d4d99445ecb45ef3505f54f961","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg24d8615c8/3feef9d4d99445ecb45ef3505f54f961","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639241,"updated":1567639241,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg24d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639241,"updated":1567639241}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:44 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg24d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg34d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg34d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg34d8615c8/96c60fef0e52499c807bab76037c0ac2","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg34d8615c8/96c60fef0e52499c807bab76037c0ac2","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg34d8615c8/96c60fef0e52499c807bab76037c0ac2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639242,"updated":1567639242,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg34d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639242,"updated":1567639242}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:44 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg34d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg44d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg44d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg44d8615c8/43d5e1bdbed2465d97795b1e0422455f","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg44d8615c8/43d5e1bdbed2465d97795b1e0422455f","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg44d8615c8/43d5e1bdbed2465d97795b1e0422455f","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639242,"updated":1567639242,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg44d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639242,"updated":1567639242}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:44 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg44d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg54d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg54d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg54d8615c8/c65292a3f2094713b65c35410d16dd7d","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg54d8615c8/c65292a3f2094713b65c35410d16dd7d","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg54d8615c8/c65292a3f2094713b65c35410d16dd7d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639243,"updated":1567639243,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg54d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639243,"updated":1567639243}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:44 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg54d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certprg64d8615c8?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg64d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg64d8615c8/a6de48fe152c4bc68c1f936f6ad32e0d","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certprg64d8615c8/a6de48fe152c4bc68c1f936f6ad32e0d","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certprg64d8615c8/a6de48fe152c4bc68c1f936f6ad32e0d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639243,"updated":1567639243,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg64d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639243,"updated":1567639243}}}'} + headers: {cache-control: no-cache, content-length: '2015', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:20:44 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certprg64d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates?api-version=7.0 + response: + body: {string: '{"value":[{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg04d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg04d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639241,"updated":1567639241,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg14d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg14d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639241,"updated":1567639241,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg24d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg24d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639241,"updated":1567639241,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg34d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg34d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639242,"updated":1567639242,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg44d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg44d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639242,"updated":1567639242,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg54d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg54d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639243,"updated":1567639243,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg64d8615c8","deletedDate":1567639245,"scheduledPurgeDate":1575415245,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certprg64d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639243,"updated":1567639243,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec04d8615c8","deletedDate":1567639243,"scheduledPurgeDate":1575415243,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec14d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec24d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec34d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec44d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec54d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"}},{"recoveryId":"https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec64d8615c8","deletedDate":1567639244,"scheduledPurgeDate":1575415244,"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"}}],"nextLink":null}'} + headers: {cache-control: no-cache, content-length: '5991', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:15 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec04d8615c8/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639238,"updated":1567639238}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:15 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certrec04d8615c8/recover, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec14d8615c8/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639238,"updated":1567639238}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:15 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certrec14d8615c8/recover, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec24d8615c8/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639239,"updated":1567639239}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certrec24d8615c8/recover, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec34d8615c8/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639239,"updated":1567639239}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certrec34d8615c8/recover, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec44d8615c8/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certrec44d8615c8/recover, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec54d8615c8/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"MIICODCCAeagAwIBAgIQqHmpBAv+CY9IJFoUhlbziTAJBgUrDgMCHQUAMBYxFDASBgNVBAMTC1Jvb3QgQWdlbmN5MB4XDTE1MDQyOTIxNTM0MVoXDTM5MTIzMTIzNTk1OVowFzEVMBMGA1UEAxMMS2V5VmF1bHRUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5bVAT73zr4+N4WVv2+SvTunAw08ksS4BrJW/nNliz3S9XuzMBMXvmYzU5HJ8TtEgluBiZZYd5qsMJD+OXHSNbsLdmMhni0jYX09h3XlC2VJw2sGKeYF+xEaavXm337aZZaZyjrFBrrUl51UePaN+kVFXNlBb3N3TYpqa7KokXenJQuR+i9Gv9a77c0UsSsDSryxppYhKK7HvTZCpKrhVtulF5iPMswWe9np3uggfMamyIsK/0L7X9w9B2qN7993RR0A00nOk4H6CnkuwO77dSsD0KJsk6FyAoZBzRXDZh9+d9R76zCL506NcQy/jl0lCiQYwsUX73PG5pxOh02OwKwIDAQABo0swSTBHBgNVHQEEQDA+gBAS5AktBh0dTwCNYSHcFmRjoRgwFjEUMBIGA1UEAxMLUm9vdCBBZ2VuY3mCEAY3bACqAGSKEc+41KpcNfQwCQYFKw4DAh0FAANBAGqIjo2geVagzuzaZOe1ClGKhZeiCKfWAxklaGN+qlGUbVS4IN4V1lot3VKnzabasmkEHeNxPwLn1qvSD0cX9CE=","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certrec54d8615c8/recover, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certrec64d8615c8/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/3447274e3da841109e34e81801b27c86","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec64d8615c8/3447274e3da841109e34e81801b27c86","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec64d8615c8/3447274e3da841109e34e81801b27c86","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certrec64d8615c8/recover, api-version=7.0, ''] +- request: + body: null + headers: + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg04d8615c8?api-version=7.0 + response: + body: {string: ''} + headers: {cache-control: no-cache, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', + pragma: no-cache, server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 204, message: No Content} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certprg04d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg14d8615c8?api-version=7.0 + response: + body: {string: ''} + headers: {cache-control: no-cache, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', + pragma: no-cache, server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 204, message: No Content} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certprg14d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg24d8615c8?api-version=7.0 + response: + body: {string: ''} + headers: {cache-control: no-cache, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', + pragma: no-cache, server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 204, message: No Content} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certprg24d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg34d8615c8?api-version=7.0 + response: + body: {string: ''} + headers: {cache-control: no-cache, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', + pragma: no-cache, server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 204, message: No Content} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certprg34d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg44d8615c8?api-version=7.0 + response: + body: {string: ''} + headers: {cache-control: no-cache, date: 'Wed, 04 Sep 2019 23:21:17 GMT', expires: '-1', + pragma: no-cache, server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 204, message: No Content} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certprg44d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg54d8615c8?api-version=7.0 + response: + body: {string: ''} + headers: {cache-control: no-cache, date: 'Wed, 04 Sep 2019 23:21:17 GMT', expires: '-1', + pragma: no-cache, server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 204, message: No Content} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certprg54d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates/certprg64d8615c8?api-version=7.0 + response: + body: {string: ''} + headers: {cache-control: no-cache, date: 'Wed, 04 Sep 2019 23:21:17 GMT', expires: '-1', + pragma: no-cache, server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 204, message: No Content} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates/certprg64d8615c8, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974d8615c8.vault.azure.net/deletedcertificates?api-version=7.0 + response: + body: {string: '{"value":[],"nextLink":null}'} + headers: {cache-control: no-cache, content-length: '28', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:48 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /deletedcertificates, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec04d8615c8/90e794e86b394ff9b8dcfe2955314317","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec04d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639238,"updated":1567639238}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:48 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec04d8615c8/, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec14d8615c8/6406a2924d354b0088de43eedf767d1d","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639238,"updated":1567639238,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec14d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639238,"updated":1567639238}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:48 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec14d8615c8/, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec24d8615c8/b415123f99b44b0bb0b4dde2ab133ae2","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec24d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639239,"updated":1567639239}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:48 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec24d8615c8/, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec34d8615c8/20b26f83091b4ed884c6b798aef695b1","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639239,"updated":1567639239,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec34d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639239,"updated":1567639239}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:48 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec34d8615c8/, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec44d8615c8/d05be1a5d67e447095d593f546fbdd9e","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec44d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:48 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec44d8615c8/, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec54d8615c8/709d0ae3905c4e8fae941cfb92003f9b","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec54d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:48 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec54d8615c8/, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/3447274e3da841109e34e81801b27c86","kid":"https://vault10511599974d8615c8.vault.azure.net/keys/certrec64d8615c8/3447274e3da841109e34e81801b27c86","sid":"https://vault10511599974d8615c8.vault.azure.net/secrets/certrec64d8615c8/3447274e3da841109e34e81801b27c86","x5t":"fLi3U52HunIVNXubkEnf8tP6Wbo","cer":"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","attributes":{"enabled":true,"nbf":1430344421,"exp":2208988799,"created":1567639240,"updated":1567639240,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599974d8615c8.vault.azure.net/certificates/certrec64d8615c8/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=KeyVaultTest","ekus":[],"key_usage":[],"validity_months":297,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"EmailContacts"}}],"issuer":{"name":"Unknown"},"attributes":{"enabled":true,"created":1567639240,"updated":1567639240}}}'} + headers: {cache-control: no-cache, content-length: '1858', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:48 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599974d8615c8.vault.azure.net, + /certificates/certrec64d8615c8/, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_samples.test_hello_word_sample.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_samples.test_hello_word_sample.yaml new file mode 100644 index 000000000000..d38e8e967fc0 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_certificates_samples.test_hello_word_sample.yaml @@ -0,0 +1,462 @@ +interactions: +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '0' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b2 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/create?api-version=7.0 + response: + body: + string: '' + headers: + cache-control: + - no-cache + content-length: + - '0' + date: + - Tue, 23 Jul 2019 20:52:35 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + www-authenticate: + - Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net" + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 401 + message: Unauthorized +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["onedrive.microsoft.com", + "xbox.microsoft.com"]}, "validity_months": 24}, "issuer": {"name": "Self"}}, + "attributes": {"exp": 1595451156}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '364' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b2 azsdk-python-azure-keyvault/7.0 + method: POST + uri: https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/create?api-version=7.0 + response: + body: + string: '{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d6a1fad225ae41279c24da255feb25ed"}' + headers: + cache-control: + - no-cache + content-length: + - '1380' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 23 Jul 2019 20:52:37 GMT + expires: + - '-1' + location: + - https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending?api-version=7.0&request_id=d6a1fad225ae41279c24da255feb25ed + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b2 azsdk-python-azure-keyvault/7.0 + method: GET + uri: https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending?api-version=7.0 + response: + body: + string: '{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending","issuer":{"name":"Self"},"csr":"MIIC4zCCAcsCAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvtJC3dQ6ygr/l2TbV9sKoqGSZx095zk4nc32MBZ9JIu9qo8SGIsui24zPoKlM72rGU8bZ/ywWhZ2Dspq0T+C7dEWrIgQZRazqs//Mb61aT1aNXxlHxk4X4mNYh2TIzh4xJmDP9k8UE4q0ItX1c+Q7K4oiYc8csMQOpq7Bj0VTe8k1x+T3VrmowQEo/tY4IeZLlR86vhWHYmOApyVhauMUbCBVQZ5uDyyvnam6x+jEXEhK6zC3lF3b4JULYMdmqWZxKxX3dOPRUTY5l1fs3rsQ+T7BauGdF3AutFLmGQnsPrkayUKuoWlzrDqlmkkr1wjg+3vV7b7OzYGpueRtwfmLwIDAQABoIGDMIGABgkqhkiG9w0BCQ4xczBxMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwNQYDVR0RBC4wLIIWb25lZHJpdmUubWljcm9zb2Z0LmNvbYISeGJveC5taWNyb3NvZnQuY29tMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAG/U3RHK2agnvzsN4T2UhPpLWf5oaVdThoZN4gK3tAoRpqpqnpOKeFOmi+puZNWvay6toUUsBNbRkhebkhSGIfCxmEVW+C2RdKw9qUib4fhD3l51lR0qmo2HUSpbkVj6zKiha1YsTxZhM2OalhU1ZRiNYv5Okz8UkGanpS1fN3mbOXFuxZ9vjQ9Q9GJm9wtho0A+9YnUK1l2XDHsw9PlrtjTbCBwSszQO2y7ypSI5nUp98Fahs44uJddFmADWPkQYNRPaQHAzM49QPwTcpJB8FInXrVrKwYs7Mkimst5gR+AnTTz9dS8hDdRzc3uPWF7SimWh0ekkcHTVbLzvmDN+m4=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d6a1fad225ae41279c24da255feb25ed"}' + headers: + cache-control: + - no-cache + content-length: + - '1380' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 23 Jul 2019 20:52:37 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b2 azsdk-python-azure-keyvault/7.0 + method: GET + uri: https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending?api-version=7.0 + response: + body: + string: '{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d6a1fad225ae41279c24da255feb25ed"}' + headers: + cache-control: + - no-cache + content-length: + - '1380' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 23 Jul 2019 20:52:47 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b2 azsdk-python-azure-keyvault/7.0 + method: GET + uri: https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending?api-version=7.0 + response: + body: + string: '{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate","request_id":"d6a1fad225ae41279c24da255feb25ed"}' + headers: + cache-control: + - no-cache + content-length: + - '1299' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 23 Jul 2019 20:52:57 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b2 azsdk-python-azure-keyvault/7.0 + method: GET + uri: https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/?api-version=7.0 + response: + body: + string: '{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/b7722258cbc34e54a5f84eff09e8d7d8","kid":"https://vaulte55813c7.vault.azure.net/keys/HelloWorldCertificate/b7722258cbc34e54a5f84eff09e8d7d8","sid":"https://vaulte55813c7.vault.azure.net/secrets/HelloWorldCertificate/b7722258cbc34e54a5f84eff09e8d7d8","x5t":"-2ZhyDVO_SoGnaYPzivwNHyud_o","cer":"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","attributes":{"enabled":true,"nbf":1563914576,"exp":1627073576,"created":1563915176,"updated":1563915176,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1563915157,"updated":1563915157}},"pending":{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending"}}' + headers: + cache-control: + - no-cache + content-length: + - '2497' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 23 Jul 2019 20:52:57 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"attributes": {"exp": 1658609576}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '35' + Content-Type: + - application/json; charset=utf-8 + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b2 azsdk-python-azure-keyvault/7.0 + method: PATCH + uri: https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/?api-version=7.0 + response: + body: + string: '{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/b7722258cbc34e54a5f84eff09e8d7d8","kid":"https://vaulte55813c7.vault.azure.net/keys/HelloWorldCertificate/b7722258cbc34e54a5f84eff09e8d7d8","sid":"https://vaulte55813c7.vault.azure.net/secrets/HelloWorldCertificate/b7722258cbc34e54a5f84eff09e8d7d8","x5t":"-2ZhyDVO_SoGnaYPzivwNHyud_o","cer":"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","attributes":{"enabled":true,"nbf":1563914576,"exp":1627073576,"created":1563915176,"updated":1563915177,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1563915157,"updated":1563915157}},"pending":{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending"}}' + headers: + cache-control: + - no-cache + content-length: + - '2497' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 23 Jul 2019 20:52:57 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + Content-Length: + - '0' + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b2 azsdk-python-azure-keyvault/7.0 + method: DELETE + uri: https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate?api-version=7.0 + response: + body: + string: '{"recoveryId":"https://vaulte55813c7.vault.azure.net/deletedcertificates/HelloWorldCertificate","deletedDate":1563915178,"scheduledPurgeDate":1571691178,"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/b7722258cbc34e54a5f84eff09e8d7d8","kid":"https://vaulte55813c7.vault.azure.net/keys/HelloWorldCertificate/b7722258cbc34e54a5f84eff09e8d7d8","sid":"https://vaulte55813c7.vault.azure.net/secrets/HelloWorldCertificate/b7722258cbc34e54a5f84eff09e8d7d8","x5t":"-2ZhyDVO_SoGnaYPzivwNHyud_o","cer":"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","attributes":{"enabled":true,"nbf":1563914576,"exp":1627073576,"created":1563915176,"updated":1563915177,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1563915157,"updated":1563915157}},"pending":{"id":"https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/pending"}}' + headers: + cache-control: + - no-cache + content-length: + - '2649' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 23 Jul 2019 20:52:57 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + Connection: + - keep-alive + User-Agent: + - python/3.6.6 (Windows-10-10.0.18362-SP0) azure-core/1.0.0b2 azsdk-python-azure-keyvault/7.0 + method: GET + uri: https://vaulte55813c7.vault.azure.net/certificates/HelloWorldCertificate/?api-version=7.0 + response: + body: + string: '{"error":{"code":"CertificateNotFound","message":"Certificate not found: + HelloWorldCertificate"}}' + headers: + cache-control: + - no-cache + content-length: + - '97' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 23 Jul 2019 20:52:57 GMT + expires: + - '-1' + pragma: + - no-cache + server: + - Microsoft-IIS/10.0 + strict-transport-security: + - max-age=31536000;includeSubDomains + x-aspnet-version: + - 4.0.30319 + x-content-type-options: + - nosniff + x-ms-keyvault-network-info: + - addr=131.107.160.200;act_addr_fam=InterNetwork; + x-ms-keyvault-region: + - westus + x-ms-keyvault-service-version: + - 1.1.0.872 + x-powered-by: + - ASP.NET + status: + code: 404 + message: Not Found +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_backup_restore.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_backup_restore.yaml new file mode 100644 index 000000000000..b4c0cd12fc6b --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_backup_restore.yaml @@ -0,0 +1,239 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:11 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["onedrive.microsoft.com", + "xbox.microsoft.com"]}, "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['329'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"af25b76a7e7449e68a1cf8bce8aad55a"}'} + headers: + cache-control: [no-cache] + content-length: ['1378'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:13 GMT'] + expires: ['-1'] + location: ['https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/pending?api-version=7.0&request_id=af25b76a7e7449e68a1cf8bce8aad55a'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"af25b76a7e7449e68a1cf8bce8aad55a"}'} + headers: + cache-control: [no-cache] + content-length: ['1378'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:13 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"af25b76a7e7449e68a1cf8bce8aad55a"}'} + headers: + cache-control: [no-cache] + content-length: ['1378'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:23 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name","request_id":"af25b76a7e7449e68a1cf8bce8aad55a"}'} + headers: + cache-control: [no-cache] + content-length: ['1295'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:33 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/backup?api-version=7.0 + response: + body: {string: '{"value":"&AzureKeyVaultKeyBackupV1.microsoft.comeyJraWQiOiI0Mzg1YjA3Yi1kNTQ3LTQyZTUtYWU5ZS02MTBkYzM5ZGZhZjgiLCJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.rVhSaHDdcQR6td5cwFU9_12F6tD3qxnRSh-kVHndNXiwXQck36d3Tva16Gej5AAR2xOeJOAxnMPPOik27RHENeFrR30ktLybyWnZ8NNWEyLLYH7c4vZOLrcyH1bUMgXooQeq7gu8HsCqZwsYX06VUTa5-rSgzXsBK1h8t0EFoBqIEg3Z-O23qQbH42K4p-rzpIcB8l-EbD0IVQAsPN2O5NFE6C3hntiP3DyDbmH1vtJO6XX7BpJe4gfGWzCu8K8_4GXmg0qpT_QQowWjJyu2bl90efYDDk3zbQ81eDu1LGVKGUzJIcyCi_xlykIeE9z9cz-UWJjltkuaU7jjuRUCtA.YpgaG2GydtsITB9RDPzCog.NHy9z_zSJ-9kNw6C8jxZaGB0lsCK0qWJk2D7dh5EBMrLtHLJNdLNMSF83UMpSp7yJZQsQIpIzRm3Z6Ujc7xLtdnwdPCLBY_y2k9xU2NLBEXfj2Pk9mhFl3r3UvjUEc10iG278qwxh3LBSJ2HFozP1UCZHswZ5fsDr09NTMAe7fOX-QADFKvCYmTDC0uUHQyzX87h4w4VVV6BqapgNgqdyftJqGhRimqgWLQTMNbWAUslt_Izgsk4JbWJSvG1kt5H2mG3omB8MvO_tBYjI5QtG_yWHUmqWcImkV1yxfivmHTBDnB9SgfazZx5Udx7CKlLveYLxd7T4T3zjyoJ0-2QhW6njMW10UlKqEcK6r0QHmDQ-qBknISvpC5DZl0VtTSyKI4h9GNgeT8JQZZJNdWJoFkpjhzfo9O3cddyO-ul66658oReJgP66I8MqwB2-ZbM0GY-UEQ2z8i0U1JPY1xDOaORNqoaNeNU89qAJiAI5ez1uJ0ibKiMos6M73hHl1G6hHmhKnvBXmOEIwaeOUDY6ji1u-7FR5E_UPyK409eGHOW7dbe_W93-CQQVDjGDMJvHA7l6d-cbZ2RigbgCnThHOwdUwh7spvRoxHmn6wgSwaTA1hxQmOo0bR0Ng8Y9bqg7yDuoF79dtQ9oPVs-DOGGCmys2ZD-ODROzy-zxUBnUAgJ9P0vXqZ4G8HIZslZZpiWutLwOOE7vXsPiAtYtdbb9KupvG8i3wcYJ7rp0LXfmyCvrVwATTqiWCKB10LLvMVfRaVjEdYIOQEqJT9c1g4UF45hKKxi38ejiREW68ufCkwrslhdsQFxdgFwUdU-BUwDBdpj6v19TFf8_-apMt1KoHDPF75L4wi0D_hpr_UPbE97qH3Fgq0hlzGrnjjQex65sIehuWs4QuCF1Zd3RNauK-xC53ZJ8EP42PPQd4dUkeb_3XXXGoannDx0I1ONrPQfbSKMncZb6tu5h11Pdp8Z-mF2Vvu8pH-whY2Or5r5HXkBp4_zPn6K2yQ4I32vocgM6d4Yu8D2TlPOoiVrVfxwK9NHZQqjQv13-1jZcKrubLeipcjjzWYpT--bpfdmHnr5aYOiG5-IGDGS2Cg3gdl46VsPWpAHz1bF8sXjEFJUWgBu1Ws9IYo-mEb_3KbHuTLW_JK-ZFUmIbZp-GZS4ZV18b3blGY95c0BWRWTu8VC6jhhmSnG03Ot_5zFCBhTtX9MXutC_ubrpqBn8z_7fdQ5aOy8AvjHBuK_i1KYNGPTMQiZuUpbSeMEXEUAsc9hcYRgJEsFsxDMG23qARx0B0bH41xzffnnx-rTYzSFK7Wh1E8L9_wUuSfx7t0hJ2tHAn12tfn36jmxvrC6kWDqNbJ77T8w3-C9AiG2ZI2zDzm-10CdEJH_EYrbuqimwLqn8r_6MgMWnSM2kSLueA28aaDMR7hOQu2gutwltyrZpxg3BBXwPLE2HlHfpc_ieJravPrycGbRPTO7_K5HfqaLlaXzAp4FkH1zbFa_0lvVOlIdkxc75gFyDBIuokyevujRQ10w-wSk5igDo1XkCOJ73rEyOaqOWEhUJWaqGZ1ubqcnRJgtiHgFkVjE7ZaqIVmJp-Rfq1agqXbHhBbwANN3GMeizuaROd3SrlVWcfDVY-7oFtmYjYq99lelytdk20M6AYWxl-3F_vuxxEWsAwdgq1Q0Kdkapagrwww3o_HAd4OcIgP10kizQa9J32s4HWMmRKbRDLke_gBd7uZ_YX-gm5Am7GsGwVrjcSfWO28aovam5QQvJ3qes5xeCrd6XeRVIV5lDjVRT2l8sTP8NTMKx9IhQL-mVPtfZ16yxE_FYOy4cwWxgjcS6iqdLqrRXu6a_rw0hiD3gxdPhbSVmguGzPXkKLjSOWLF2JZ2QIlCs8swSALKCNuNvTz6mqqwnOe7w3kzhmoC52mUYHPafiL-l3qHNOg6EXCl3x6ipzjUOfx_W7liSfuf2s5UXlGHniw255TWyU5B8S9U08erwkZwOG-baVwC5ybAcYdvmALRekZsDeevHDKRZnV5HzcyNquXmY3gs8WgFcVPsfJEZGCokYfQM7mFb-OXrrWED_QLyPy7TPaKV76bj0eWjaybZG06kAdX-NwKXKOh_BVGHayvQUCDtrCCmPeTkJw_gYn2IzkLjb6ggC2DMo6MRlKD3FYmiVW1Vx36XckkWLs-dzniD4ZdOwYBQTXrB0BCyKiwSpj4lwBJgb0a0AGJ5HA0JA-b425LfBCZE87xdzTDm6rRwVTcOmniWBBRrflf--QYkHjZrUhpJu4VKiZx4WxhpLa8DYbzS7t-mDLyo_FrxyiyKXbTME7lO9UbXNsqDWPTAWZlp1P4OHZH7Vy5OkYcgpbV4tvXn_Gp3OiX9TOxmtdZfGqn6S5JR1hp6-HC0pH2TTr6S5OGZ8r5zPlPEflQIzqxr6tNXt21GVO_IcyrhlgcbYznbg1ZNX8BVc-yt5Sj7YdoJmD6ZBp25fckQ6U_FUdoEB9ODNgKYIg1L2TMtYsPRR0yLhQKGqIpDE04or_1RGgK7YaBoQzExwZ53yT5Op5gLtR6rH4_8tq2GNbXNWesJzvpmv1UnvcA1j5yMvcZX-C7ZMVD3ZQuVy-MCQXSCYA6ijClg0SO1j8wqqhtg3WGBDKWfdRCFIZXc5LvhvsLk4E2PrkSZ-X5TigMnx0Nxba81PfapfuXul7Ks9aJH9ywBQRhwrxDuHuny0LXkxQbKlLusVhzCKxlvC8BUxMZUKd1TKXVoOJngjQ4BgUhoVI0caCDBlykm6axvdZ0bU_9StifJQLslxpbsLkqmYDyw5LGIUEXNf3-TA6AYViu37GrzDv_1Bd5mC_ilhAZH8Wa5vGB1a5SL4Vtvlt6fjJ8m5409OLULaYQlk8ft9OQ0OtXVAnAWLrYmP5fTC4-8raV1j8oKZnp2M2IjIY7sn9JGrhQ959iJXkqaDSxzlVANFhoGwlBjE55E_PZLv89TiFmyrUu83nkNAuWwSnI6jWDEtGkqgBvx7FVzuOCZoxkldG1MNwWHa35phCHikFORccV13tSGUKVFYSAZ0uFXZRuWO3QmbWmf2muIXXw0pdhUsaByK4wHgg4Q-tDpSRDUkZZA3ngce5B011hAPEcWC5nMlTxRFD-JLtgWZMP013r5pol-df5inXyC-xDCYXRu0syrempL4kGeUQXiPFJZ2hFOnLMlFRhYLMW_dYQqh625jt4qKPPcz5Xufz_TrDyvdihs3YrDtV6eMLHsScqRc5QzyBW7HHK8RyCZUjfu1Mye0fkzixx11DF2VkUObESp6E-Ico3EMwfsvU2A8V66yLpl2OYDAYKIhGqhawvjR3qddLY8aolbNZERdXQdLkwthYApqMoHYyDbmjABXYSAYyPl7PZXN0Q1AC8aSRBoxYQ2fXYx8pwlLlUQDUWXh95xbV3wSn8SqZJv5t2on0FbPqRAiiP3hyQxx8aNw5BbcJx8meiNBm2FKRBio52Oo08qdTDVmiHV7wXwfXBk6CiaK05WnQ7_PR5cTmgqHBq5gz1-N_Zw-eVRPPB4FtWaaqqC16rJ2520SfQDMloDo0qpOpe8UrSPRgurbavwQbmMKiNgIsWcqASio1-BHV3epYehsGvYWV0myYinSyGHQW0SGKMyyc2fo7giV38DnCvSRjMzqwK6PA5IokLz7xcLjPOa4T2ypp-4v9beSmESJB7SHn58fcS49w8ef4CvFUtVrBhHyYKi7VspVBR8D-6k9s11BTNhkQ5mex1VBaIRwS1pzQMIl6uBB2zrXTGfFuheSodi00bu5qfjgotO2_rw1IFVPOtW4soMUOcymOETN8O8vwtXF_l1lVBA-I_H9tD-1Onfc5rEZJ37-HMp1umKO7EpmCiHl8atvuoQlDDfcc_n2_DqjAb-I48HR1gf2gPaFR6knhBsoq9DDdyKa0XUbzDZCwZ0WRaANsM2pWhSE9EDGfLPU8L1T1LlnrzTbuXRmuPyQoI6tT3R2E7_8qYPZ9J0l5pxn4ThkjLjQjrCKF6xVYOz4F0589xZR5BIJvNcX181JFVjF84Y-SoNDFlRIl_FxfbGauebez_TV1Pt1aV3p7QTBFTTodSzkuERsLWIR4Y7S8vpTWaMXiUQ-gs-liy_XNlsi_NA1FL-eIUS56AUNIi8A_bRLvWI2LzYqXWICN2x-wt1Mo8Bmu0fj_ZdUY3GM1QXdHSc1rvweVnSvsjdRfTPg4WlQQ0qOZq1RMJ8iY7dJTWMrfyZ7xUQU7AUdKy98j8HsAOTvmVSdX9tiUKIfT5FJzGCFtzERuYJvHyvrW3b8OUjFsQPIbUR-4tJkzQc_plhBUwioRS7QsnVIa_yOrinvIsFLVHOjcauI-IhKOpfcoTMJevtr8lyA4vlyoOK_a7pCGon8uxuKeORKNunVDaTHKbwiVYlhAdbnLbPyzfRsrJtOCu35c-yAeJuogid-zbOsunEu2E1Na0rchL1EmoGipY77Y116Hd4YaPsEzvLJuSvV_nPZtNONHFGbt1c1HuwmEMqqfbom2BSyjmouRS9YQDCzKglSWrRYNJFXKKJct9geaYGIuvSFtnvqKm6pSi2G6_a8jhP2IJLBvEWWALlpQDQS1FS7tbkqm302M6GaU351PEDAE4EiT9-xHNDEOlo1LwCRW9Ggr3CRxhN0ogZrA6VrXh3NZxCcbtwZAPI-hifmNx_GFj6z8mXNpI9XhQ6Bqcq4VO4yqQtzg6EYLy13fJhUbDG6hjpZF7u1Zijqw1c0H_-_wvSIagN5RWv4e0wRW8WYvciiwYk5tRWYGHy_auW_5EkQIDkIDpJRvJ2hCEr8FyGh7Scv2PPu4tlaKN4wrhG8JGUUmd_G4ZQDnbNz0t7B-8PM4pLkRFsYn9yP3Kdh_qCSbiisSkTRqSGyvY_0ZePSkBOFhy_mJK4mte8xpPaUdMCHMXqWukqdbNaPiVcGe6mBbkXY0NXcPAYa6dBWSKKT7RM_fbX7EWzXFx8lYUP-813TbgaecxLbt-asNLZftu5-72CEYDwsNQEhdWS9Y4jKeFUnIOAkde0UX7Ci6OpWSBMmSBmR8sVvzvQGZVU24YYvkDiS7K5lShDD3QNf81W_VrmsAyFY8C3rPFS339MqA0FrVvLKcm_i29UOXFAiKea2ncmARnqQn1eL3a8IaLuEtm8tlvy8VMoV7_-64fki3SCJeVeZZwc3EgEgqH7TPkKeRK750QOVSw9FaVgaETxd8rc64vWx0CRG2Uz4tkf3JSdqymXEMAeg31pLHLr_ItnilaLOOqU_HG4F91y7_5JUptwCTtcE62UPKJ9mPzmy81YgKGcdPT8BBu9nkJgZicJ5r2xQXis5FHPnSWyC0ELFn7nzV9hMp_x7O_3k4S31AArGifGW50PjWHStVUK1bQnBbipsooRHHTrEq9x6VA5-p6NJYOBynmUHk5qrLhvdCKCWOOhe3a89n_JvVVPapoJTgHyzOP2uPRKifF-ps1LkBV3laGxWPGgDJ961Lm7kcBPtljAefiSzQiEDqxclxADjq93Tx5m8Dngl_Wjz2SbGE_QJWVjHVxI5rDhXpXaBby0P9rG2P0uXHmR74u6Gx5DEqoyj3cXJibjpWOTb8UA38kNqVKwb8jNxAyBzQuzb0FpPM8Y906Qj8CJlfOLxoLQmwSzYrkl7Bs03xSj44stmCWKcBdILdoCwmc_otsEF9eaItvltdafRB2Q0E0ly9wfu55nOxSzdGJAR4MB5UPYtfF2x4c-SHp-0wSs19IWiSsxYp-aKPMucguAGp3PfLEoc2zGaqORaKeLj2xDunsKeRd66uBOg82Z_HMWSEujSo_t5jx0BIFOq7vs7NqmM5B-R5G-E2e30M8BSbOBGvP3UE568YhCuH1Gbv7nnpcwhxb5z4o2D3hmhJANfXe8ywU2LPsuBqN8JL-d25s0dPvHOKaykuL6WZGDPZOAZ1Zss-rW8F2q4obvks_HYX5ykQfSOtPJd7ffj7gvZLoa0QGlk7rta7NdA4kbsI1vGgLN6LMBUmPPZ1nkNox9195cnPz_8kqaCsiT-Auneo6qolPDoqhSL7cKdFl_C1Tge8F0r7LC_L-Q9GqRz5Lw6-yFb6CZhNBD9IStGqYKIx_WLWOxuUSBRhYHXIMJb2DUEMfXtVDr23f14Ts5vr20LohCK51gdzx8IKV14CkZk3HWB-4BIni9xrQfX-spSN_x497sFAhl_VPctFg8Df9OykrvRvmW96PF0ZJSNWCmZDnGvm7y1saSWHS_5qAmxJfVu1h8x25fCF6lJ2-AefU5SPZ856NjI7aL3of_3yceewUd_mjgrQfWG8Du05IaQMTuXpQ-NIaT4FwvgVtAklbVvCg8TLm1uZD1VJOgwOY1aJQZflJ9TkONQodT6WsjYKZqSiuSZSlMNMpuXBU6RnOSaZ_Siui2ZQxe0D4zAjNtUKTjmLtMZmhEEgUUHaqGoTx7arCO-DsL_eon0YXXjL7TZuzznSRar5M_sJNKnQ4hnNAFFqH-H6jEWQmEZPkd_IDxuP4ptH2XJn_8VZzE3zZC-qUCADhYzvyCREJvJwYDMPx-8CVQO2Em4UulYiOGMA3_kEAHfMaphX0gxPg_dwKGpFrZ-fAzROkmvrfygjJioVQjETUbvm0cG9hgt2ZgRZQlR48n-KP1OghXBLUm9jGVv4RujHsPdUhyjw9y0REARWCrk-kC-eU5aGHsPELN58flq4xCCSupzejYxNnJBmpICgXp-uwlqXZnjRu4ruw7oJL84zoRM_7KieneSrMbNDohoW51teUqEqCGMf-_veD3bb1gMJwgOBX6QTtXvk3lHkiB1_a-MlPzM8h5-1qDQT-VFr1FtKphQLmfEOJIf0Xoq0ZEbiQs9YyP9L4_bdvtQwg-a9JIKWxhV7f86P-QM4B0e1WvaPaQHXzccvikq_-g6koINvs6OcQP0KQOQG2hH224yMgMiEw2bBXCKVkZOUMPzqCwDyk0I53LJrZt1EPbyV0jMHIIvGtvyMnLjYT57ODGMzZ5h7UYADOpzIwnjmgPxVJyUlGcXb0HJlcMAqjE2DSF8FycaAFKdIx41gJ9H5O0mMsthNbSjO9JcYyADQGGXxh57Dva45kKVskvMm4d0GlUwoSC5TbIxEbEEmfkRmQGxUCVPJFw7s3Rg4Y-XXXv6k0N4nCWvxAWkmrgQ6GhZEIW_acCPsr0HaekDxgGMb2uupHutxWq17DPCLEzgZYai3OmoGEDXImhfhSECIrfBsTeqL9A4qGQvhkLno6li_fBy2GeWCsiq5hMuuxEbtH6urNElL6HD91_Ik4AglklZV3tsUsafX3ju-ST94vHRejGCbnV3JcC1Ww_rsQLkrn1d9znNqAE_obi-VBZ-aCT_Qy_StSAo4dANN40dSEzSJ-xECavqrHQtURpuaWecpAEe3uT6woXbbRsI33A_8e_Co8YMp9ScAx6Bn7lgDX6SV068SDieizG_0ocnpmWx8GArIYiIFYf2c0f3NwkGZs5H_yEthj27lh6eTYbUNOYAnyaO7otHMcRzPXX8dBH6bbkdPJOC9pQiQqx1jwXYcQkkXfuNlxTSQrQSvhu5TV0cRyAnlldS2OFeSN8SyHRLDRx48BKFS-zQ6NLWIQTZUNZT6QVtRRcifQ_D6LJgGeyPWHSzUiSY8qWyYCmpMo5gUY4yGZgp9oVQcpXCS0UhlOLHKafIOQFNFVB9YUhGtvvAGxgQFCOIuKL7A_JRMRSIjJUIZiHdv2sCq_zlBIx87yCid2bokqm02a6K6EhhuHorydEjotRLK2pw1P-dl5_NE40m7l7R28_VQFriTepU0awIbE9CJmTE0NuC5-W-fZ1gSol-UqyF1V9Y4vIVxu7PGq8DOjOxz1LwdNoBcRztcRZejgipXwGTSlNBkhTwKTnc-zDqBSp0jVDdzsvJdXtHvU5QsNbGTaoK4ZbtfzgeADHUBb-jX1u1_NpFB3oD4-GWwVrVHbPNV8CEQB7pZFq-EhaJI7ssPAasG4HwPL_xsBjZk-CVjyhwkfEbPB8XVD5m5XY08XK0jbAPLazj6ZkxIIjrQrvIIb1Nq8AXepVGj_6Ck1FU5yF_LFMNzYOU8QL_BQQ2ak8hOXBpF6e-rJQJ-tTWTlZdBasiBDf2b5LSQxRxgmdcXM5QTHTB85TGkYxxfQ7SQQhnYvbQhUyBkXnWB7BiLodRxXF1bMhlQt4WapHizNU5-cZ9zabeaCrTWK0DmXNZtsyCHuilcZowqcYm4jetV5y8j24PrIy-cFZ3NYNHIeMYFMNLyAI1fm1rfSbB8woYfpD2kDRL8o50kUPxIr3mhqKnceOBHWiSbkCnYXGHQarFdN5CPAAYgKDhhtdzeqnBJRyyTVXjVK1a6GVVSIN6iUGcWTU_tscK-fJ_MLOwfP7NaJI-OXV4UI0TgqUZ8jrD_hkV_pEMwuCMX4RaflZ1kPAH-wzFu1pV53tjL5hve0Tt87U9j2Z9GR9LM3_ECsoh-k88sXSEiql4oQk5uQYujsFjyhRJz9rbp789vPPonloAsAMsEC-pol3KN_O9lQgmuWBlrhad1nxTCZyyzdz79qy__zJGMjJ-x_7RYVO3lZly_iNlndyvQDuRUssSqAWPEDPa119qc-YqW0PhY6kynCIGsFhUHR4aBjfkzsrV-pLkuwhCiUm2CAsVw85-63CqMIqcnriKRXqySpQHMdtjSNrfWx7NXLbaaexXpJfb_juV2YmWe00MBZL_yTfMXxUqYNxpb4fXqLzZFIb8SN_dlnryJUoCFW0gRb2sL3FU634l9gA1SJkAJ0wBbnUuSXE0u_qln_epdNOrCIekmGj70c_ti31OjaqLi3oQes0AZ4SpgPcpWPH8YM09vh9325F_BpUwwNhe7Ox_6UmY5yE0dpFxmdLD3e7kjw0BGixz_CnTSndjwuoS_zicpf0LHtgYcjVx9xFamrSi3RnhmfYSFCkfI1-q1CoSanSYgUjL2MuVuLOcRV7Yu5DjMglTKXjBRGct6xaU1stZwE7vzQR9LBfcnD4HA5LaHpJjkpdDfd3nPZT7ZTGI8D9OEXLp4pw8Ie3AseRoHpOmUvLG7LcADz36DDW2jqGHOB-mSd82nKp_il8s74VUcHy4IWunucf49dNfihAPk1ICIUZb_ri9iEV6ikDQB8H9Fo268Bl5KKrJ2_FzAq4050x2EbJZvxijMER8SAifDBT4tmghQqDsxCYNmd2W0EL3TdIBxBe3KtS2bCCul-qxAIRUmpwBdH9jq7dTQGeQSUe6-1-HAL5YvzJgNpl6h4OYv35M4ikNgHCUS5tCH8t5895nV_EfHsZDE-2vjEIF7JFWEFR86PNzAkhEzDHH1nzH2sFtKLzPpK50jkGPWXh9GPzCbIwX41x0BOLdsf69sHayuehT24Cll8f0m_aUpw1cLJ35NbZQuncW6QkKoag9Y_2mdILtLXyscdAMWlW8C6N8WlLyaD_wlF4tp8RcFr-7FeRafXFuLo0iFtRY8PWifnG1KQ1guTBRfknKLAaXKiYb3uSp_5NeszMwox3fVgKMyRbhgCRFbO634EWc5gnGOfyHiLIh5tdioCpT-DhN_fJ0EVYnCh02d22MjmdazMsfpNpFMRR1tTPwKEiX4OZQfQc_CEZp9-Mgd8OUmcE3by0YPAjPKk8KE22VPb5grN_978T4Qsp7Io-k8ehYFvYShEslVVKZ6NXLiJpDORxmNMoQlTp8_gkqFbZIfxvk3CR1JMKCKOqeadlCHDUz9b0fR_5jhfERm7-UcK6UDQ8RRZoAXblHVzkbxBRSof7DCuQ02T9yeMGfO4RQ8EA7fYU5cTIezX7VNX_lT4EsSH_eGlk_4PpB67ZaEEO859JumCKpQH-QBJUZAzSJalLOsqjYBhRYIv66cDEbTtwmMJ6jZUSh5O5GXemgLY8-5PnvF_YV9kqxkWDpURuZ89WwPzw-_h8cru5M7DPS9N2ryDxqVMe3zaZ7Ol4QBliDcSsF7Wm5lzNzXRlP4SixDXzl5WdNZFoIaW7jB02C9VVblIKNPoYRfV9cwJ15KnmkwN8aRm61r-kg_v8IoEl-2IuN0VSjyX_VNBkJsudCrmj8a9R1k7A62HWacmMmg49IkDWM6elAlqLMDp4ooWCK1hgxeLDXia9iIF8Nr8rZdgoncHbUeJ8q2Se9Cmv4LqWV1VqaJqo6isP3UDazzGim7DVAAU7c1rF5iphrqz4jDrS8A9ns1xEGqOPcCQUg7cC273Q1o3b3FhsrokSTOT2or2h4YcenPOXNuQmBKgPEjNLkPUzfL0KOpuX2IuhzwCCGK-5EgRvHhf0a8sT_lxKN2-Z_vm4DzzSl5GBNPPueFCEmt5_0H7VYylZ5YtOQ07yx1IVwzTcT5f4IxKDaMFgK1e9oBR1nUYf3bl2NwPcH4kOT_zpsIfrLl0FkUWMrM1WQbslb77ltF1BqH-TjRwNannQG6Mn6A6mZnUww9Db1wrh-Bzv4tLK60CWEB_gc0Md_MgyxF6ePZyrHDBtjVnyrOScAPMEF7bECxCU5oIHE07-iBb-s7BFZ9xs3xTHDs6xPGe-604m1o4XsvaKPKklnyAyCNS43gr0tzUKFoaDHvn4DrdnIav5BdpB-2-AZ07L7573cp3kCmT_PoS5dxM2Zp9V60TQWgHPoSW-p0N8joheUZRz7ALME7RnibjufwG5ZSa3HkhF58-cMk8WcfveSVTeGiFmgSt7R3PjyxftFcGpyzkboR6WsToEB9W9I4ceNOmwu5IhkCp_rhwu8rjkOlW2ozSbMdDNXQ1EyAKoOLw69PbbXmzGd2XA-WKXb1SIlVsNyyNZx2nGqOg-kovQQzWmHH44ibxuHsCbMRAfO_Ww5k-1w8P7cc60S6wx4e8EDV3dwRC0B3Ql-1RzjH49aTum1rI73x-tB4vcVVnvHeMSzN51d285SxGgcDvamAXk83Iy9XEhk1KD-v9pUJbVkbPEc4KJgvkFyuH4zKCt3D7KT0ljHoRaoxUcjKyIr9QVYpKZDoVAOP7gSbZuJF9tK7yxv_ls4oAeqnyvO4flxScLM1OrvtR5qoQDVRWqysqow8FqBtzsDS55gcVgPYsU5YWHS1OX_bkENM0i7TtS3ykA8z_eXGQa2XqbXN4Fz-LdNspxlpLzOCZV5kHSGa8NU4mHNDQiBCvhWDxIvKFCdL04aSgaa28uesGMwafTT14GixJ5JWJiF11CppyEwimbd2WWFQ9u2trsMD1ofnE1rumdKTEcehy12yM7o0XqRLxtCylckgsWFSexkZJeexxFzTr-schonyT_bBCGNH2zG6nPkDZmRT4HOLRryLh23ZYqVt3GAgboc9_Qi49yXooZSHAwtKlb1Mw33bM4xnWAuE2u6I9OcP778Iw0EIo5USP80v92XkLApUagZ3dzhV-N7Xm-rZauttXMiH_FKjwJJ3FGmWKu3-1MkJEe3vB4-hLxj70-dYnVFeNY8fs-NmIAs_nzMTzwD7rUSniI5nAi1-u30gb-NU4moSWNpn-ASnt6N3Vnx0hHRjnGBehpvbIZZkg_u_QBaGOz8V2Swg5zUEBrPKfSBOKFI_0_lRYH6Cdj38oFiGWpBCZ6jdRWYZ22bs4sZqvG_vvN41lx_71d7sHikOh_bjCXc93AGjN6IxBurRDFFOj6GBkfxIRD1O7pL6nV1d6TMoM4gUq6S4EigjPiNrkJSdhNX1FO4ew7ECAmEE3ssKXsdbc7fO-mWf8R6NbErmoXGxJ1S9xGOhl6SNE0uQUO6WLqiK8TS2U1cJDwaSNKxvr6VR2ehvzmpB8p9Quubv-F7DD9TR8dt2bElwWROWUpfVmYbJiomKbpDCKThOHjawM_ruB4UV3WtqEzn8IFJDyDg5va3PcfJP6ablctZPXJhYPS8sjMNqwYqg1n0AJnaQbcMXBhsNJFNJ-kNs2avOKSaurJGUEHMUEUsQojiZ_rzHZg8N41IrclUOdoIPOX0ShAGUsmkZtkv5vUAzveUOk63leqeV9kEO6KqkL8I5FNkbnB43gr5dfvp3MvO9LgWxri79Xa98-CICK3LzHCExzQqwGAjbV7JaFvd2AW54j0EDUSAIwyhsP3Cn3f_xgD6I4kQApx8ZKxRA4ebpDSUXAD2gs2zhcjOOp8w2lRna6FSy_Hvn6gQSWmk9qP9elCAQ9W32Slb_08xWOMpDZ3mSahBAWLPF8knqZFP_MJNsfwGNmKcNHdaKpjWxRcD99xMsq4ZbkwZkqy3NQxjFoA4x0jB7Tkkh13LyPUjufK6X5t7W2PdmAfbJvPzNM6dJtZWxIJI3mKLYQhFeHL0q03t2z2l18nhZzyW_CIITNXtaTAU4U79pgsAakdeVcU35_J1slM19Yr107U4Qfyeu2-9ckrYBAhx6axMdSd7HVUYbMiL6F2Ipdf7X4FxH1MvcQa8EbDNE6TcqItpFOTgdy3DFaMoI_1D-pBzedFW96XFaNLEmxWECZlFvfc3VSCyJD42_6Id8dNQX-e8-bgRIpRtF1-OghPA7uf1nobuJ_v36Ki8b-ujqTBkn2fR72Li4IbeKLQ0MY-VOQ7SnvTSZjvF9rBCZJxS62MCxKjA15lAxCcsG9rjYzRJWUfqLoTpTy5PlEFh23TkgEM-i3f1dgJTesOsfpRjiNPTirFHirE74fprf_Se2KzSGrTOxjF8tcdS_UAwZeqEDOF9K4amUp--EOSkE0Z6lrsWTj5kzk_-H-sfJE4oDh7RpsRZnC8voeCRaUTXwXI1h3dT9UsXrH0GoOQmOu_-uwJBVm5kuYN86jvjo-L6VysI4KvhLedXH6b7XYbugE2uxoe_5aH7vC8oaQHxvAibI-rGQawu94WvMKvSNuKHPdkrxV_EDv7dzsVV0SS1C8-odLp-KfnPPid-7cXKlpigIp-A_LtO0_JH7xethO-gGE5WAO1i7D9G-1ZOk7Zxx8pvFkBVkFnmZM_ySRGMMhoRN2qBrWLVwtbhcmokrPfHED3MFrv1OxoaPbDqt8KyGZnYSgNUc3zFjIHF3MU7Xj0Ew2bqveeD_VipKRrhCeWr8leg37yAs-vEJPp35v_jOcTDuYp6cpSvOwlyJrDi2enLZvI-UmJ-F5uyDajqkoUztZGwb84U43l9nxWTb2js1BO3ltmlmSEFYXHP99jbhQruiZjDpYlgt8x13qHA76ivm53gjxybySdsGKyJp7HAOaqQr0F_R4tm6CnmlrXKliAyTn8St7rV1wcZsApTPlavm0Z74oIJvL5V1T9hpX4LOz-4f1V93fbKfAEaFTU3BCAM0ZmLnRSTcDGzFjDc5LvsfWcLfZXnyng34duIRyD0o9Giw969gIVUj-tmT-GS4pv0hzlcJQeEw2UQSbwwm-uI-w3z751qqXKpUWFQuW83_cKxXOqujP8TrNZ3LoUZjCGWyaMYrI7ZAchmUoJW4lMK5p_zcZXODGctegHcfjqUd57xHn7-MZWYfKhCtk0hmX4iCHg62sweEYShA6qooPLRhgKa03iMByBfVvh2FYCXd5v5IKUk0b1LxgjVDCYrsikB04eFuC0cV1PYVAqFN3ALig6o_ykNBWDx1zLc1N747en4viuf8LaUeByzNGCKUAARZHHzvBD-Rz4Gws4mAvkAgjOqApsaBjO9W148rD0Q-1K8otbwVIo2634RImpEsK4mMy_UDatc4ZPXRYiEGaUaRVsmJzLd4iFwVg7JX_Z9RT-Yuzt3UeoGPGmkEFrNYaCvxC3sGS5GiirvNCNCvtsz0mLEQsmOXPRU6RCq3oSzTgcg9nEJkogwxV6ULFmeASbQPIs18MqnuNgUj8HVoLCCbz2AcrFqs2Du-2RL6kNdI8Rey1C7wC4es7zs7Wbg5hKudCrhPYbghfzr6cD9iKZRRjat9iqOGANwpCNAzVZBo2eq-qUq5WlIMxH7Wd-p8kTW1Vqn3f596LkFSjtK1egbU0F3_dAvXz6B-D72Na2eo8NiJd76vaf4gv8kCZmgp3ekLPbeoh2Y62WoWlKWSejmE4jyMi1iXCEyOJ_6ei1FJHRTvKKjVJ54KxsaURas9SLLqEIPCLF1sabZymyjrUFrGqTlyzTRYwXkbmWpup7YCSBv0tP2hOfm4sSvnro_8aSYNbBDB9swiOXi6AywCBCqMN_VKf4B5-22ykZ0L5Km8kK1vdqMhSBV4KwTZwKNYC1MveUYTcbkiJixEJmnvOdFBr5EKeuZdTWnD2unxCZKk4sO30kaKa1swkW3AipfeIt11R_Q4rRx0wU0nnrS-GOBMtcs05yIdEPODFRt908IuDiHmvA_59UYPLH5b6x4CJsywe8F18rvSNHFwq1auz2KlMfvCZ97P77Hz4z0BhyCrD5DnubGtV2Cu9XRjoXcBfGw9QdwHSk9-C9ayn4cZSbYQE8iEjnt6wdQ88Vt8cjjJCH6HgybTkanQycOyp01HNC_0MFFge7aZ43kE70OwAHfoadjjUhywAlAqsgkOjGwV2A35lCECQgJ34oLRfOXq1Uh9R2Giu8aYTa8AbSfZUe2NC192mKMMihlNw-Pe8lrUUOu2ii9YkrHMToX4l36kf_C0Eb1dfkKM2CaE0nZkcJ4pMhrJSes_rlIvuC3CYGTfykcWGXctoXbiUTD1EB4zBgHQBBa6pMtPraabC5Q7VZcuEcaqCuObRvf0eDIU6C7jdGtI3X6T69ccbt-bmskftxe-DDjDcoDshevlN2bU6EFfv5b7LffMciBCVyvGk0pAkiPlhoF_T3nkXWLicifYDJLUA8c1lCecJ8jplDVQk9X8Z4maFYYuf_ad6AFRYYdwZLoSzBKOOk_1eq7j-voqUd3fFonxJiC9RBFJBMzibYAZuAyPtJxYem9gN8_bXNn1phxPI0h8kqvYC6pfUUXXoAgA6_k8xHNI9JUKeL_QgTjlx5sSoctATON7I8y19xiJRErmQ6bnAv9NHAULmuZ2ZaeYcizVujl7Gg1OEVkY0z4zJKJFjaFGdWdBnkEJmjjHigHOdssgBqToNfNXcCVidborZu8HE9J8YWRS4hLE4_Rsqgi3W77ucYb90iM42umYYHRXr-lIl9E1aQbmseSS7WK4BOt6jJDQmYuqCpN2FwkJwhtKyHtZIp7gW6bRZHicmSHb6VGZpFB0_XwSHYUqRTUGwKZ1FjcyJrZ-wFR2cnXqdvig1PeRvZP9fb5x9N1E6gLpXKC0gSqXjV_Wf_dqyVkyNTNt4K-gzBVRX97ML5Vl9lOtxnXJedjhFkQDR8qRfyB3RokLT-tlh_KsiIqKvDmv62iiZXCObiqz4GLQ5F4xtoPXiRCQDsi8h_auhQSQPnMR6zWVplJn0t94l7Z71h1cXxDA-t5W-A_ARrVfMScV9ePfp-rE4ghr2Xn8U6p8_rXOU7zl0mlcigJ-djknGooNxfi7uKX867E1-joFFGbVJ8XRcdUO2ElfEMjZVxav2bSKW6OpVc9hROgpDhp_yONXNJTAxCNkgxkzcCDTH4PK2fgwKL-7SK1WQEbUy75m_Zs4CBq4JQszboNZubHBharCp_1-7iEfYuYuG__IJdaHUNcbTA0lEFdWUVJpoN0Pv7kDfu8nnD2mB-o57F_2hvgNUkrr3iveXgiJXAiJDnIxh1jY-lIKwI8Qu_6mGuIravZ5uIy37pfrgtJZSsCYfsuWssXZRzn4caxGGdr_cki0aZGZwdAjxr5UoOB1-sys9O-40HJLmm299KWh8Z17gtwIt5sVOtgMNGVZQNkGNb0yL2CAfEDGz3NA1i4EZiTZucOATUMFNyuezuxCxgKsPZFDQ_ENX7tOp7Vpl-lie7TczftbyzKOXszJSliB1-SS2oLwEQ4U5_cqZ_pcpIbSE9T0A3fBlvlnuC0KOUQOZptN8MPX5gNlWdOnWJRKE4-t1wIfiCmSbHcAiXBh6lwL579ZLsFh58Hluql4Fzv9WX5aTd_MmAteSbe0kGz1NifUK7J467fHKJtNWqUpvwyacpUpkME16gzQxHUi1s24JNOsAYW6sF7BDBOg8bwoU-w8Sntum968h_0IlJRXh71R5UusqTeSlBEc7L3SUNFlpCm_E__GcJYmxbh5s3MrNZxv38pFO0td3m2xaexMTALfonF-RboTA5sbG3I7v9zJNTJM-na5HgP1MikpIF7CYeKLIQOvUSAFgy4eE3oLq_idL19-ZefzDH9-mT11UY70BmQAIWgqZ3MbPRg1Fe6iSlKfsFf3qFWkVgz5bW_FR0q9dIdzJ24CDu5c4VXnf4w_xW0lf6_lQ6sSWKUtwcvf88r5A9fsuVpjj9H17ngnyLyZg9fkWv5cYF1PlNTLQKRa32GHLrhkfqHVoMRSbGjhZgL9nSV_ZhNk1H-hwuk_jVDw0sGbh6-_yr5D5yQ4yOC84lDYmYJUhBrv_JDos0gQUl5_MjfK9pPYCBBKbQb_UTBJV2iqjSyZcr5JIL_CSMSrmuvCQr8kNPmSfiE-a_25-svz1bE90RhHFXvGUOqVJ0vTEoke5g-iCIG3a0AHRPFHHLqVLPmnkCwP1iWOMmtavIwjV_nb0Chvyrmd5iDbnoTbwRvO7rE6Aq5rfGW6iuBEa-TLmE965aihFgkCRFnlQitfHSd5xzDWViWD0ZoW2E4hbEyA1O-3bu8B0XQuHE49qzwRJG-jJnoXQcACFBqp8veYTY9KCRpEQI6qoi1Vdo0UvUOpzlXiYDMwbH361vI5rNZ-diXpF2B_AXjTcJ2Krdu_F5ywXhqjKtHz-OryLzYKYoseTdZinjaVj0pwf9pzUevjDXr4mJh5M_qhn_hUyx6bif_aDAECapT0siv8CoAJSat-juK_aFxL-vkILpok0dusPI6chgwy6uIcdob86MAGcECy2myU7uhJ5ocjggfFfMdC_eXgBfGu18J7LaxP05ngGueGIMidypUlkijAApxK3Hl-EqtRzexSwNz_5quKmZ7eeFwEcRP5SqV9A0CYSSWmbFz6-VxMLDWACoueIQwCr0R_-F-3HS2Yq-FqqmxqvE80RtNXjVx7EHgIc3N1FsJ8shOFjQ7HqZ02baf7cg-CMlgQJ2hjbQjtXPfpNSnFD4Bsm3f6gabf8VgCAi1kVuK6JjxDVuj6tih5TzObiXrOGalTHw9eBH65JhOJAeYzOPIMLEuDxykrXkzJMOqtlcbmRQzdodtEHkvXNdjbXfGxAXvIv8nI2Ffqe64vAn3b9M2ZEN6Tu3matT5DR0sp_4w5OHqyFbBjGX_hJFz9-E2eJNgbndoyo5LbGEOq7m-44C5ACIWoI-_0aWj1PP6aZRP_MyrmoI9yyRRy2jukiejZ4abVUIslCzotLxmNc7bMfZp1XrQNfxnIEYoCuObTGVh400kkP1aypwWQPsvFj9KYHb1XGRePPIeIZR_KaP8wb2rzsXxGFVJXvu1eWngJAkAcwIGsTM9dQnsIB5MImUh1CJFE3p6SclL8CLMn2VdLOk9nbiqoGF6RKh-ul-TEHgGFJtDk60oA2z7s7CAkL0ISxw0HKpzLAoVlqOAFccNo88RfpEQZqKFSJcxTyzSn2lgJv2W4UNAbHF4xPi66QqiYgUCmVJcBSt2LfRSKFVUFJUSGiRoE0sqjh498m3myoYfkfJCc27bgavuYnnPxWI_IwZyB6we793jlNnV2cDJqovQiyeUDj4LhMFHvzUEvrspQhsTy8jBPGvDWQ84cWHXnegNbubR6Npsf4hSve55axl8m-pEvBwD4vbr6hxwDfaJExeIgnnDQUXLOCv0uSHiheyt2fyVSNbwEWfEF64XyXIpM17PgKgmQXRK5tIhG8Bpc4HrQk3pxwLKCg4IVSu_fSFu2LDuJ0rjVuZqPuPumFW90OgAYinYvpLq5O4mWZItvKKRJkpBrLSNbK42pC9KlqOkeCBMNgJTiIV_LmWbUo6z1KVAMGyAPczcREtVvpgkkZItmfMHJWgn5tIEFT99ThQyremUUQH8mfiRoeePGccscYN-1qijSyK2iD32yJuKpxPz3YzP_ZiTOHPqMKREgWLb8FmqCG0rsRlfFQK29DHuM_TjggoEJ9wIijne-ZwISuhBtPCKDmNwxSHyZLfMO8uMnW8pwtqVjPhN2YFX73EI8eNvRSqo7lZnDs4YOfgqGKEGRamesEXJF4N0RWmkjYhzJhxhmfbXa7kXYuWj-AJQKMOWp7RdnAe3vCQAwfrFK1Yh4KipSKy2Au3rNly5yteq2z_DoKmBiyle45tQDxrvzP2UiksKjZGQPW91kPLWUnJLmM8FfAzn7-YcTEilAe_u-VeCvQvVDadFHOdi5ZP9TZWOvXJe_1foGVpMMwEy1ugwXcbEpBgoLlSyhjGfkFIXUP2QWzNP_mnPMwe9rGLzSGlwOdTa6xJ2byaxuhroRRFxgs20E-4CmKYHILOA2QaXW4UEdfAznEyZCasureoDqbnqS6a2KbZgEazB2U9hn2LzWPqdticN-e1ScQJsyjVICxBZ2b-SCrbMwAbsiW6AkR6M_oAAaqqJTW99JLbRB3bg6CfiSKWgn3rMbSXXKwoREvjiWH9Li9RE5eQpEN4ebrURohvWElE82OLVXbqMKGljiosxHgLhryzSufnsQ0BoU37o670dnrrA_dALmT0DkstlV3E-RX8kxpMGUznhxGK8cmXAU61WNOKINigbmvy09xSKxY8Fu44tql1aao0qtEuFHg7xEv_qRJK-otjdrClw1SB_GwR9mw53tMVnopIOrZOumbiUhHd2Lw_lf0jPEtw0zBtfMfzCqIfIk-dwPiKU8l4Qq91N5axCv6avkEmzCBO7x4McaUZqQbNhxh9ksofCkhWnsmjCdu1J1XcuqcsX17jh2jxQM1PPijEn1jlC0aNPeZ-CXEJTzqEl_dfjFkG5wa-rcUAv8jntAK96gfmhNZcudZP5r_rnvRNwav_fTXzWiiOJaICPbOD_WUrilruAJpAckM7xy_pECCrsSxxtuFFJyGus2GV8ye7hQPn6Ylek8uXAl-imWPR_gWWx5j69UNLijr7gvKrId51Xo-ixbWrVsfphiLu9Ace6zPerVSBnr9p8SRtvo2n6pgXXjjnptfVPXEZ0wDsZBSVwc4Tr-WI7cf9s8zpU7l_5MWELgWcyX7me_cgOqh_t5GUAF9xxxKE7E4Vr-SEn5oWgs7EIbOnqv0Z5-WkJJFgC-vt7gsZuwp2AWZnNNQYGYeOnV5dwMVgWR2AnEHPGB7HI2ExsLGYWR5PUwGo3aC6k3_KoZS6AwjiIxjxq_YUTqDKo0Gw0WtkcmFQ5GHHpxrM3rXnKPNITZl0yUidBhl8M6i8XccZ1h3qWfLcvFuuGW7XbmZum2gyEu-sckkT_LvPUj-KDgxVyFS8wrrJ0z-91-uO867Gmd-KEp4WOw8X3INr1kk__D3Evx4DE5OSspaG1HoOJVOaxhrZHkxk_pc5P_gGn5wgb8R8y_X-DIi7Pd8EWb684uW8rAj6BGc4DnjBRVQB-Y2TkfTPc0MVT3q7lwDimYv0WYnpzDy-kFYrQKCfvFNl4gVS4_2RC6e0m2_k7vJT7AnkhnfG3ZA_HwQxUo6ENt6sCD_h1UhBJ6k9_l8-DdLTmCWffAS0FBYfVaCU3ZOWxkIY6ZMd40iWDzWrFc4JpYzTwKSJPaARXXIyhna_CGUWElTinEFxgIXd4n3StmBptBM2cMRQzoj7Gw05tn55teR531-3xKs-SfUeZ9r5qziIxjJB7wq_69rHHI2gs0qblsRpqEZiud_8C4DHWUEnRjwLqCjYrvK4Spk1WqEZzqNcASxMotOhq4UvgJxQ6Tq_4N_iinuxDAe1MWHecN2Q8fk8Ag05HpNAmZvsD7WTYUIEVHJkgF0jsltSperAOEOIztC-IgNXKQFCAIZgyYc0lcfG8-b-1OGIG5jyhBxYxmxklXZLUU4eO5S2QjXj4fD2LHZtIcJV7HN1AlmDIRAixxygy9osil9kRkvt7vKCght8QnqPt_VMxQo_iZGWGaCm9nNFU74wRdjlRsQAimfZ1GYbKFzsnLxP3sOX7xA13od56sdNVcWIXXFNBy-ukg5Uo847Dghaho-tdchYjl8lcGUV9hASp8EdpC77cm-kokI4MR16eXtkRc5mP8nUt6EkKotNo8-ZhPkwvHDZBVIwuxz2uIo4sSBV-wA2aiQZZpKHWxAmPKZRkk6CQpVwzEkEBH3wQeH93y7RylPD-fvSxT6toKU7Q6QFt0MH6VlpLWLNN6hSkxlN4z6770SZi-yVVfMGORI2f_2sCgTgD-2MAM12gklpnI_tlLtzH-yXfFJq5Xt8EsTOBwz0AwR8nRLF86ihg1RhEtw--6m1hi9fCILLcwo5eISjKe_kaZzpCG0FMAG3hJTvn0pi2u5Sj6C80zNL7V81JJbJOw0pFj01XAGdea7w_44Lm0rspIpRYnUBQ3ZfeFF07_odlIOonzRmH5Rn8E-U2SCJSWSV18cmdOmNEwDlQNYbkgZnLQ8Gsc8VxIZmLAvu7-kcCUT78S_76EJOdBA1yjo6Q8yczhJccW7Zs-Bnn5A0awL8xhPK-fiNe1LCtXS_CYFlLB2P3KHGxfaOUuk-wo2UEiy9DZf12Ci3odgOlWelWJOUXKOtL-y3kEU-ma2FInVPqAgZ7PFwHrWJ8C9Cmi9NuOntLGYVtEskITSKi_twQFu5sVm0JjhnZfUgmjFI_0-LO1bUY6RYelZP22JggPL6vo02XA4W7Zoa4piOLyIeeeH21P-iYoyk1E6Ikp2I2KRmItithh09pZ1mQ4vrdKoTAN15Sl1XprJIrArN5EQJU4Uut5R0ceTVg05k_ZDPBtlVFrLi_pFq8SnkWBTzBDirix_FiWktgpk2RRt5H4viOIyezdvPY7LjW1TO6D99xaz0fUu9UOv3YA_2Oe49udoATuYzm0ivagzXEWnseX_Fmak4RvaYJxlc6DcVJEna_be7GEUN7ZvJ17KVCoAWTwkORzPwuJoC8xaAzEYyYmPR7Jw6jnbOWOwprLs36jKMFL00HEsO-zv-PUeigBbzQ5HM0_CrT8X_RiTZSRy4LfhAXWh9-GpYY1gMlYnJsvbtMlG1zYvoEViTpNmnDDKZVJ8-Ph7KQQ_j5yx2sU8wdVJADas7taAxVJh3poFj-c2-rKqbXQx_s96kq1kRYBKG-G5LZj-7mRgYMzNwJoTcy8U1Uv6BoNS6zag7VZSyuHyJ_SKbb2Jn7f74vXTmjM1io1JWW2HwDOvDqytANCxK_mzrXCWzsTc94Vlg3LzRRtqeWbfFvDwzSg_de6vxTwmkQDoqGJZa4VF8WXJLWUJlPN7YW41lmyaVuKUobTNICtQE1xJ3j9do8f6riucQyP3f5fq4Qvb0ToVaxCL9-Az69e1q-nFLuFAGOrCs29GJIL8fqcqQpaQyOZnMGwd9h9_jJZPA8kBtVlPlGd8aKx8iIFpy5d_ZrJBA_LDw-0wEDBeKjhl6S4rCk_4m2e4yZH7JEczS927O5-p7-KaxQF7IfVXbLRL2HVFBvZCP4cnm8Rsr0Al-mT7WvQS2pElJSnZ0iu41XojwHPy-5PyWfsu-L0TleVXN6Y0rItclbcp-ciHr0SGzDaeO1I-0E8ZxDANDwFn2KLy8MVHC3dNEDN1Ty8TILdc91tuXVJMXrYOhcZx6zmtb4wH7_JrzJveBD-BDGBG_KVhpfb3vMp-DcBBOzpxd3tS9vzNsNlJtMXjkWnsJpLjfpSSFAsfn9mEOE1NB60HSP2uh7RUExkNnjhWFDtzY4gVU7xm_5KxCK5V5R_lb5F0JfQV1Jtejcu-GDAfDxBUE7N2YuoGjINkk05Y0E11RMLTcZcv_j2ggumvJwzcrZlQaP3TZOZCuRqTr1WctUNaHmPwLYWXH_eDWY5trLHPbElqcKoQnk9Al5DZ5Q69miHlHaCj2yoYt3s-k9bHzmwvV1YcGQssKll-mycUTbVbHFpfZMHR8KpanPrrihLuxZzQdt0TsYByppHW3xAtvEs2_wJ5LK4tOd2rIT56dE7fpdPVLG535v-g6eTqUfyRuPFTNomPiojzd-KljCI3GP4d0EGCAML72GbHM1LW49Ngm3eOScQTCl-4s1WdF6uHCgbZ5yhNbtr0c-zyBvzpw005wB9KD73_hHEEtvWA2wLKK1uoyzTb7NY7BdOlGjQJfpG1UUiaDSBbFM-SgTDDMru3DKmgbsi39I6_9FGT36UWUoJNjkPXKvEPmpmxgES1mhsuYYC95haceoES9AqMhB1uF_-FqvL8n-zbrLyyr6yTDW6IolQhHjTNvJeD8qWlsOJYDvfxmSmlOH2B9lLhDR2lWJAUaT0p0Hyubt5hjjaLrqCCH7Lqg6TMAJwBei6_BYALISaK6PY36JRWPBYQWzXbDCmupcgDeP214GhY_ntdJDl533iRGOLv1Bu6C_juUuM1DbACtqJnrZfyFc4QR4y21UJgkn1eWtT22iascTmT7UjWdbyBn3fRYgyLj60ojKZCXdhl0c0a0QYG0LOyniX3NAdZZZ-AHK-EUlwrqNPzGuEgf5Ga2AUgYRqYfXSc08PXC7HpnBw6QXE-OyPn3G5f-SQ-CXXSZnKUvVgTjH7DD2z8hRYpkxUUb0nM2IsU5IAsn0mIM6_xg99QJe2BVa1DMFkToEodAQC9xpPDC1eYwGgNP3eYqdYxMSUE0k74Mvb_Wj0AH7Waj1c_L4w82xFf0MMJDo2qlBPKAKlZqDvKDV_RZ515Ru1KibikE19ymkLE_dStawRYBm4F3b9s6Y5N0U32morvszlmm2z11CcONlXn6XEmIx0MIBgpG5R-FSxk15AiIfbGz6vx_EfLpwXtkYvRkLRc3maAZYetG7hRviQj6YQgKMvFSxXY5oluuAxwXpa5OKR9uzpCv7OEZGj3T5AwmOTLhYDOBO_KLVxB_StcLXlkliIZeLTpGk-SryrpOIobmtCa-Q_fjKaDO20a_LSCGvFVI-mGirEw1HcX_N1QLRRm2Wsbb_AGUefkqEL0whQZmRMIz6uFf6yChkiEU1WZ-NuNh6OmnLvk90JLb9XhhrP4tlRoee8cE4Qw-USZYiO3_W74-XDAkYFScSkUZ_XHsr0h19_XD4XuLmQZin2W6SSsSFwVMtAftJ0i1DdTeRBkXpE6G3inFB5CBNS757KU9j49gBmkfXCAD64HZwQ6pGL1NsemYyRlGDb34498K4YQKYQMZbDmHxqBzElqXMuoJYUvQx67TPQqRA8GShJvZDd6ZhRnjPXWsQjHuaE1drTNsF2h6gJxdfV5YG99oFWxx5Q2MZSE8_amnJiHES1VO_KK5JSn1gE8HBGrz_fjkcYHcyfjRaUrZXyiz7d9SqnYRuxn32VkLApgrXlm2MpfQ5YRBcWVP8oa_oIpdmQ5qzYIgs5NMLMbagPNQeMTJTigEwYZJZYYsAZARkqwW4HMUlVw818CDTOcZbnzwRnEska3KhsG5F4H1scPDE2ZqsogZ3nnAjhTn0JV7Odabkv996SxgWjQJYrGnR8lA2hoYy-T5d34I3V7qIvgWXqx5kqew7dlWAvW5xWwsyYMDlTRLkpOHfdpSRFxlh3ozYnYeTz0ye1NVYutJNV8gZTHd7K28wS1LPtHAsxYfUEvGsb5YchQ6e0kHcTei0UybYxIXMVhCeq0zm_TbpAQsBecDe5qWT7V9UmVJWYJjoTOLKQC4d5-6L-WsPyjcMtpOdx4DQmwMI5RlMhuHVOqc49XhnB7CYpiKR1RLJf8vKw4GjIuI23dNdrKXh1mtwRJvx1SV9HeUw5Si6bq30ca9IOvOOPUtL5sJwy8PR5tRRyM3sGe1IA2_-x7HsZzdSdzNUW9MJ-t4AqyRikPc5xfUSGQ2SBOJLbQYV7Qt_9D_U_piOqsvz-giyN791EtV3wBU3__R-lrj0sab9e5mAYblBU8-C_yKn1zRE1ArOvha6R66R4cHl-4919tsPUzLHmHF2APoOMvzb_N3wG6QAeWSpJvniRt9C1IG36xS1WdCzH2YPAj9c1uCv0BiR34H0pnvRqNq0tyduJZjgrR8hO4nXD2y_ETb3KEoUJBEq24waEeVE26JHnmvDn92uM4-3wYIM5gjWb15_pcoxEb-d8muiZ4alF29EpUnbYW_08SAVzdORMD3Q7U5laE2fcYsogZTpf1FrWF7mzTqnh3G4AOSqmkVnX1U1KpBMjAJ473xwFBeZ8qv98kl7naG-BtKtM8jhbOA4UVWzBGEBpPg8LkBNTE5tOJeCEuhUnz96R6OyZsJut-Hy39OoGXU05MR5COnwmW03x0wXy9ZkcWrAgdYOh5drYXpaTNt_q-ZqN4jJ2bLbU2DAXp9AGext8NjjDq8Dmlnb6ESNVGjuG5pGm6KIBJTaHK-qR_cf3d1i15WEqFBW3DvUL04_9Q0mARg2kH37KNH1-_JXBdl0tX5owpT72BrWewhkumIpHT49OivlJ62Y9xW-m8ielmX6bxWt6Unx_yznJp-BANXVfDyyeg47YuR1da-7bXfb8U0IzVSuw2Ohzz0IZb_kzDAoJgJzX2Jo8mIkrmiR2Wq61xjxDHr2S0ruhlQJI61aLKh6GJY0WidMCFfgv45xy3O-CS9iAPA2r5XAoGbig9MBgUhsIpfUJFyGp7E1ZxXS5hwM-MZyJZ3LJr9vwbEa4bF4Qm3WIhCl5ZvRBB9ztmG1oSkJwOtTKzXHwX35kd09BjQdRhEP-4flQbZtbXc43FkfsBRlOTKXmjCJWPWyjKjp1oekx1aUABw-oWrAQO1R3oiTzGCagLJ8ff4egdLh_YmutDfH9OnehBiDFPqEl5mF5Fwl7UhUXtt9LmTA8n6446gYLH8krPX5cR2jtkqsnocD8VI8aJSOwUjYpGc9-6fOyHuaI0vDz3319ISmj4FqfaBWFZnUycNU371tWbOMISmb1q6lG7kQC467f047KRkxmsWf8wQQOVX5TAJUVIwVgpJddYOCI1BZZkVUNzhy8Zx-2G5ClE8-QcmWSx7YQUen_8wa2X3KRTaQbt_YqqMlg6uOr9wM2fKogZ0wFzjRKGhAEUsmg5Y7mcru_2mAudlcNO3t6-PkP8XGdDzAGnpT9RErOr4yxdYtZqD6kV7w0017_izJAosLixFyYtyN9u1_D1jlv03H_6yrEbsHXoebHhJh7aZ6lkTwj3jg3ph0t7nIWyhC5-jTV3WCWXbCDZ76xjBPPnGhCXE4Tgq8umeqgNEpzsXjsN8591CPOLIKQLbhlT682yHTl_HI8kd-63lq4XvtxGwK5_jcues1TC5bW8hH5KBUoE3Bx9FkWt0OxfV8Hg4MdJQWGBbbmTdWkV6wq92hbTyQtTVh7kp2NgL9NJOs9plpwlOccrhrTAc0T8gSq4tEMN052EMLH_wq3hUST1-nkhVSQDCipePawtAaPDK-lOoxWkce9j8LlcM9haHXK26EnP-ASQtRQkN68TgBHmuXc7e_zFUr18k5WaCJVOkQyxhKMCRrJzmUNpBbJV0D2Cn9El5DYkMGM5pOuqMUW0Aexf4TROxZYHZ3lzZG6qlo3W-voVLRhfgEL92uKewq1Ep2KR5M0RoRwLpm0bAJAxlUIYA7jcs6m-qieVpXsOBcY4RDI4F1hgPIl-mqlDpUWW40Xq9D7GJ6IRCOqI0A13njfav7CBLDUMXgpGy-BcQfcYn73WkgJGia5n1jnAL834w78KphKoh1z_6Vx1ptxZ_4KW7UHi15CRmra_xkemjKSfInIWdiVufXpPVn7w4pYXUxOgbR41MSLU9hewDJiOHn6azZhzdIv9J-EeBV7HuauugW14f5V-z_X_gyOF79OICDMwmgsRawklbEnuIQDNZxz3hfPDlmN3L7WYUC3YXULOMSNT0Zjp_l28jBFdFOHAYXaivbM0DKYcwNpDvs9numpXiq5IqpNqWbewJjQTih6YHgSfhetGB_svUP-23iKbtHNPeMF-pBMQ-rb-LGvJ8FXdo7GAnhawGfKxCmRVLIS6tL5ULmKd6JaimZsA6DyMrtG7dOC3mN4Rt7sVH7W6EdVUGNGLQEYKQZ9TWpsnG6hIcQtPpPDFXBUrv05uu-IUmxZmnGgYXaaudyv7JAHtEljWuuVDVdeDXn-cbGupfeM2CiKb2FOpoI0aW9tUAfcVBFcj8fmdVHs4e7tZjYYllFqpefYYucjVO2wr8RdQZCEQ_7zKZUcRWPZiKi8OBE0mS4_qZnQUDbB2PD-BedgNyM6VgaGHoFpgEU9JtHW_PuYpfhhDDx1zxvUcSxsKxYFeAOaK5e-dcC8M8p9Oeo5KUhCxu_atAD8diR2ZDVXtMrCYA5gOHtbEQLohraEbtYV5kCh9cUVietaGCIgAeLpKn6IKyG1hXRc9q3wy2o7BXkUoZ1Y_tovW7Gb7EOUzLWCkLYy8bCcOW8X2FeJriyg14-YZVvcljTaSNbg7n-fKngcH37F5SzZCAlNFAobrA2MYxWe4mNJFCWEuzEC5gRXzV2Eg2BjVLH6gfWmcwcsJqviRVsev4Q8bSz1231N7bHLOwJpSLHou4W2i_U6IxO_B5b7cJdfKIxBuAvXHESJrwnE_L0900NdvO6JyX5RJ9_LGyplL4klLfRxuGw_WoDuM8pe7Smke_gWm77L_5vMCA8Dm291u_WNC3yRQYmUvM9znhzjNz4hUaaX4GY652r6xYjNAK8eknCA7rUsTy_t1Qr8oSawG__F_Pt2LfjhTuR_bZVkq_L7Y2zaS94vvtPwq6O-2LJvFR0zkUyLpDH9FSySXfBXoqCbQjSEKKly5yVSWi81fXOqJ6fNsMQYx0LtFxvIxUQl9l1ROkMtsZ8j_dInOymsgCQN8tTuvLXe68yx7sP7uUhY73bPUxx19yQUBCqP7UG6kK2L4kRVmIrofo21YBnIWZwsenX4tnLoKpYMz8gN2F9rP626pIID9-S5mmSMqWIDWj-hkthQv5NwDlGe9NMFTTlztwDwX6-m5afN773TcohyF96kDcawjqXeQkltx1hRG_LE3Q6Zsff-KyiTn3BzuyXob-oF_t0DG-K9LZccEJ4S1hmY5B6rVOE7_9EKhFvoxAbbJRVEknFzq8bFyQwVKHYEzImv8q5m_g4QYw38BbfCix4G8-KKLCAo5b4_nO8DaLGm4hhXt9unlE7NzK1FeZj6Z8HWJmfTC2-LIBBbk1DShNtVzXJgEstRK72leCSfaDT0HEyVcE822AZvBcg-I6ESOYqHUPeopb9WOVaA7FN4JnI7OQvnQlNiBBh_rcrIkLrZeg3gQ4VTuu-E65LkJePjJT7JW2NHbRCRPEQebtf-iA237CrWxS22EmTxUGbEDjx1xiQNRecuOTwnmV-yc1TS7KWpBjAWeVPfT2Uy57K14TQwwZ9PULBQM5GXDkJy4Zdyk4eOTr1ikY2f9p9_edaZaRYGEgJg46fW8VqkEdT8PI1tvfeUEDnd-A7SaRC8vsFDm6VIm_9FHrOcCoLXljvz2bcKRHS6LrOdtSFSBhO2MS_09782L0O0sV8L6SjkKKAnRpTqE3tUencWF0HNHrhNsIKGqRdj82V0GNU4NAZoYSZ0fg6aGY5o6KzajBe-ZzVpxfol_JrbnoH8nWxjRdclcPHV2v02eHxVRKhBkfa5pWLEi0rzxs9FT9cCkJFafqIy-1mtlL94JBLG8G6Xv1vn6BPUsY3UZuSPpWkrLQOX0dVcXBdx7UQaWGYiYEHcD8MtZlWi8OjhHHzmtjc18S7uCLTswmbAYFXzq0BAaEXUrcy72OL81p4J73WIcnVGiyS8LcnU9bPdCL91N2cmkplVAjxEwKplyrsEme_raphvnydKRUYPCc5DV9Y8zd9QI6o3IrIAd54rrBBCENLnbsHFblrTdD6_dNExoXGnbELduMByQCvtQp5tNc3l1NGBm0bA7mlfLZA7DQTwuUrh4kuJrsbk14aepuAbRQCRtr_jnZYdH3RII9v2d14K-9dQlKXfZyuwwwCI5yzRiig7WZ7iz7_ApUlZ6W817xP9d7FQ9NMdFS_TIFkdcmsNTnV-OJkECn9TeGvHpk3wHfSXIEINBt8ZcNHjqZv9NsK49syk7qHSeDCjNW2RIQ71ibgXYeSHIdvhLNtUx5fZNvgdnJ6wQlcis6criC0HwwNq17cvmeRilEn6f_g6FjiV937JDcji2KgGClUIrOtCryQcKXgNRHDym9JJTSx-QJYeGJKlWTX9KjjfnI2nZLUEY6UEDQKToa1K4blPSx22gznnfMX6avDrKtTuqUFsqebwvfRxSmq-WRPFvEw6emeLo6NNJMqhiJaMltBBk2oyKZMhGqxUQn6tzzBEpZWcMgRA46k3uJkU18ehtS7a-a5P5b2PAfNAgcInH-3-F-3Lpoey4J-LRxSBy3urVPdOzv8RR2wEy2gpIYnCzvg3SctQQUoh07Gu8L8XONKJ764Cdq-0EF-RGuSeIYmQYc6lWei5Ka0Y_UVHQItHr33DwT1KE2R8FUf277q4Z1PM7tGsoatdg7Q2JeD27mVoRuiWAKOZJlwInrY97AYkZQW3dr6rHFkpq8BHnrgaLffFHdyn7yrmgvyfy2e9BVKiPK7SUHZ2WatfeOGIk5xL3DkGu5sQKknhRyQH1LzY83oPJFOHKa77gdNYmLtpcDepPmBl9ZMxhSdD1qPMUZWwVD8uG2wPeklHMIjjxN2Ba_Td9aCKGnq0-gtXshQz3_1iRn3BKs36UpNT3zuwJNhQ8NYYlDn80NfiYuo5LLvYQCbzMoJVz-uLetGLIyTqYWY0P25PgSFbGMMSe71Bic2Kc031u60LtybqqFR8uRIDfQmm2ZboFE5KYPDmn_5FRq0LCtM_hbgWF4dYGVoVOzubyEjsUG8zdeqrSomvCzTYJHbX_L9dz3UkeNJhxbJCVIrEyQSjsWPc17EoUX6KwyiIXb-iwbTRbaYu7x1ZN6J4-Iq_dT8GSGPO2gDWRQXpO-5ZUGjZ3IjDxGM4nqJQvsABAb__nUMHAKPochgd0Sb6-TV_1OjcEhgZGAI-0onKza1zpjfRFcYD93NldrZYa2q6IujMww-DefxIyy8y-28HOmueeUTNwbD4tFjfvG1t334kg4selcvv_JhS-RUdXKXYCDLSBSpoFUl4gLnZjpExxceJGtUCsZAMJq1TIYz0WEyJNCDp4XF3fuSvF52SZV2eyarIjJE_aUyzMBLWhp4j7VDUxA6w9Kyqt4sp4kdjvPYipTJTPhwzuICGkABIyvPdWNmpsulOD6DwmzzZfGMOSH2ZA1OodcPztGKIA1criDMcRzFN9gp6XyvWY12hx2nZvX8kscPyED4RBAi9cYfH_s9-Z0Vh8-RXN_r3p23uPqa01Mhf69lD5OhQcsDMUxwsx0tiMBBmDW3MJYN7CELZlWM7wQjMr-NsTDaETPVNlbBL_Y9pv0LuUEh8NF33CuHqWRNVtteHuf_wOV5Vcs82Vm8XuE2OzTQ9fKzr812UTuQM32x4_ZWL928sB4r8wbmX47dIuVDGhflontJo2idCwgbOXIvVnpKRNhJq2Ed3AnnVPkbN2qdvXxK4XN1XhAxe04znejWa4puoox_lgTZQLa34uCZRBRqp8LptepuTefWNYCFicQJPj5HmdCR-hisf-uyzf7-IESMApq--4fGD5VUpL-Av_SE7hFGM0peJPolsXM6ZePqhc4w78ou04G7PN4MaaRsH5atrUJbga-QLxtozPg8W4voHNBNGAkMMrFtlqf_-FYkDKTmroBxHBV1cpV8I-mGhYqI2M-fHqtECIa6KKhs-3M9XEwBBJEsZrg9ZvcM5NtsrcAJOZgicGmcaC2oQdkvlr9lymdlGe7ZhqpvuVXfZ9yeONQ5TIbIT-3rEweyLbHwfMWLJvQaH23RgL4cfOWp_6pEuX1hosxnOxAPNNnqGCtdMKQoQzEiHgc8XNHS_jpv87du1FipU7a4mmVk7vKfslnND0tzHjGzDHMrcxDCciskD010BIj1u-hsamp_Zw1GSlmJIPO3LKhjV3nDeF1azZgtDHAuwPKyszCOq8HbkdSW3akRv4YhJ7JmJd9nAYbrSg3bcNSK3jyFrUpsxrw_FtjPyhYKkt4e-RUQFiqnyRchwCu9TLYf_JgSvMhlOW8FxbY96KES3A91dFq374l03lj2lUFezoVDPeoww9NA-27EtZcrLO5F6PpqqdIvfGNMHp1v_R55sbOU3Q8IoI598OutALCKhh_8xNq-iS4Cx30fXDhj8dWZHE2FVVfQ_Mn-Jq99Epuu9ZQqbJOjxtY1qJd-r34S-gHlWzU8zoTX6vwDZGDtT95K8R0zf48b3MCWrcSQ9L4bOO9f2LtIFOgL5qr1TBOhBBd9Xdlv0a59ebOqVYRiDf5zquwsCh8ku_OwOh2yenF9uM-epLPY4Cp-MIW3vRxMDOeCbRR2RcCZGr9D8rHTEvGliYlv8ceFPpKgU7Q8mHfTEd2NjPJVcQN7dTrP32LLtlMOVQf0XNYxdwRFLV8NtXXrRllXUoXsPdhqRdhO0OH9AymyVsoxbQLFAFOBVdXSTkfCNqjRxT2yCDe_fA0CDzxC9Vygr8nJp8-86I4EIUrNxarVbAg5x3nfnVE1EXzozSRvrkdXCOknm-3hhXFlE2ZECsqWbfr5w_EHPQL1RaN803n4pwUwUfAlK1EAjrlylkXRDoDYnw2FxHjml7KOmFPbwWwOLzU_NLwvnhsURXMmt00PdazUQdZmrAMqIeDXOGPsHq2pVeaNULENlO_Piy_DGiC5GHfKYBMkDPHQiUhaypZd-obs5ld5rxvt5H0pK02-Tn4yGxlNBmEHXc3veacat6JvoTDjjL-imh619imm0O23YhhPyBAHN1ZOC5hZiF2yiiRb35MzKHsV9Wkum93tVUA8D2e_50drqJs-wAy7CppsxMXdF16uo8fBlBiwZn57SbOyKlBSgZD7Q6-4kTiRDmjvmK-0MdlnYQKs20mN3ctKnkFQNzDQGGmY_f4ddZUUfDyCXs4UinEL2py7S6HLaax9eR0pTI2dBv-rSnPn_7FhydNqy1nOIFHmOaZ3klX3gUG64w2bC7-qPtEal5U2_5W0dslEZRkklQWeAap8Jq5UhCK3U19yZVhXYE4vOeHU9ad1qovUsSONBRRCv8IcOsLsFRjb1HnI3QODqM2OAoG5BnRAWMTv4fgzCy8rY84PEOZUz6by_FD4s6xTerXYY7_Znpy9pER37Vo6AK3uIwcZaGfZDo-9TkUTCwMJw22o1WtUshUXinL8hgRNp3-zUYrdnDzB4i12YzVudJGp-iGbtZt1SUguyT5zIOrpI4Sg61F1moaYDR-IVrJjzekmJOYF3Q8PkXEubpVH3NW-_kwmTq41jxv_IJ0BDHdE9Zz_Wk0FJU4ZtTCJaxmIkoXe_VcrROxrM5Jj65_XOpSDjZmuBgcjcgVaGPyDbTNUHJ8lP6LX1kby6kQ_p0mby-lGUwHuzvfNd1mbAB35DLJvjUWll2VamEcMysUsQz50uk29b5tKZxyFpWm8J1TcRQTqeN0zM9K2VDgfRik2hBd1NwxBNrXQT1R2GAzeEdx3SCQhYOa8v9pfo6RAzDdSBtF8kMmmpgWX7-ILVggihPRg0YtzQ4MOcJdo-9rcXlMyenCmNY53_Xj_4VP7WXDV8AOWFS1Zm7hAqjoxzbKlIultpUn3s_LbQK0H_pQ4n2fVbmERB6NjUFJ5XifmzHKbaXXGqAFwFzYCuYgojh9qMwRDFdmFReqCfaYGkaSrtX6wZAIbA75FNOQZAgiCRq5WarSz2Fq7N46f_G54UaqdzX4KJfnkp7Ff3YJ_aVRUp9ORmE0DmI6y5YW8w_RpuFAqFTYyb3KUGMetQF7rbTISi_ZqNqkaXO9anrl4819fQPxj3UX2VJn55n27fth2_XusKD2PSf2WAyGkSkVC-0jcwndRNLaQx0-knRGYJGYCo8eN2jDXaKLqoqRBDKoYH1wQ4QsjH33WjfYdK_y0cR-cAP7EVxC7xkZooeoyqPwXvxT_nDJvOwXWd46Lfr79N-hSNjQQqZtBjCeWdBAPwSQzAP0ao1h2qwoZ9B2r8BN0JuePxn0PHfLJ8Kui2sz9axW68tgyWMTaC7AgZynZ4vWQ.YOgjfJghnD8Joz1ShnXg5g"}'} + headers: + cache-control: [no-cache] + content-length: ['43460'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:38 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599978e271b27.vault.azure.net/certificates/cert-name?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/a6007e896c074b10b0a266cb365f4afe","kid":"https://vault10511599978e271b27.vault.azure.net/keys/cert-name/a6007e896c074b10b0a266cb365f4afe","sid":"https://vault10511599978e271b27.vault.azure.net/secrets/cert-name/a6007e896c074b10b0a266cb365f4afe","x5t":"gny9IWSkH_pLqJUEM7lfRWV0IR4","cer":"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","attributes":{"enabled":true,"nbf":1567638687,"exp":1630797687,"created":1567639287,"updated":1567639287,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639273,"updated":1567639273}},"pending":{"id":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2475'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:38 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"value": "&AzureKeyVaultKeyBackupV1.microsoft.comeyJraWQiOiI0Mzg1YjA3Yi1kNTQ3LTQyZTUtYWU5ZS02MTBkYzM5ZGZhZjgiLCJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.rVhSaHDdcQR6td5cwFU9_12F6tD3qxnRSh-kVHndNXiwXQck36d3Tva16Gej5AAR2xOeJOAxnMPPOik27RHENeFrR30ktLybyWnZ8NNWEyLLYH7c4vZOLrcyH1bUMgXooQeq7gu8HsCqZwsYX06VUTa5-rSgzXsBK1h8t0EFoBqIEg3Z-O23qQbH42K4p-rzpIcB8l-EbD0IVQAsPN2O5NFE6C3hntiP3DyDbmH1vtJO6XX7BpJe4gfGWzCu8K8_4GXmg0qpT_QQowWjJyu2bl90efYDDk3zbQ81eDu1LGVKGUzJIcyCi_xlykIeE9z9cz-UWJjltkuaU7jjuRUCtA.YpgaG2GydtsITB9RDPzCog.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.YOgjfJghnD8Joz1ShnXg5g"}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['43461'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599978e271b27.vault.azure.net/certificates/restore?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/a6007e896c074b10b0a266cb365f4afe","kid":"https://vault10511599978e271b27.vault.azure.net/keys/cert-name/a6007e896c074b10b0a266cb365f4afe","sid":"https://vault10511599978e271b27.vault.azure.net/secrets/cert-name/a6007e896c074b10b0a266cb365f4afe","x5t":"gny9IWSkH_pLqJUEM7lfRWV0IR4","cer":"MIIDczCCAlugAwIBAgIQPUYG1Vf1QPuOVZQDO20qMzANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wHhcNMTkwOTA0MjMxMTI3WhcNMjEwOTA0MjMyMTI3WjAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDR6WlhZZ9tJin7CAB+nj0fIWXqn+RM31rxKm6enxP8ESokdZZOrXOT9VpEFOxCJY4C7MSpZqS0yVIeTGouiAaM2dQEZws+Dy/3PnyCPcXn7vmnX3z/mAYtgYMERaOV2O4ZV+q5Ojh77bqX/4O4y7Jltas9aTYkNq9azLIStTXguE1lV5DHmIAU3wRtKN02bRKqXXvkl64QhpqnxQ8FAIOtuheZmQgVxftJq7MT0Tsu8a6jAc6O3HKT5IFYah1xwXOs9d4gUYrMubkVz/k5rzapRmkeiOrMJDcvApBYxmoZj23mbcf3AVB+JEfrm9638A/vHvqkTOLorujeodf3xE55AgMBAAGjgbQwgbEwDgYDVR0PAQH/BAQDAgWgMAkGA1UdEwQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMDUGA1UdEQQuMCyCFm9uZWRyaXZlLm1pY3Jvc29mdC5jb22CEnhib3gubWljcm9zb2Z0LmNvbTAfBgNVHSMEGDAWgBSq4JWfuAOiAfkLg9XZFZgAIxwc3DAdBgNVHQ4EFgQUquCVn7gDogH5C4PV2RWYACMcHNwwDQYJKoZIhvcNAQELBQADggEBAC8Y56TAFsmK/JOtQ49EsnAbskDpfGM/mlZZJDJLP3ZmXXWo8jsHmqJw0bW1rXsU7TxRZFX8Wv0ZjOocywDE1jirXWQ3R5Znt+MvfqMM6ia0DXNpnZTVqHqY/e3I1Sl912YKhNPTeAwb443e4nIE6JPzIKXm56bsnHePUoB039Ah0iwAMjA9uPLozeCtRjZB16Lc2QRR/CMJh92/Me432Z7TkGfqu1bXRKtxOwALQBhQDIZ5g4gT+EpkceSmzfdK67TOFIapM23IultwjsJfSlBMCp6tR0JKJeD28oBF/NShlVi8L/3sFRoI94hFjfWNS0cqqy4cpHTjY/1huaZdIxg=","attributes":{"enabled":true,"nbf":1567638687,"exp":1630797687,"created":1567639287,"updated":1567639287,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault10511599978e271b27.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639273,"updated":1567639273}}}'} + headers: + cache-control: [no-cache] + content-length: ['2308'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:39 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_crud_operations.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_crud_operations.yaml new file mode 100644 index 000000000000..d5248f52974c --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_crud_operations.yaml @@ -0,0 +1,240 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:48 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["onedrive.microsoft.com", + "xbox.microsoft.com"]}, "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['329'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"8a60412fdd4343ffb7cf881424bc4b2e"}'} + headers: + cache-control: [no-cache] + content-length: ['1378'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:49 GMT'] + expires: ['-1'] + location: ['https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending?api-version=7.0&request_id=8a60412fdd4343ffb7cf881424bc4b2e'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"8a60412fdd4343ffb7cf881424bc4b2e"}'} + headers: + cache-control: [no-cache] + content-length: ['1378'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:49 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"8a60412fdd4343ffb7cf881424bc4b2e"}'} + headers: + cache-control: [no-cache] + content-length: ['1378'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:59 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"MIIC4zCCAcsCAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA7crY0RkU5VinzX5JpDISK8gDsAXpWYkx7L/cZ+sfjFElQodnK7ER/yC4KBG0Dsntew0tcX4DRtQE3dFhJEl1lqNRuiY69RgyGj3nAa5ebNMrZ3U1G6/qlOQgIcANgw+j4Wx/NUPjbMy2x5dkKcAZapsMTkG+VPjsaokA2/KQSYYEG7RnwexvWH+n6CBlMSTE7Q54lI+cTnRlx7kg5judjdWnEtJb2SjndTy6Jxz63lhw1olgwEKa9gCWf+0A8mRpqz+H1wGyVDB2rD1TbewuzTBevRtGPL1fKy3RdRmrpPaungrbOmbDU2pjhPpSAoc82MAR02R9sLMnwnsdSi5BPwIDAQABoIGDMIGABgkqhkiG9w0BCQ4xczBxMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwNQYDVR0RBC4wLIIWb25lZHJpdmUubWljcm9zb2Z0LmNvbYISeGJveC5taWNyb3NvZnQuY29tMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBADzx1ye+PNyQz4RBHN53UKljqClIpQKbOivNKJHinSv5yebMLd9zAcMtt7CV7Dk5XOUxNXoPi4K1hvD6btENCA+9G6IMglZ9YNgKoZUhuq0GC6XAKSiOHjvwd67lOgvxRvTQ7RV2hgEfHkKXvNieRQKMiv0KyqUYMIt9AzfnEZIDndu2e0RaZ0JuBLsJXas+H+hLRiQc2Cct2cp+YrVohNd3Tkq53Ff0JQcimj2p/uNuEyL4n2HMFdUB3+7dgn2nfbNOs4ksD1VDQaQYQwCjj9Ib+RlTG8C9qvejh7baHW0JA19CxhREB/pnbkXFjRaRhqsEVgPYcHCuDEGML2EvkdY=","cancellation_requested":false,"status":"completed","target":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name","request_id":"8a60412fdd4343ffb7cf881424bc4b2e"}'} + headers: + cache-control: [no-cache] + content-length: ['1295'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:09 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/822dcdd2168643db9199d2588aa07611","kid":"https://vault1051159997aa691b9f.vault.azure.net/keys/cert-name/822dcdd2168643db9199d2588aa07611","sid":"https://vault1051159997aa691b9f.vault.azure.net/secrets/cert-name/822dcdd2168643db9199d2588aa07611","x5t":"11jJj-gZfwLMdZD1NhBqmbCK644","cer":"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","attributes":{"enabled":true,"nbf":1567638786,"exp":1630797786,"created":1567639386,"updated":1567639386,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639369,"updated":1567639369}},"pending":{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2487'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:14 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"tags": {"foo": "updated tag"}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['32'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/822dcdd2168643db9199d2588aa07611","kid":"https://vault1051159997aa691b9f.vault.azure.net/keys/cert-name/822dcdd2168643db9199d2588aa07611","sid":"https://vault1051159997aa691b9f.vault.azure.net/secrets/cert-name/822dcdd2168643db9199d2588aa07611","x5t":"11jJj-gZfwLMdZD1NhBqmbCK644","cer":"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","attributes":{"enabled":true,"nbf":1567638786,"exp":1630797786,"created":1567639386,"updated":1567639395,"recoveryLevel":"Recoverable+Purgeable"},"tags":{"foo":"updated + tag"},"policy":{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639369,"updated":1567639369}},"pending":{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2516'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:14 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997aa691b9f.vault.azure.net/deletedcertificates/cert-name","deletedDate":1567639395,"scheduledPurgeDate":1575415395,"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/822dcdd2168643db9199d2588aa07611","kid":"https://vault1051159997aa691b9f.vault.azure.net/keys/cert-name/822dcdd2168643db9199d2588aa07611","sid":"https://vault1051159997aa691b9f.vault.azure.net/secrets/cert-name/822dcdd2168643db9199d2588aa07611","x5t":"11jJj-gZfwLMdZD1NhBqmbCK644","cer":"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","attributes":{"enabled":true,"nbf":1567638786,"exp":1630797786,"created":1567639386,"updated":1567639395,"recoveryLevel":"Recoverable+Purgeable"},"tags":{"foo":"updated + tag"},"policy":{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639369,"updated":1567639369}},"pending":{"id":"https://vault1051159997aa691b9f.vault.azure.net/certificates/cert-name/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2666'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:14 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_list_operations.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_list_operations.yaml new file mode 100644 index 000000000000..7e2d25e4ebd0 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_list_operations.yaml @@ -0,0 +1,595 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:45 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d29a1f6dc6204d579ef93f6bdb757b12"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:46 GMT'] + expires: ['-1'] + location: ['https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending?api-version=7.0&request_id=d29a1f6dc6204d579ef93f6bdb757b12'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d29a1f6dc6204d579ef93f6bdb757b12"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:46 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw/vZs8JBirAkEGLvD3eYEgnerjyBXvE3JvWbcqIsm87D82XaLPM8mGLMitse/0kZBa6zUH7d8JsdqeZkO9BHrG7sayBoSOALG6oAze8TH11x4nkhcSQFG7ZGH3BuN5XzS/f4D/P6aLhCLrwpB8QnqiqO5fuJiF/E6NXnXKNKo40pOLKRyRYBHUtbbD5g48o6BjPNnrnJ/2AhIo6q0lD/rl9sOi5uxJ1IwKMZ9sPdvhPClvGF0U4atCsJIRiVAs+Ouev0yxVpoqxvDH15sT6+VgN5dmzOffsHwEpbdlKpomKV8Ez5AvrkdThtyhU/alEI8LSr4T6sXFov5sMR77UchwIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAIqXFdPxvO4dqgjKCz5dY6sVZBxTFsvI3WCAscg05lkq1CdVI0RrDKRL+vXHqAZfZSEVCbR01t/KrmnpjibDSIYvjL6rYYJhJaqERG+HAu842nm9FPkErBCmcA7pD1yWURwBfybS+PMxJ5huq1h2cz/jSiKq4dCFXzHIEYam6oQwksc5r1npOmA9WNQJDWYwbnhhhPd2yVbr2F2K7UiZ3EO+iEpp5wkvxtju/QWR20FTKxTi6ldm5aFoF62sHQPLqxDneBlFlEmPlaSzr49nndjlWNJDIsgwWe4knmogRX1FK0AzgbUZdkB+p1axi8tr9o5gmkklWUH5/lI8JO6Xbqw=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d29a1f6dc6204d579ef93f6bdb757b12"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:20:56 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d29a1f6dc6204d579ef93f6bdb757b12"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:07 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw/vZs8JBirAkEGLvD3eYEgnerjyBXvE3JvWbcqIsm87D82XaLPM8mGLMitse/0kZBa6zUH7d8JsdqeZkO9BHrG7sayBoSOALG6oAze8TH11x4nkhcSQFG7ZGH3BuN5XzS/f4D/P6aLhCLrwpB8QnqiqO5fuJiF/E6NXnXKNKo40pOLKRyRYBHUtbbD5g48o6BjPNnrnJ/2AhIo6q0lD/rl9sOi5uxJ1IwKMZ9sPdvhPClvGF0U4atCsJIRiVAs+Ouev0yxVpoqxvDH15sT6+VgN5dmzOffsHwEpbdlKpomKV8Ez5AvrkdThtyhU/alEI8LSr4T6sXFov5sMR77UchwIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAIqXFdPxvO4dqgjKCz5dY6sVZBxTFsvI3WCAscg05lkq1CdVI0RrDKRL+vXHqAZfZSEVCbR01t/KrmnpjibDSIYvjL6rYYJhJaqERG+HAu842nm9FPkErBCmcA7pD1yWURwBfybS+PMxJ5huq1h2cz/jSiKq4dCFXzHIEYam6oQwksc5r1npOmA9WNQJDWYwbnhhhPd2yVbr2F2K7UiZ3EO+iEpp5wkvxtju/QWR20FTKxTi6ldm5aFoF62sHQPLqxDneBlFlEmPlaSzr49nndjlWNJDIsgwWe4knmogRX1FK0AzgbUZdkB+p1axi8tr9o5gmkklWUH5/lI8JO6Xbqw=","cancellation_requested":false,"status":"completed","target":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0","request_id":"d29a1f6dc6204d579ef93f6bdb757b12"}'} + headers: + cache-control: [no-cache] + content-length: ['1265'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:16 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"7cf6e662e3ec4324b177dd00993617ca"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:22 GMT'] + expires: ['-1'] + location: ['https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending?api-version=7.0&request_id=7cf6e662e3ec4324b177dd00993617ca'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkuyd3DpY9VNYX//fbMAtMigr2bJxHcg8npeNs2yKYWecZeZg0pHTTDXTDu8lrRk3FgEiawt5r2CpktpU61HV8+mEQdBWS6SIlia7HRkUENiHuIhUuqhZPLFF4zCCsA+Frvqa1gH7ymktlEBA2Wlvx7a1zFHIIGLkAq/DZ6ovevYzNxNTw3bnCo2dbMUX9opS1g8M+cd0z71UTDvHdQoo162maHzXHygkMCt9RbfB0ZNUECPHk1v6MgrKAMRsNtIivwhFNcfdNG3qh/fWg71pwaS9WVTyk6huBg30axkCc6XYyL/2KGduuMCGA8uoX3mY52W+hYDzoYptkuQt7tH2ywIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAC0BZPsZYZ3PuPUZVBKGVNIyX7FVIgMfTzjIAsIB+D6TuDqj+hxq4Kl2tAYIn0vu5QdivqW0IbzL9fBAKYx4st3ZZU44EpgrbVGTA/jWc2Mk4YhODQWOIbsvbkjK4t5dXVUSbAVoru4CqBV9X5JetBTXpHOkRbB+wY/qeF5+xaD2LGXGpbUlSaIbi1GC9pncl9yNZMxbe/aqk8Wn0V2EMgot78dk29I9SRDhG5SHKhgfjg4hnWyMh6LScFD6bHu1X0P0boZm0M/qAr3NasDnmVLWsh2qvG/+Aa+BelC0jy/s5RKzJyeVwJRgyHkwfhGFZXoL9/AsczdzBhfTjVXLbl0=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"7cf6e662e3ec4324b177dd00993617ca"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:22 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"7cf6e662e3ec4324b177dd00993617ca"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:32 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"7cf6e662e3ec4324b177dd00993617ca"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:42 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1","request_id":"7cf6e662e3ec4324b177dd00993617ca"}'} + headers: + cache-control: [no-cache] + content-length: ['1265'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:52 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate2/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate2/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoyrXPBUFWQJjNdqqct2WiDzNWasqL62ica2OoSqrIyOsJqa6JgZ48z+gMZFLSmy3XfAxZf73+XYjsoHbKg3FxI6d4C/3N7AlGxjsD1H9Bd5YnIYqbOYeO6/hKUP9aAUToP0hwUq5P4aW0h9eCMglkbh5I3caVhfdqdKIG6Lm4hhskkpVAAI5kw/o7AU9e5QYlS4pFeLK6nQUEdxSEUzxPVrcI2R6rD8ZaP8hBr9V8vVNaWePieWPTCwva/vdwVspX73YPNNn7Ia49H0+g+CsZpBohDtnqEZOElDDhAsPpN2fA2Wb33sCWbo3X1+Z3hedfg/6DLrA+1lLBmseGfLtBQIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAGBPiXPhInxRQ6CFi87HqtHYxK8HWsmxz4/6g4wA51z07K3CV/1VzCv3EQ4ePJeJwoHAi5lrdzGuztXKmBOc6s5JuXrSTc7aaWYCKnWsHrp6T6ALdBxJby/iNvEtlu0VGvdVR2WIFFWavesWqq+xxhmt7M+aSqh49ggnppOinSF3Gb0PmJk285PBqX8CngO2GPY+1oVj+zKRX3mD+6bD2yZUje+OlZVI0AJ7ura1cdjXLnlF2Kz73q3ENs5MnlKNbm2Wih0CGIrc2a9bQBzRWoSb9XGqvfIGt+Xa256D5nNDbcsRL1MhwlhMnaasxsOUwwdHgm400q8c9zpMLxzZw+o=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"8cfc8ed5e7514f0e8e86e534824528a7"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:59 GMT'] + expires: ['-1'] + location: ['https://vault1051159997ab181bad.vault.azure.net/certificates/certificate2/pending?api-version=7.0&request_id=8cfc8ed5e7514f0e8e86e534824528a7'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate2/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate2/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"8cfc8ed5e7514f0e8e86e534824528a7"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:21:59 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate2/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate2/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate2","request_id":"8cfc8ed5e7514f0e8e86e534824528a7"}'} + headers: + cache-control: [no-cache] + content-length: ['1265'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:09 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate3/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate3/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"6168cbbf3132427ebb58733b33053b39"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:14 GMT'] + expires: ['-1'] + location: ['https://vault1051159997ab181bad.vault.azure.net/certificates/certificate3/pending?api-version=7.0&request_id=6168cbbf3132427ebb58733b33053b39'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate3/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate3/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"6168cbbf3132427ebb58733b33053b39"}'} + headers: + cache-control: [no-cache] + content-length: ['1345'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:15 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate3/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate3/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate3","request_id":"6168cbbf3132427ebb58733b33053b39"}'} + headers: + cache-control: [no-cache] + content-length: ['1265'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:25 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates?api-version=7.0 + response: + body: {string: '{"value":[{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate0","x5t":"H7T5ljuzfmLSIIGUCCHw233CrvU","attributes":{"enabled":true,"nbf":1567638671,"exp":1630797671,"created":1567639271,"updated":1567639271},"subject":""},{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate1","x5t":"k9ypNWus2FU5yXpj2Vl0PBmyQ68","attributes":{"enabled":true,"nbf":1567638710,"exp":1630797710,"created":1567639310,"updated":1567639310},"subject":""},{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate2","x5t":"rx9IzQ79gm5lpRHOVHOEAQ8LAPE","attributes":{"enabled":true,"nbf":1567638725,"exp":1630797725,"created":1567639325,"updated":1567639325},"subject":""},{"id":"https://vault1051159997ab181bad.vault.azure.net/certificates/certificate3","x5t":"1QeKj1ZSK1-2yOG2ihL-NzDAH0s","attributes":{"enabled":true,"nbf":1567638742,"exp":1630797742,"created":1567639342,"updated":1567639342},"subject":""}],"nextLink":null}'} + headers: + cache-control: [no-cache] + content-length: ['979'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/certificates/certificate-name/versions?api-version=7.0 + response: + body: {string: '{"value":[],"nextLink":null}'} + headers: + cache-control: [no-cache] + content-length: ['28'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997ab181bad.vault.azure.net/deletedcertificates?api-version=7.0 + response: + body: {string: '{"value":[],"nextLink":null}'} + headers: + cache-control: [no-cache] + content-length: ['28'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:22:30 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_recover.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_recover.yaml new file mode 100644 index 000000000000..0f60d2314c0f --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates.test_example_certificate_recover.yaml @@ -0,0 +1,460 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: + cache-control: [no-cache] + content-length: ['87'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:25 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + www-authenticate: ['Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"'] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 401, message: Unauthorized} +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["onedrive.microsoft.com", + "xbox.microsoft.com"]}, "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['329'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"18804d3ecd5c4a35920f2ceaf41063c5"}'} + headers: + cache-control: [no-cache] + content-length: ['1378'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:26 GMT'] + expires: ['-1'] + location: ['https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending?api-version=7.0&request_id=18804d3ecd5c4a35920f2ceaf41063c5'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 202, message: Accepted} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"18804d3ecd5c4a35920f2ceaf41063c5"}'} + headers: + cache-control: [no-cache] + content-length: ['1378'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:26 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"MIIC4zCCAcsCAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvadkVDO/6FQraj8A2hr+NdA6vmH7UiG/HTSEWZnF+v5P3Tt5WVMycbtwqjUfMw1eWf/h5bkTMsQrrs9zh6TNVQj2kPI5noiVwsDcXa2cInWxrvctkr40r/YGFDD3ODeFC3NKpkGHjzvztmlefwY3QYxrPTrG/6gAho30TK/iYmwZ0udAGMVoLewEj34DqPJzhXIq0f5ynO5W6AeIgmKmTZ1JuefTCLqPcuwhve8VIF7m6TgeaTerKUjQQpN/G0zPsYhkCqt7ojY7WSZ8iMIngCcGdzdRVsu5euszVZ4SCI47zWPjBe7bps140Mz27lzJQhYgrGXe2w2PRD17UQyj8wIDAQABoIGDMIGABgkqhkiG9w0BCQ4xczBxMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwNQYDVR0RBC4wLIIWb25lZHJpdmUubWljcm9zb2Z0LmNvbYISeGJveC5taWNyb3NvZnQuY29tMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBADZD7k2bHrtOMn6SahY9RBBCt7ltGh6pS7rKEe1is+nYxvUmc0QviAcfkOeq8haBmWr7mvqkQOXWcSyyuiK43epJF6Zev2eb3wZCR7+W6/JTWBZEc7CpBdiApfZoysb1SDeW/xxAQmbj7pr7bs/QjPcNCGXWYb7iKqxySs+p9gBslSY2QTvUeMLSCMlnq8l4aTNlaGGFiUlOZvETomH4tp95RqnHOtqowt0p0OLLQoFV+BJCHtG1H6Y09bnuXK+LNdVEfCZaKxP/d8OJw420dNDJkBSCleJmq60+PUVauUg/TvQFDu0j5Ajjz+HNmbcIxZlhWaYjv/gIOfd6fnvqQKA=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"18804d3ecd5c4a35920f2ceaf41063c5"}'} + headers: + cache-control: [no-cache] + content-length: ['1378'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:37 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name","request_id":"18804d3ecd5c4a35920f2ceaf41063c5"}'} + headers: + cache-control: [no-cache] + content-length: ['1295'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:46 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name","deletedDate":1567639432,"scheduledPurgeDate":1575415432,"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/9c02252a238d46009dc6943be7ac38d7","kid":"https://vault1051159997d99a1844.vault.azure.net/keys/cert-name/9c02252a238d46009dc6943be7ac38d7","sid":"https://vault1051159997d99a1844.vault.azure.net/secrets/cert-name/9c02252a238d46009dc6943be7ac38d7","x5t":"PR_U7x-xOxSCp32TE5kLXY3I-Ac","cer":"MIIDczCCAlugAwIBAgIQYTmUg0kxSyKZvniqUaf7HzANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wHhcNMTkwOTA0MjMxMzM4WhcNMjEwOTA0MjMyMzM4WjAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9p2RUM7/oVCtqPwDaGv410Dq+YftSIb8dNIRZmcX6/k/dO3lZUzJxu3CqNR8zDV5Z/+HluRMyxCuuz3OHpM1VCPaQ8jmeiJXCwNxdrZwidbGu9y2SvjSv9gYUMPc4N4ULc0qmQYePO/O2aV5/BjdBjGs9Osb/qACGjfRMr+JibBnS50AYxWgt7ASPfgOo8nOFcirR/nKc7lboB4iCYqZNnUm559MIuo9y7CG97xUgXubpOB5pN6spSNBCk38bTM+xiGQKq3uiNjtZJnyIwieAJwZ3N1FWy7l66zNVnhIIjjvNY+MF7tumzXjQzPbuXMlCFiCsZd7bDY9EPXtRDKPzAgMBAAGjgbQwgbEwDgYDVR0PAQH/BAQDAgWgMAkGA1UdEwQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMDUGA1UdEQQuMCyCFm9uZWRyaXZlLm1pY3Jvc29mdC5jb22CEnhib3gubWljcm9zb2Z0LmNvbTAfBgNVHSMEGDAWgBRBlRMz7GQ/C0sepJyWz2KWCM/HYzAdBgNVHQ4EFgQUQZUTM+xkPwtLHqScls9ilgjPx2MwDQYJKoZIhvcNAQELBQADggEBAEX/DeDQlVXzpgXvzFyGv8e7UKwLtuiVqsSSjAfvC32MiuKGWorg2zZOh/AcOjyFJE9UVezJbMxTy2KNBN1sDpFfTo6ORJrM3bP3694y/u2qOzwMNlg48JaMxU8ZwKuahb+71a6iYM0HABK9Ayhu2Mm0dAEL+s4yd+efuiHHgQ3QsxlaRXh8cTeGSCZBUSaoRmNXQ3nqZyHMw6H0HvzVGoh5sLiT/QNNj/F7vbozH2VnZ05Unb5zvsNITl3gb2clrcHvV/RSagc7dHq1JMfAeZ2Xam61Daeq/hrqMYAoLmj+47UOipMTT9e9FU7ueAs4VG4mZsVslABhodhYishKqHQ=","attributes":{"enabled":true,"nbf":1567638818,"exp":1630797818,"created":1567639418,"updated":1567639418,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639406,"updated":1567639406}},"pending":{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2637'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:51 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: + cache-control: [no-cache] + content-length: ['93'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:51 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: + cache-control: [no-cache] + content-length: ['93'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:55 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: + cache-control: [no-cache] + content-length: ['93'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:23:58 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: + cache-control: [no-cache] + content-length: ['93'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:24:01 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: + cache-control: [no-cache] + content-length: ['93'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:24:04 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: + cache-control: [no-cache] + content-length: ['93'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:24:07 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: + cache-control: [no-cache] + content-length: ['93'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:24:10 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 404, message: Not Found} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name","deletedDate":1567639432,"scheduledPurgeDate":1575415432,"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/9c02252a238d46009dc6943be7ac38d7","kid":"https://vault1051159997d99a1844.vault.azure.net/keys/cert-name/9c02252a238d46009dc6943be7ac38d7","sid":"https://vault1051159997d99a1844.vault.azure.net/secrets/cert-name/9c02252a238d46009dc6943be7ac38d7","x5t":"PR_U7x-xOxSCp32TE5kLXY3I-Ac","cer":"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","attributes":{"enabled":true,"nbf":1567638818,"exp":1630797818,"created":1567639418,"updated":1567639418,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639406,"updated":1567639406}},"pending":{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2637'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:24:13 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name","deletedDate":1567639432,"scheduledPurgeDate":1575415432,"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/9c02252a238d46009dc6943be7ac38d7","kid":"https://vault1051159997d99a1844.vault.azure.net/keys/cert-name/9c02252a238d46009dc6943be7ac38d7","sid":"https://vault1051159997d99a1844.vault.azure.net/secrets/cert-name/9c02252a238d46009dc6943be7ac38d7","x5t":"PR_U7x-xOxSCp32TE5kLXY3I-Ac","cer":"MIIDczCCAlugAwIBAgIQYTmUg0kxSyKZvniqUaf7HzANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wHhcNMTkwOTA0MjMxMzM4WhcNMjEwOTA0MjMyMzM4WjAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9p2RUM7/oVCtqPwDaGv410Dq+YftSIb8dNIRZmcX6/k/dO3lZUzJxu3CqNR8zDV5Z/+HluRMyxCuuz3OHpM1VCPaQ8jmeiJXCwNxdrZwidbGu9y2SvjSv9gYUMPc4N4ULc0qmQYePO/O2aV5/BjdBjGs9Osb/qACGjfRMr+JibBnS50AYxWgt7ASPfgOo8nOFcirR/nKc7lboB4iCYqZNnUm559MIuo9y7CG97xUgXubpOB5pN6spSNBCk38bTM+xiGQKq3uiNjtZJnyIwieAJwZ3N1FWy7l66zNVnhIIjjvNY+MF7tumzXjQzPbuXMlCFiCsZd7bDY9EPXtRDKPzAgMBAAGjgbQwgbEwDgYDVR0PAQH/BAQDAgWgMAkGA1UdEwQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMDUGA1UdEQQuMCyCFm9uZWRyaXZlLm1pY3Jvc29mdC5jb22CEnhib3gubWljcm9zb2Z0LmNvbTAfBgNVHSMEGDAWgBRBlRMz7GQ/C0sepJyWz2KWCM/HYzAdBgNVHQ4EFgQUQZUTM+xkPwtLHqScls9ilgjPx2MwDQYJKoZIhvcNAQELBQADggEBAEX/DeDQlVXzpgXvzFyGv8e7UKwLtuiVqsSSjAfvC32MiuKGWorg2zZOh/AcOjyFJE9UVezJbMxTy2KNBN1sDpFfTo6ORJrM3bP3694y/u2qOzwMNlg48JaMxU8ZwKuahb+71a6iYM0HABK9Ayhu2Mm0dAEL+s4yd+efuiHHgQ3QsxlaRXh8cTeGSCZBUSaoRmNXQ3nqZyHMw6H0HvzVGoh5sLiT/QNNj/F7vbozH2VnZ05Unb5zvsNITl3gb2clrcHvV/RSagc7dHq1JMfAeZ2Xam61Daeq/hrqMYAoLmj+47UOipMTT9e9FU7ueAs4VG4mZsVslABhodhYishKqHQ=","attributes":{"enabled":true,"nbf":1567638818,"exp":1630797818,"created":1567639418,"updated":1567639418,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639406,"updated":1567639406}},"pending":{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2637'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:24:13 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +- request: + body: null + headers: + Accept: [application/json] + Accept-Encoding: ['gzip, deflate'] + Connection: [keep-alive] + Content-Length: ['0'] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault1051159997d99a1844.vault.azure.net/deletedcertificates/cert-name/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/9c02252a238d46009dc6943be7ac38d7","kid":"https://vault1051159997d99a1844.vault.azure.net/keys/cert-name/9c02252a238d46009dc6943be7ac38d7","sid":"https://vault1051159997d99a1844.vault.azure.net/secrets/cert-name/9c02252a238d46009dc6943be7ac38d7","x5t":"PR_U7x-xOxSCp32TE5kLXY3I-Ac","cer":"MIIDczCCAlugAwIBAgIQYTmUg0kxSyKZvniqUaf7HzANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wHhcNMTkwOTA0MjMxMzM4WhcNMjEwOTA0MjMyMzM4WjAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9p2RUM7/oVCtqPwDaGv410Dq+YftSIb8dNIRZmcX6/k/dO3lZUzJxu3CqNR8zDV5Z/+HluRMyxCuuz3OHpM1VCPaQ8jmeiJXCwNxdrZwidbGu9y2SvjSv9gYUMPc4N4ULc0qmQYePO/O2aV5/BjdBjGs9Osb/qACGjfRMr+JibBnS50AYxWgt7ASPfgOo8nOFcirR/nKc7lboB4iCYqZNnUm559MIuo9y7CG97xUgXubpOB5pN6spSNBCk38bTM+xiGQKq3uiNjtZJnyIwieAJwZ3N1FWy7l66zNVnhIIjjvNY+MF7tumzXjQzPbuXMlCFiCsZd7bDY9EPXtRDKPzAgMBAAGjgbQwgbEwDgYDVR0PAQH/BAQDAgWgMAkGA1UdEwQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMDUGA1UdEQQuMCyCFm9uZWRyaXZlLm1pY3Jvc29mdC5jb22CEnhib3gubWljcm9zb2Z0LmNvbTAfBgNVHSMEGDAWgBRBlRMz7GQ/C0sepJyWz2KWCM/HYzAdBgNVHQ4EFgQUQZUTM+xkPwtLHqScls9ilgjPx2MwDQYJKoZIhvcNAQELBQADggEBAEX/DeDQlVXzpgXvzFyGv8e7UKwLtuiVqsSSjAfvC32MiuKGWorg2zZOh/AcOjyFJE9UVezJbMxTy2KNBN1sDpFfTo6ORJrM3bP3694y/u2qOzwMNlg48JaMxU8ZwKuahb+71a6iYM0HABK9Ayhu2Mm0dAEL+s4yd+efuiHHgQ3QsxlaRXh8cTeGSCZBUSaoRmNXQ3nqZyHMw6H0HvzVGoh5sLiT/QNNj/F7vbozH2VnZ05Unb5zvsNITl3gb2clrcHvV/RSagc7dHq1JMfAeZ2Xam61Daeq/hrqMYAoLmj+47UOipMTT9e9FU7ueAs4VG4mZsVslABhodhYishKqHQ=","attributes":{"enabled":true,"nbf":1567638818,"exp":1630797818,"created":1567639418,"updated":1567639418,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["onedrive.microsoft.com","xbox.microsoft.com"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639406,"updated":1567639406}},"pending":{"id":"https://vault1051159997d99a1844.vault.azure.net/certificates/cert-name/pending"}}'} + headers: + cache-control: [no-cache] + content-length: ['2487'] + content-type: [application/json; charset=utf-8] + date: ['Wed, 04 Sep 2019 23:24:13 GMT'] + expires: ['-1'] + pragma: [no-cache] + server: [Microsoft-IIS/10.0] + strict-transport-security: [max-age=31536000;includeSubDomains] + x-aspnet-version: [4.0.30319] + x-content-type-options: [nosniff] + x-ms-keyvault-network-info: [addr=131.107.160.72;act_addr_fam=InterNetwork;] + x-ms-keyvault-region: [westus] + x-ms-keyvault-service-version: [1.1.0.876] + x-powered-by: [ASP.NET] + status: {code: 200, message: OK} +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_backup_restore.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_backup_restore.yaml new file mode 100644 index 000000000000..a4b0a7c0806e --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_backup_restore.yaml @@ -0,0 +1,189 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:45 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599973b4b1da4.vault.azure.net, + /certificates/cert-name/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d31f5baa920742408706b6b20d45eefb"}'} + headers: + cache-control: no-cache + content-length: '1342' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:21:46 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '3', b, '4', b, '1', d, a, '4', ., v, a, u, l, t, + ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, c, + e, r, t, '-', n, a, m, e, /, p, e, n, d, i, n, g, '?', a, p, i, '-', v, e, + r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, t, _, i, d, '=', d, + '3', '1', f, '5', b, a, a, '9', '2', '0', '7', '4', '2', '4', '0', '8', '7', + '0', '6', b, '6', b, '2', '0', d, '4', '5', e, e, f, b] + pragma: no-cache + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599973b4b1da4.vault.azure.net, + /certificates/cert-name/create, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d31f5baa920742408706b6b20d45eefb"}'} + headers: {cache-control: no-cache, content-length: '1342', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:46 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599973b4b1da4.vault.azure.net, + /certificates/cert-name/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"d31f5baa920742408706b6b20d45eefb"}'} + headers: {cache-control: no-cache, content-length: '1342', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:57 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599973b4b1da4.vault.azure.net, + /certificates/cert-name/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name","request_id":"d31f5baa920742408706b6b20d45eefb"}'} + headers: {cache-control: no-cache, content-length: '1259', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:22:07 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599973b4b1da4.vault.azure.net, + /certificates/cert-name/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/backup?api-version=7.0 + response: + body: {string: '{"value":"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"}'} + headers: {cache-control: no-cache, content-length: '43147', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:22:12 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599973b4b1da4.vault.azure.net, + /certificates/cert-name/backup, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/3d33352494c14db39d79f293db4d4cfe","kid":"https://vault10511599973b4b1da4.vault.azure.net/keys/cert-name/3d33352494c14db39d79f293db4d4cfe","sid":"https://vault10511599973b4b1da4.vault.azure.net/secrets/cert-name/3d33352494c14db39d79f293db4d4cfe","x5t":"P58y5M_Ly32q8xqMyWxJXIbDmH8","cer":"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","attributes":{"enabled":true,"nbf":1567638725,"exp":1630797725,"created":1567639325,"updated":1567639325,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639307,"updated":1567639307}},"pending":{"id":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/pending"}}'} + headers: {cache-control: no-cache, content-length: '2417', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:22:12 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599973b4b1da4.vault.azure.net, + /certificates/cert-name, api-version=7.0, ''] +- request: + body: '{"value": "JkF6dXJlS2V5VmF1bHRLZXlCYWNrdXBWMS5taWNyb3NvZnQuY29tZXlKcmFXUWlPaUkwTXpnMVlqQTNZaTFrTlRRM0xUUXlaVFV0WVdVNVpTMDJNVEJrWXpNNVpHWmhaamdpTENKaGJHY2lPaUpTVTBFdFQwRkZVQ0lzSW1WdVl5STZJa0V4TWpoRFFrTXRTRk15TlRZaWZRLnBaNmd5aXp6MGtjZ2ZrZHd1eXQwRElJYlMxMXotWnUwWWhTZ2ZKYkVSRWhDTExLeEkxYmNZZGltalVaV1BtNWZjMm1QX2htZzBMQjVHVm1jQVJFT3JvdkdQR2dYVWMxLVF2TzBrMUZxRW41Z3h6V0RVQ1ZkR0tTR0ZLVHJOYkQ3R1RiZUJZUVVTNWdSNTlhYl83R3psSnc0dml0eVQybVVzbFJwamN2TmRFYzN2dkVuc1RFcTZDQllINmZQVWp3a1pDRnpiRzBRYlp1VDMzM3ZGUndjQm5JMUFIUFRpbzFhU01wa0pwUGZEbE5lOEp3eWNDN2VybVp0LVh2bTRVWHRrNS12N1lvbWdrVFZfVGlBUk1CaUtnTEo5eWdoY2hYUUU0YVR3MXNzUzZiMW12WThLVjlZdUlSaWNEMFJRQ1BQU1lOYWlhX0dNM2FsaE90cXdnX0cyZy4zT3pvWDQxeU1RMVA1TXY0UVNlSWhRLkpLQVF2eklWeUVJc2NsXzRvMGF2Y05UV0hJOUNnRUJyeng0Zld1cG1PT0FaLU8tc0hDUXBWR0VzZUh3MUZWUU44Q2JLZHpNNG05aHB0NzdwZTNOMC1Xd2hNMFh4Qi1DVnBScmNKVm0ySnVvWm9JS1JsZ1N0LWpPa1RQSldBZ0JaOGtNM212dmcxbjZhYXY1RHMxOTNEdTBpUzZjNVpCTHgzRWs3NEpSS0N5cVF4ZWZVUzlEREc1R1gyUFVnODN3ajBPM1V3YnJONUlvQXMyRi1xTVFjWFRFLTZISFVmSUo3d1AtWGNWWWd0OEx2OHYxUlY2S3ZvNnR3cjdSaXhuYnlELThtSkNyYWVLTHU2QWxEOGRVMXI0NTBCMVRndWRXT3Y4QXFadm9ha21iNks1QWs4SU5oa1pTZ1ZCSTFnbUJmdjA3Zm1rVmNzcEdMYnBodGNjTlNLMVBjbUlmLWxMSUhSWTRqT01mWGtKQ1RqcDFqVXlmY1JSRjNqdVpPNDVIemZrUHF4STV3cVFLTVhuTTl0S0o0Z2FXMEZQOE13M01DZjlVQ1hLd1NiZ01CXzZsWHR4ZGRkb0ptUi1FSmVYREI0OFFIRHh1YzdCcDA4WUpEY3gyQlU1X2YybW9VUjJHdExkckQySVNZV05la0RfazN6NlVjYmlJUzVlcWlJYWtBRFlXaHc0WUxOSGdRTWl4bDVNSHJ0Q1dtR2VpdU9zQ2NOc3BrREJXeDg2LVBDYlBySm82dWtXcHN0SHFjTTcyeVVLMEsxWklUTHhWQ3Vvd1luVVgtQjhlSmlHRFB5dE13Zk9NTjBsbHJNcExYOGFDdlpKUkhtZllHTGNRdE9VX0hQMGVzVVlhbFp5MWV0bWdYVm5UTUg5a2d1dmN3QWs1N0JzaGVsQkVkaGN6N3pxMmw4eTBGY2RhZGo0UzRRbmdDOHRhWG42cnM4QnFNTDZHNHZlVnlNOUpJVmJLTDRTc3dDZXZweHR2dzl2bXRUZ3NyQl90ck54TmJuMGp3blJ5NXpoOFNGODBWdGNfbVNDSWxySE5GSkNUMk9HRTRiZ0k3Tldfa3FVT0ZBSjZWeTNkNkFROFpJeXRfRmFNbHJnb3hmUENVYzFRdEdna2hUOG5aUGZjU3E0aXh2aGxpWEs3SlUwV3l4S213WWVjZDFkNFBnMkxVY0wwR0pVQkVoZHNsR2F2NmFpd1pJVHVTWkUydUJvTjROTWtTNmV2QnYyWHNqS3pxSnJrM3ZOdWEwZ09meWNqS0tacm5LWHlRZFdkbkRNMEwzT1NxNlJ0TG80Vi0wTDBQdDNQczU4NWNGdnlwbno2aGtiV043RDFDX1lrUVNDM21hOG1HYzlpU0txUkd6Q3FKYXV0d0FDRURLMWl4Q0Noc01aQWdKN0JONUdzMXpISno5V0RKX0JZYi1sWUVBOVluYy1XWm0xTDE2ckFDQmVxaG1qbUU4LTkydm5ZZ1BGYlBxcGs4bkhnQ2ozQjlrU0ZCNVV2ZERjWmxzYURMdXpwdEVqUmliZFdFcFRWNm80NEtCTEN5X2VpR09vMy1zbWNHalB4RzZjWkdaeUgxTVo4cjhoZVNqYkNoU2o1UDBBbHcxUVhxRWg5N3NQdTdDSTUzVE1QYmtmb1Rab0JMMER1a3hDbUdvODdaM1pyVGo5aG5pM1ZWeGhDOXRWLTZEMzVMUll1ZzFDUThwUVBndkh4Z3ZiQTNBd0kyZmdxZnRKUlNGY3BjWlpvTlB6ckVnLVlwT1dFd0VIRGxrUnhwQ09MVkxsNlU5MWtUXzhmX1MzY3paNEZUUThhc1hocHE2ZFpOSVZzUTB3S1Y5Tm42aG4yeFZ2empvbXVkMUtYYk9uUlFoOW1zMGpjZDlhd216RzV6TERxSm44Z1JZTHUwQlMwTVpyTnh5SlJLNVg0N2VYSFROZW1sNmJ1YW1tSC1hV0FpNDVpSkxLVk02ckpYaEFMUmVjQzBfNmhBSmJGdjhpSUZaNUIyNTVrYnNLV2JvQUdEU3BXZF9lR3RBNUt6cS1sQmtUblRPSkVmOEVBazJhLU1JdnpxMFVQMjREcHdlVzBTMnNXSGhfY2VkREZWdW5nQkYxcUJtQ3ZtbkJnYUFPb0ZBX0UzaHoteDZOTGJhbjBPMExQMjlCQ0E5MU92UG9DeHphRnhlYUF4SzZNazBxRDJ4NnlYUDVPX1FYYUZoVUlpRHNCVDByS04yS1FGc3NsWFJ4bGVMN1pJLUtVbnpXWHExTzJVWXJkelc3VUpJLVdmNFR2aTVTOFhiZUJkV3MxOGVINUZoS3gxU3ltZDVzUzRMbjBWS2tZa3gwVXhEMkVFWjhRU2hyNmN4NjRpUmFmMEVlYVpUTXFHUVhpMlRqbTFoZHRjZmY3ZFNmM0UxWDh6bXp3a0E2ZzlUTXEzbXdHZWJGSDdDckxzbWFwTUxNcnh5YzdVVG5MWFBCUnpxQk11dF9aMko0dWRyTVpNRnFETjl2VnVnUWttQm5EeDZqV3oxNldyX25CM1hFSUx6WWtfdXFrU2hPQ0VpQm5wcEtyanREbWo4bklhSklUbEJKeFhSUUpIMHhLZG50RWFsczdVRDRjWW1FeUNldEJqVnhpNzFjT1lMclprWHhaWmk2VnNBbVhmdlN4WmNvS2N6T2ROZUtUVW9Yc1F4d1BKVEs2b2dsN0w4bzV5Rl9CMVRUU0lMS01CQy1ONEEtYi1DQXdZdEd4aEpjeFBKeXZ1bFRsRnhqTndDVC02c0plX3pheW41U1VhNm5RMjU4TDdaX0lTcVlTeFBuZjFNeFBsZWs1ZlJSNTUxVml4bV9OeFpJdWdTdXpLVl9mX3RMN2FnR0NOZk9hM19iYk5FM0VDLTdORGQxWmhSTktkZ1g2aEl2QWRhN0ZCcjl2blJJWnc3YmVuREN0ZE1IbkMwMHpua2lRY3g3MW4xUWVwR29vQU8zRmI2SFhjSFhCUXc5U3VnZzAtME5OOWtTalFHQXN0M2xwbUhtd2gxZ05qWURtekIzMlVURGQ5RWdVNFJZelZjbFRncEJFRTZqX21sV3VPem0wd1JMMndObURWN2hSSkVqRnJuTnI2Sy16ZnREamVaWlZCcXc5QTFqUk43bXBJTTNVaktPMU9zcV9MejBMdEYwQmllbHRONW9wQS1jZC1ZcmFGOXhidWlzV2NtLWNISWJndkhuV0VTM3lxZ2pkVVpYb0pqNWVTa3VPdFJDR1dFSGM0ME9UVzBvQnVtOEc1YVRtM2lIemUtTXlPRmliMnFKTXl5cDJCWHlNNElBczVtc0dEbTFqOUhOT0h0T0dCMGkxbEpuQ3JPQ3lzNXpweUtnOXpXb2dVMmVVMk9IWVcwRHdUbXZqWnZnRXEwc1BOaEh1c0c0bVY2YVVXUFhXdXNLU2JGZmRoTEF2YjBJWjJDcDdPcHNsQ1NhZmNQajBCNVAtN01RT1llcHVWZU1mZnVaZmhkbEtlanc1cmt2NHM5UTJRbVhFZm5XSm9oQjlaczhSaVNqcW5jSmwwSWowYjBMV2NLN1ZKQlRVb3hIMFNiQzFhN3o0dEtFdC15VjBYR190MmhGRVhCajZhV2RjUllDOTBsd3pSRThHVkxCeml6d2pQVXIzUDNrQk5aVFI4eHU0ZEp0amJjMDBfbGx6aGR0STBCRmF1ZXhIcHVRSEJqaWwtdi1sclBpQm1sZGloWHUtWUFwM1pBTzRuQklZbHVDRzg3NF9yaDdsZzhMUG1MZml5d2xMc2RFeTY0NWVBSDRIblZ2TzF6ajEwTmNFeVU3LW9XUUhtNUZIajhSbkQ1YmdUUy1MTk1DdWlLMzhyTU1fckN6QVR2amVucWt4cEZDaU5SMm1NNzlZVFgtR1dkMHA1S1pkZ1F2eUtoWVQ1UDluczdKZlBIT0VLa2xvN1AtWnNzS2EzWWVJSFJDd3F3eWVrcFp1MmMyb1JCYXZEVTFMS0RRQ2VlNkcySFhERFlaMlJQS3kzN2hJbHdrdEdLTVQ4enJ1cTctck9CWjYzQ2lGM1Q0X0w3a2NESFN0SkZ5NjBCNHM0V2NTeWowdG1sdWJjQXhHTFRTRm0xSGFYNms4Ym45NWJNcGI1QWFCTFBRamlPU1NobmU5MVZsVV9WdW13b1V6eXEzRjRlYmlFbElDM0RxZ1NRYkx0WHdqS2xKdU5md011eTBzc3d3cjA4aHdXa1c2Zl9LSU9RT3lwXzJvdUlCdkhNVk9URU9DUEZCVWFGSTdYbEdRV1FJS01qWnBGeUZHUDBBRXRSamkyNl9SenpYU2xnWnAtMHJpSlJpRlVENEtpRms5eVd5cWo4Vmp4a2dzb1h3VHlkOXE1eV9UUGxPb3JHX0xDRXpZQ0Q1bS1OaWZ0cTJjTGlhWG9kaExObzlpUXdFSV9OX3VwU0hwRDZaS2xkaHFWUGJDVGF6bFJwOGZCeUF2SVNFY3ZWc3V5ME9mTWE0bkQxMFpoOGhrakdZQ1Y0eTBha2NJbk4yeXM2MzRuU0hmajVpRVE5U2k4RVlkclpwVmNEQVlGX3BjUDRsa0J6Y19xTmNUSWMwQlZRVjE5YWpWbHRtN2F6WEIzLWJFbS1FZEI4MV91aVZVLVJsc01sRTJzOEFmOHY0eWZ3WEJqeGRJVXNjS1haWTJEQnd3U2FNUXNENXNnLTIyVkFUeEowcVR2UnBEVTF3N29IZVdrb2dETGNlYUg1OW1iUEZYdnY2SFQ3X3NreG5sVl9xRk90WHpvM0UxdXl6SWFJWlJtTm91aTVxR01YQ1ZQQXNaNkppcC1nb1JzSHJXX2VxbjMwQ3poMUdTVTZwem1OYUZRX2FrZ1BmLWt0MVJINnZEWEpQTmtnVEZFMmRsX010QXk2bGZlX3RrVk1FT0tpd0J5RHBIbWdweFpxRDZlOWh2YUg5TjJBS0xJQjhzTEJlSmRfSnY3cWtEU0lvQWlVQzg4S1JIZktjVVZKdkluSVFzVE1Ud0R5SUM1WEFIaXJLTXNxd3I1SG5MVmxaTUlYTU1KT0t0TUIwV1RBQUllYXlPWnJ2WUwzaGg5a19qRGF6VDBKMjNRem9ZN1cyekgzWW9QUkE4ZVZNQVRkQndEVnRnbU12ZkQ2RUZ6YkM0aTJWeTd5R2JqNk9SUnlIYlloV3huZ3FFSkNiT3V0bHZLWVVXQWVEWXYtYnBLelVxeXpSNGxGeDNzei1QNXY0eGgyeXVadmZFd3o2aTVVTy1hVnBXSy1ONGx0YlIzV1N3SEk1SXNOUFRycTRWYVByZm52QmQ4THpmY3BzaXo3c09VcExVSWRDYzJhdURCMVFNSExDQlVkWjZsWkVQdGZUeC15QXRyeUJhR3FDTkhUdGdZUmNfbkpRNkl0Wmw2V3N4WVlzNnFHRVVqS1FXaFVEOVFYaFRJUVg4YlBSTVpMX3lwZk15TjdVcm5sLVlKdEZWQS1DajR0ZV80VHF4OE5TM2JkZlNMd0pnaG9FalR4cmZHVTNfa0RLQU10UUJsQUNHbnlrRDB5empQWHU3ZlVHcUFJOU00eUFkVjVveG5fQ2s4clpzZk1HcXlSYnN2emczVjNhZmI2ZzEzVFQ4ZS12VnFwVEU3UVZaLWk0Q1NaYUF0UjlEcVItVkpNMlk5QkZGTzVJeERmMG5WTUJZUG1yWUtpMVF1aWxHbENyYnlUeDJqQmFaY19kVkxKTzZEdnhMWmVxN3JCSTRCWjh3NVFBNXNwcmdnMnV1UzhXYkRseHpBYVZ6bEgxUnhYOElGeGV2aWU1dGtHYlZNYkRiVmRHWnMtVG1xeWhDeHQ1QTFCX2hCb0ltX2lXYmNiZ2Ftbkc1SXJDbUZFWkFOT0dCUTQwOEhSaVl4Rm45MENxRFZNdEdkMDdKdmR3SEtCbER5UXl4TFEzTHhGU3FJVWwtcTFxSFVJbWVxVHJ5VzZ0b09neFBTMlJIT1J6TzlJY3VSX3pTdEFRZTRyYU0xelFRcUJ2Z01GWWxBalR6aE4yOHhVNUpaY1YtUVdvZi1OdV9GdGdxeFVVUmJnV19sQ3FINkVmUkRYRXVCTFdKNG12WlZ2NU5XZUlSbmZHLVh3Q29VWGczUGQ1eVVMc0tlcGs3RkxVNlhvSDFhLXJ0VEtPSzJJSGhkUU8weWluanV3YkVmeG5kQjE0V1NseHJvTkNwMmVBTk90bDNJUmIxVS0zR25QTXVGNUQwcE1yZDJBVU16MEFUYm4yVGlBWXFFeWhfTWZUT19FNEc3WjdCX0tVa0VzTkwzOHFEMEgxM0xuQzVDaEFkcVkwZHA5d0ZNTXdZNkl5c0JXbERRWlFCdjFKaXM4Rl8tdG81ZFJPV0o2VFBLb3V5S1NPMll1VGJkSVhrTmtNNEFHanRUQXhDVGNTUGtUSWVlTWNuT3AxcUhpRFNISUhfSFVuRDFsODlrZ2tENERCM0JZVDdQRElWdEVRVXo5d0hmR3EzQS10TlJ2YnFMNHZSaWF6YXpkUUd4akItYzVLdWVLMUtFWDRkUWFaSWFzckhMVFF0VDh4Z3FVVXdJZjhnd0FQdV9yaC10Y2JhYTVGTFJBWndWS1RzTzdXVVNROS16ZEJMVVg5MjJJeV9SelBuWW5DTVpEXy1halFaVEYzN0NZN0VpMTFCLXFqbW5uWllsNHJsZXlPQ2phU2R3Uk93NUpNRWdUc0xNOTl1T0pzRHFQV2IxeFhVY2h0U3lfUWNQMVA0ZEtxVGY5OWdrZjJJaU40bENZT0JqRlA3d3pVQmw3TmZ4N3llbmhJZld3MkhjdmRqZVNkS2VkVU5wU3VVVmk2WUh4WDZyN0pTcjhjS0lJajdDS3BuNy1aVnk3WHkyM3E1d3JXc05OeVZESjZhSDV3QVhLLWVDeHp4d2VHb0hyRzh1MTl2SUJPSVZrOUxtTmIxVFpPbnhGQkNvdGhraFhqSGcyTVBaeVZzRVpEemsyTDhCci1RMXhJSEx0eW9yRVBMWXFYdTRnMXg2TWJjZzlyLXlaSFZtUkJ3c1pmcWRTbGJfbTZXUUozcnB4dlUzY2VOLXB2a21Ib1NiOGg1azhEM0hNV3dfbHRkaDdvdWppc1owa21nay1meHJWUEc1UHgtWFBCYV9leEY5RHFISTJTT3FlZDJfWS1BXzIwd0xtRmxlT082SXI1Y2p6T0RZaHJVbHNPU29MZ0ViUjNKdEtRcHFaRlUtUFlrdTRKYXVqcDZlZHQ2bmk3LTdGY1RYbkpxTHdaQmdYSDhhZ3JEYTB4c3Zlc2FsaDhMWmY4SUt4N19fWFdKX2Z4S21NOXpLNU5zZm5PanhSNWlVejFkMlZRSXBoSUpRVGNuZGNnUkphWjg5U3lLcTMtb2NzWDBxR0w0MU1Nem9Sb2RPYXpyY0lNaUZvTFFfOUQ5UUJsTnR6eUN2cmltWVpTLXZsU3R3T1pxRnZ1RGVHb2xBR29wSjR4ZDhtUmQ4b1NZUWFrLUpUX1M0VHE3bm1UQ3dvLTNSVGpUdUg4cTR2VTM4cm9rQ3JvR0trdkdXbTd3eDkyQTQ3X2xKdG9rSlVqQUs0OE5IMUhtUE01bkpRMklicHpLSlVuZzRyT25sc1RMNVVZa1ZYbC01S2hzcWVWb1VUaEZDQlFaUTVhU0ttSnEwbjR1VHhtcC1BLVlxSXhFejRfWC1mS1pwWUtyNFNBb0VYamcwbGlMVnhWcHczMWswNEFrZk5xM3ptQllBMzdwMnpUY3M4Y1h0LS1TcENYWGozQ1VLWVVwV3RPV0VKbXFCUHlYLTJHRXN6M0dRaEJCYWJWdFNTMVJIb3ZNUXEwYlpxN3hJOTFuNGNXcnh1bjBqODN1SXc3TkVQbkJnZUViQzR2VUxrMDJtcVFHR0hCMWZLbFpSaEV1ZWNENXFuNW1tUGVjTnM0azZXWm0xUGVPQ3JBNmgzN1BlamtGVHlkeXdYTWV5c2hPUGlXV29WN2xEalZTNW82bEQtSExTU2x3eUhPdWljaG9RVTFwVzhUeHlMa3ptWkFaSnJiZExIZno5UGhueEFCb2hwYkltOUdodnZCRVpnMi1aemQydFhCWmwxSV9wa05JeWlYeE03YjJkOHNab0diZ0Y2MjBWVnM3cnVUNGhjSHNjNEhCNWdEbE01T3dwNWdvOUhkbWE1bkxMUk84LTM5bFJCWnJITm1OV195d1k1R3FOSk1kd3FFZURsT0IxSUM3S2lZN0NJdnIyU0dST1AtSk1ZSmFpeGRFLUJVUkk3dWdsRFpZLXNCX0VlcVdjZkNDNlk3LXdpUEthX3BPVTNBU2ZheUxqQnJMSWo0NlJSLUZvWEVJRi0tWVVweFoyd3RKOWdGejVUenlXYlNmN3dmWG1ENjNjSXhWcnlvQTctSFFlZE40VVZldTZLaUxuQTZPMkV6WUNlaU9ObVlLaS1UT00zM3lXeHlNeGEtbDRKU2RYa21Sb0xZSTBENmc4aEtWM1VjbFpiWlV0MzhPNzJtbXdYM1Vodm5kNTVYUFZld0Z6UjVhT3I5bjFUMHVxN2pjWmdhaklvVnJMWGQ4S21mT2ktM2Vhb2FBM2pzMlJlWXFOdXhHS0szcmR1V1B3VGZMM3ZDLWl5VnFTejNTMll0N2FHaGhsbWtoUF9EdEJEd09ic2JobWlxb0N6blFnRG5zNTBDMFNVbnZfZHFaM2NJY29XdEtoRjM0cTVLSGZ0YkhkRkRBeGFoZEhFWlNtZ1owUGg4STA5MkZydURPNGd4aDBnWi12dnRrUjBmZ21GS3VpU1RoYlhEWUlNbkprMm1YTVNIRmI5elUxWGRBX29LdGk5cGRrd0F3b0Q5LTY0N202Z0xBRXR2aFRXVGliYzZPMUZ0dlczZEZvWDNPNHBRYWhNMTltelUwLTgxdjUxTGFBMWRyWjdvcHpXc19ianhUYmlHRl9Eb0FRS3R6REtPQUFqUFZ4QXVGbGtFVFpJdlFtMnZyUzBXbDJCLVduMVBFR1hVdFY1eHlNRkVMNzBNNUFLR0lIZzNnT2lFWC1ZNG1vdDN2NlBBYkE1VjNxZ3lBenhEMTJRUG50MGVWcTZBczM4SzFsVldjWFhSaU5RbUpFTWk3SENzUUtfRFZpMTRwamNJWkRXek5ndHBTd1lQNjZHMFpoRmlFcVhLQldVX3phZ3hwem9GTVZwNXV1dU5Ta2hDUFdKZGJKWDJRVldqNVdWRERUbkcwa3JCVEdoRkhxbGhBWXZpR0xTNDR5b00tMzVLcHc3ZWMxd2hDRDV2ekVudVpLc3ZhSkEtbGRCbDJaZE53R2tCLVFMa3R6WmYyZW83UGxMVEpqeTNkS1BSTWEzVzhXYnR0MTJZSjVoaGNDNlpmZDk2VjBxUnQ0dTl4MkdGSFJUajg2dzZUUFY3ZkltNkhrOEVEc1Jzb3M1VEFsbFRmX0NWMlNCMUZWT1Z1WTEyNGVGVE1TMkpJczktVnBqd1JkUmd3NHJVWkctWWQyaHhwaF9tX0hTUUYyUTJwMWRHNkNzYkJJWVBrWVdtYVlFN190aF9GVkFUQ1o4MUpTdU1SVUVDLUtyS1IxeVBDaFI4a3hYLWEyem1LWGtPbXZCLUNwYk1zM2FfVjhma0I4LWhNblF5YTlTQ0I3NGE2S3NqX1hvU2I3VzVjSnhIWnk2WlVQVG9GLV9SamRKeUhVZ0t3QmtiV090dGVEb0lZajEtb3ZwUGxmQkI2ajF1QTd4Tkd4NEkyWV8wcjJTQ0M4QUxNS3NNeDJCVUxBOVdpVmprWWs4WHJYYkNETDBkNF95M2hCVElSOWh3T2dMd0M0REl1OWNyWlpyXzVpTkdOUkVMQ1RUMlpWSWJJUGNFTDd1ZkdGR0gtWDIyeFdicGlMTm9lckJXQm51bEZ4WkhLZTJDdnUtbWJ0SWFJeHRmODNqaWJ1YXFoS01GUUVBOTE0eGdQN0Nla0FvZ1dKRmJ1TnZOSDRfVm5OWVdTQi1VelhXWWR2YVhPaGR0YklFSzllTDJDUy1rcVhLczExQ0lGRG5Mc09VNnk0LU0yYWFhODhSTENHRXJwdGJBZ2g3dzNMU3dxMTdRSURrZ0tNa3lIaDN4V05EUmZCZDJHRWFjb1BSekJnMjlBUXp1aVF5MW9IUVcyRlozTDgyRzFYem1ZQjZ1RTZ1Z1JqMWJaY1Q0bllzU3RRQmpnYkdiOFN2SlpmdjRKZjdRd3BLbWdlMlhYSG9nazc2aVdPbkVRSGZTUmR4aXdfcVdEZ1lZWHJ3ZzlBUmZpMXVFcmpIbG9tVEpMTW4zUlpKTkI4M2xoc09kNkFzSmloMXlqTmZ1VXhLbkxsY04wRUt0VU1VUWdETmREME04eVBUUDY1WHg1VXpxOGpiQ2p2T3BPdFFKQzNIQ3NlRDZfN2VfMnU4MExZRV9uSWJaWi1CdEVmOE40SEJXVmZHTU0xc3dSY1M4R01JQi1lLWxTakJ1bl9naTVQdl9RSWQwSDJ3blNOaFhlcG01SkdZWUlxRUpZOFBuMWx2NFBlOWtNY21aNkwxYjBzY09kMnktaFhqZDVYNzNlT1F2TUZ3bHBjd1l4dFRfcnB4UnE4MXRsR0JYYkc1eHZJZWxfejQtMmFwSTZqV21LNm1wNzVXblluTnJPalU3TzZVMlZqSkUtS0NraFA5Y0Y3YWZ4QnQwdUlVOWpOaXFDbmdtX0NvSzM2UWxiZThtNEJGYlJWanZ1VGR5SEhZSFJHVmNvLTRlVHpkY0NtcWRkNkxpcmRVSTZyNXhleTFwRndLSzY1RU5hYnlVOW9pakM4Zm95dlQ0UkJ3azVqcUtHZWJwQnhyemUza3RGWDZ3RjVWQURoRWlrTHpWTEN6azNFbjlYbHpmZHE2anBtUEVLcGRXanVsNGdWemVDdnJMYkg4cGFpUEdRMHl4UTk0NDB3ZGFRNm50RGlOT1pVUGZQQWdiTmRtZE5QQmpZVzFVS3U1ZFJFWmZRQkJGcFlEc3FrN3RkSUJGNGQtd0lPRU9LOUJHejdNREMxQm9uMEtESkYwdEk2ZzdPQUtlTkNaMnQ0dGNKb1ZIVm5ack5pVWJENGVFR2F4RUJ0cFZteDkxLXp3YXdJQ2dxSXFBaXZZWGJkcnNuS2QycEZqTHNtc0JrSEZCVGhxM2FTWkgtc2lVT21BYjBxcG1ndTJrZmN6TVh0blh1MHBGcE9BQ0lUdTlaN3c0eEVnWnUySDdZN19SbGV6WVB6bWFuekYwZ09yVGxaVjlOVUlaVG5tUjdsLXc5cmptM2xERE5tYWNILVMwT1QwODlxR1RzTzhGRnA5LU9IVWItX2dsY0dEX2tJd3ZfMWl6aHB3MzJ2VEIwU1BCU25PY05GQWRia0xzU01jbDZjc1l4amNLdXZ1M1JxWHVFU2ZPbkJOQXA0WWJFbXR2RUR4M2FGOGp3R1VUbkRkSUNPUGdDMXdZOVdRRXhnNDVWdEJQTlEyWXFaaDdZMm5tWUJwT19UMWUwNUk1N3NabzdTQkZpYTIxaEhQZjdSYnJnZmY0bnFHVDladndRNEhiSUhLN1pfMEd3Y2xnRHdMZklJTVh2Y3lYbm9sV1NJUEpwOHRGWUFoM2dVMWxqYUo5X1BJcU04Z2RMZ29ZSGVqOXlKckFuRlFWZ0xnS3hFRW11Wm1PUGtfU215el9zdXVHRUFuQTNsdUtCUDNNRm1qU0NIcmdqenJOcVloWEh0TWRTQlRMLVdRbkQwSjdRVWdhM2drcklKVm5oV1doaXE0Zi1DcWdUVmlZYTRJMFB6Z2QyMEtHOUYxRkVyUVVtNnZrSzBlcjQwcW93VUZlaWY5Y3NmaUI4aktvY09oQ2NoTU0zNFd5U1gxQnNWd3lvV0pkTWpNa05rbE9KRzdTVGs2WEtwZ2JBSHl6ZVlXRVhyYUZXdlRhby1zSjVmdkRJdG1NVVpTYU9VTHM1MjlPNElfQXhhcHhISmJNdk1iLVJ3WDNsR1N2TjlzM0xXOXVoRXF2UkFjakdRSnVHLTM2WWZUMXVQazRnVmlLQUwtNjY5WWF2VEVSMVZkTGp3UWdDd0w3dWNVSkVFeVdlNWtPa0tkQlB2UGItX2ktQkR5WE8zQmctNndwLU5hRW9lRnpnSXRuVXlrc19rOHFUYjV0ZElGdlZ2SEQ0SjA2aS1ZSzhXdmtBb2R5cWJvMGd6aDZCMVZOUU5RMVVLRFk2U1M4Zk5ZQmpQdklmR3RKQTE2ZmVrUFZLZTJONlBKSlphN2V6bXN3UVBFOGl2Z2QybmU2VW5PZUx2YTQzMjNuckhCdDdQLXNIaUZIUWdwY0YwazZXdDNKVGtoQVR1RExEYnNGZWZwVlBHWE13NnlESTJnOTRFUThiRkZRbmpzakFIenR5OTZqRkI3Sk00aDRPdklFSHJvR2Frc2dCam44MzdMX0s0MGs0VVU5bnJpZmtyaTA5ZDYyUDhHaFlTMDYxaE1zejdyeG9zQldoTDFSdEpwUDY1RGlYSTBZX1AwUzAzWUJZU0Y5SmZlSVlwUVpOSmFtcjlHdE1WMGZyZVJ5LUhBMG50d3VFT205X0h4T1VRaUJGUjg2bkVxTlhjbHRNRlNoQW1OS0g3UnJuV3dNLTdCSW1ad3k4dlRTYmJzYWgwRGJoZFNKSGMzcnplTXl5QjhiTEN1TkpMeXMydWRfaTBWY1pjM0xrN1FBc2lhWnVTNG1rZVB4emxzTUlrSjN5QjFMMGlaanN2TWdadm4wZ0pna2RlVTBFeVVMd21TM0RZMHVNS0UtcUFZNmlrNnZrdU41bXd4N0lvbVdwZnBCTEpMaW04eTVHSGxhc2YzNDNEcWdtV2pVVzE4cUlfSUZMZUc1MUJza29yOHc2Q2JQOEViOVBoTjVwV0kxWlpZeXNmNkZqeVlyZXhCVHpabzhtT2hmX25LUnF5aE9jZWdlSG9YSTk2VFphWUdqSzJfR1hLRlhaNkZnNlUzMERpM05VbEZ0VnRqZVY1ZFh0SmxScmpoUHM5YW9zcTJ4bVBmVHRtQTQ2TzFsUjM0ZTEzM3AxV3RxSC1UQzRrSm45MGRxM1VRajN1XzRZZUU2S2ZBLUV0aXJZYTdZSVVpTkFVcFdTSjNjOE45NER6SHFQbTQzTzZsa3dlWFRKM0pxMHRoWlhjWkNxNmdpMDh0RFFjdDVZblZCRlNYTDQzTkh4cFg3dkU2eXo3OWNfamtzREZPX2J3NllwRjhWRHZ6MzR3ak5Vd2ZfTzVNbWF4UEJucWZoLWpUdHhtVW1zZllZS3Rpb3JEa2F2d3B6TzlmWi1pSTBvX3oySzVYUHlUNXZfVU5XaUwzbkJ6OTU4M2RsLUF4T3U2TXRyaFBKUUE3ZUxXOTQyVEx2X0g4UUhyRnZ5bW0wRmtpa1BJd3dmU2J6VHZBNnltVE03dXZ2S3NuNGxyb3IxRUtZT3Y1MHFCcHY2U2ktNUxsakZUMDc2WUZ6NEhUWnVGRkdYVDQwRU1fX0pRcDNmSkE0cXE0OUFUbTFnZW9EVC1CRGNucGFUVEtvNDJ5aVdhZEZBR1pycldKM3NsVHRzVkJzaklwbUo2dU1XNnJxV2hTcUMyOWdoclpmdTZTalBKRUEwdC1HVlZoRWFMaXZqTDNfYl83d1Awcm1UZTZJM3BHWkxlcHF1cjdrRmFfeFlRZVdPWlF4TlgtZXVwRzZDeGlkcHBZeUNtbk5UMkI3QjJKQlVWc29oNThOS3FQTzVpQ3hwaHFvVzRickxWSlBtQXN4RWZfRm9OQlZfT0gzaGZzMXlKMXlLb2g4SWdBRktsdm5aV2RGRk5ValhaWk5VSDczQVBaYXBLak1hekdlQzMwYkVTM0RiWUxBZmF1SE9QX2hKN3pGRTliYmpDUWZhSXRqZGhiMm83blVJVnZVRENUVG82QklidzBtYkFUZGV3NUJoTmRfelI0ekVLeTZZMFR0b04wTUFsQjNXT3NObUctZzVGaXVoMXk4eGhiT3gxR3czcFlYRllrVHB6YTlFVndpWGsya3o4ZU1sVjl3Z1ViNDNFUzh5RWItNTM4dnhhd3d1bGdHclpxYjlFMThHMmhrQjlXb0hrUjhoREVQY3U3RjNvbGdGSnZsaloxUjlGOEVOREZXdWIzWUJLUHJCYUREMncxUlEzM2ptak1CSEFCSE82V3lvSHVzXzA2cTVfd3BjU3FwT0xOVjNCLXdyWU9rZWpyZkM0N0pPUFpLdkM4U1JLTTBXVTJvci1OelUxa0tvcWtvQi1JRUpXZXpyQkU4U0c5NDZwTzhSX3FmVnlYZ3ZJOHUwLWVyZ1oyaUF2cS1CN1dGZDdxMmJWY3ZDclRFRHUyMzJ0azlkOUdOSjdFTTBiQ2x1NVNLVVEwUnJkM3hBSjIxSXhSU1o2RU9TY09TaDQ5MEYzWG9FcWt4ak9VVXJSdDVoMFFUcHRCUnkwaU1ZSlpCYzJpbld0bVF0VVlrOXRveFpwTFRkLUZMeXpvSzFKTTgtbWxUNFJJTkRPNndsZTEwaXJxYnZhMDR0Y3B3SjEyTGJyaUtoN2RKRmJFTVB4N1lZT1RsOXdwakhjZzdsWVNVblpKQW9TdFhheXZjQUdaZHQ0WncycnVhRGdyYkdOZjhfdVZGcy1WbmczYVNhMFprYzJqMkh5N29pQzFJeV84M3dUMXF4Vk9BSXhSeThsc2lFbkdQNFEwZzdxeTdNWmtKTGJmelZzWVRDVDRTN0Z1WVlzX1lWaENHM2ExWjdQZ2VTMmlaYXpzVC0wNWN2SjUwYnVVUXk2WGx4S2l1SGpMSzNXdUZmYlhXVlc0OGNwaXFIWTFmU1RIVUVZRlMyU1Zvb09SSWkwMmtuRElHTEFqeHpINWNDRXo3UFVuVjZFdXM4bTBjTHhtay01eGtQRHBXSWEwVXd1RHVQZlBrU1pJQXpDSEkwNTN4RjA2aW5vN2FCdy10ek5sY1BVd290WW5wdzN4WnNDUi1odFNaZ1JQRnJxd2dNcEhydmg1eGZmSUN4ZEZ1RlBES3c0UVFkTGtCbVp6eUMwR0lSa295NW45SnBKYzR6ZFc3bmxHVmVMeC1XZnJBWGVGaHFMQUg0c0xqejlVeUJIeXdPQ1B6ZGlQQkhSOV9sUlpZSzlVdXYxZ3ZMaWJqOWl6dWthSVk0cDZlR29wWDhqSWN5Mmk2anFZZFM4MHhJV3dkLW1BNlphc3EwQk1kSkVna3BGZVpIaGswNy1aM3dacXRnd2V4NnhMQU9oVkg5MnhWZWVJeXIyQTJ0ZnI3T3dkOTEtdU9IWFgydVpUdDZIRnJWLXkteldnRjdiZ3JfTHlYd1lSakkzNnNhLWtheXBkVkl0WnM1SXZCcjRLUkR2ZVVza0Zlb3pQQ0V4OWdrVHRRUzNUMlVTUTJBUlBRclF3TDFPS0lxOXlaRWJJazRIRy1uOFd0WXUzOEU1YXpVelU5bm9kdWhfblBqRzQyNDBYRlNIZXJyU1dfTENSVERRaU83SVhUR2tRNVdidUttSWo5NEhDcE9ZZWVfX19sNGloem5FeWRqbm9UcUstWktWS1JvWmVKLWFUYUZPdnhlU3o1NVY4YTlaUDRhVjExbDNDaGJCZWFoRzQ3cnl0eUFIT2ZIc0Y0NjFNeEVTM0tzcmVfY0FhaWlzdXMzYUVmZmVCRm54Y0Y4MnJWZ2xqaWt2eVRNTHBXcGtlTlZIUDI3MGx3M1Nuak9ZVGJOQm5OUFh4NkU3STV2ZDVpdVZZMG5WYzVLazZPTlZiWmhNSnI4R010dmk3ZGgwdVowcmtvV2NsZjVmeVNyWFVubHFDdDBkZ01iYk05Zno5ZnVmM0EyMW1vRU9XWTN3R0dTeXJObVQ5R0FEQXhaSGQ0b0RxVVZsbnhMNHNnQTRmSVBmYTV2V3RlNVhtX0JtM2NRRW1naTVyRlA2M20wTERrVXFzN2wwUmtNajAyMW1zQ2QwTTBDZzI0OE10TldzU2NNYU9TejFXdnRFdmFhZngyQ1B1ZmFaRWFHejgyNnIzaVhOMkpwa1poNHpFaDc5aXoycW90UlRpYTF6VVI2OG56WmxkMHhLTmhIWjdxaDdmT3lqNXF6X2Vpc1N0QzZTMHJXMndCd2NIZU5ZYmNvRVAtVklzYWd0NkFrTjZoMGVUZHRjWDZUNWxVdmVNRGpzTThGeXBHR2pUZ2kyWVNWMUpiWUNSUTNrQTY1Z2F4UzBVOFVNaWVWR3lYLWFjYUV6Q05LYnZEUjh2dlJURFAtNXU0SGhlR0NiODA5QjR0eVRDN2MxcjFJM29KdTlEeWViRUtZMlI4TzdSWk1kVHNzNEZrS0x0eU9wYVZGaHhvdVhTa0RVYWNUTjBtZldVUEJrbWtpNWpiRS0tZGVpTTNlM0tGVUoyM21GaW1QajJBOC1TdGlndVZVaURPWWtVZlJkcmxJWTBzVkF3V0NsbV92cE45a2N3V1NyTmlrX1RmZ1BTVFp5NmZKZW1WbERQWklBM0VqWkh6VkFJQnprR0RISjdsUnlQMXY2eW9uWXZwUVplcUFRcGRxU2ozcU1VRFJkYXdlNVJyb2ZHT01CT0J3T0dobkd0Skp3S2ZmcXRKZ2dOU0lJQlhNTWVaR2JaZDVLYVEwRkk4em5PRlcydUVPUENVX2Vjdm9sa2NBeGNSYWxhcFIteTFhbmhzMHdVYlFONm9XQzBLYlVvUDBsMUNhd2NwQUNJZloyMWlna01sMmFEUWg5MllGV1ZPVUR3aVQ4VktHX083QXIwSHVaMWZCLXVKQUpMcmpuc3VTazE0cXZ1RGRqS2hzdlBROEdVNnc0dnhMMFhPVmtweS05UzVXV0gxU3hMZkxRSkcxWHFabUZUMTVrb1NUS3I3MDJLbl9jWmN1ZnpGSldTSmFmUUVrLTNVdmM4MnBscUxfd0l1ejlzSmhUNVlSNGI5bXFSVTNmR2tSeHE4QW9hOXF0NVhjbVZWUVpqaDMxUFlKdDZib0ZJUXY5OVUtLTBrZVFHa0lBQlJZX01iN04wb3Q2dGNPZ2dBYUJQZGtoQTQ1d18xQnNzWk1IQmlxbDliM285OVlaeXFEeVFLczZxNXBRNEl4WG83TGVNMktMRlZYdXVsWUx5dTdPd1Q5dGFXQ3VzUnBXOXJPLURlWWV3UnVxQnpUX3hSRTdpN0RhU3VyelBiYWw3a0RoeHc4RFU0MVZzZ1BZSDVycjl3ang1Zm5nSkRFZXluMWtLNk9hZHBuWlE2UlRSZFp1ejh2Z0tHZmZibUoteHBNUTJaNjFHdUZWU2FmQUZiM2g2Q0g2OUtCMkVqemNXc0hickgtTW9QSEFUdllpVGlDeUhwZHllZkR6dnJCN01QQmZfQXRlYjEwNHBZTTRBYTd6TVl2eXBzakJTdWhjRkItOG91TTZXckRDdlBXMkItSGtKbGtacGxMZThzcFBsLV82OW9UUC1ua2RhNFVtUXFER2RHODFNODF0c0llSXBNZlVrS1NEclF3OEpVRkFKc3c5UWpqVEpZYnJMMFBhQWlmSTV5WHFiY3hwSHltQmZfVDNQcU15eklkU2NwREVrNWh0V3RtOHVjU0dDZjk5Q1FMV1NldVFULVc4Z2NhaEhYRWRWNjhyYlpTQnhDMkJYaUc3bVhSNFhLLUNIb3p6WFcybE83cVRmU1UzTElFZS1kSXZGY193MlhDY1NIX3JsM2JLM3IzLTA4MXhzZGZhR0cwOWZKcmZvckpEYWQ0blhOWEVGei0zRTBoUVJTNUplRnhxVnFYUk1kY1dzSXhsOTBPN002YjRBWDNDSl9QSXZZMlNUX1Z6bGo4MXZpT3FfSVEyZ1pxMlhzdGFlR2NHX0QyYmJFbVZ0MW9mNUcyNGEyME95OVhmVkpHaUpIaUVQTDJMMG45dUdqeHB0bFhZa29LVTc3XzZqT3h6M3ROWmJCcS1yTm9ubXQ3NEhoSUNfcTRsZXJCT1k4WXRCWFVzQTlMTnJJaTNkV1pCZTQxWmpHZ0dNWEhEa3Jzcy1DaTh0TWIxLTZlVGJUVkxaRU9BUGFoQmNDOEd6aUNsVlFfOHk1WXNNWndMdnZYNTNjc2Nsdno4a2ROZjUwMDNybmhfWEEzbmZzTlRPbGl1M0pWeE1PcW94WEZrZHdWSjNDT2pmVFIxLTRuLS1Ua1d6YkZEVmNGZ09ReVNjY1Y2M3Z4N25uLWJ2VGk4cFBtM3NJY2t5ejlhNUJlbXN3cHh6cXJOOWZhNXNVRUgySWRxZ2d0UzNYWGpJbks2RVZJbnRLRU9GTFhMNHRTSjhYeU0ySU8yTTJJeEJIVGRVa1NXcmZIWlAtaVhPbWU0QzRfUkVlZ1lfc210T0NySmEtak9ja0ZPSUVCek9CSmMxaWRBd1N6SHVkaFR6YW45OG9qTXlmdVpVOXdtVkJFMG9TdVlxbUF5Qm4tdzFDY1RRLWpvbWJWVGxRejM3VU8xZzRITlVIZmtKei11em5jejV3TFV6aGF6OG91ZnRjN1VVbFAyOFRNOTNHdnI5MWVMVmZMTTNOblFYNVhtWGh0Rk5nQjFseDFuUFdvbVhYMVJMbkZXX0FISjd3ZlJFV0JPVW9OUWdYYWRLdFFuUVBKRnF3RjdNYUtWREtDNVJtSXdDMjB0cF9Wa3BaZ2VPQ3NpcUlBLUV6aHNjdmV6V3BsbzMxOUhkSkRlSzM2NTFpUW44TGo1ZG9SWlIybWJLUkp3Sk1YaEZndG1zRm03bV8wMTVYTEQzV2F6YUFXSjh2M19uUzdXeFlyRWJ4TFNWNmFsYXBydWRHbHJhUmZoc0EzMlJGMDBLSEpUQ202TmFscm5JbThJb2tRdDRlOFUwTkhoS1ZFQ2VxaTFRRjRkbnd0M3B1aVlQV1hnbzFtcjhUcXlPQUNhVldUUTN6a1FQdTB2NjJ0M3JNa3pIMHlVXy1WSVlvM1VMbHVvdURjdWJEQzFjaU9ZN3FZc3oyMGRYaUdiUTlTcHZGNXh3eHlqcllKVFNpWWgzbThKUHg0UEVKTjJKdjFzVXBqaWtHVl9veU9sSl9xTE1DY3BFT3ZscFAtMTY0SWRLSGI4MHo1OVpmYm1SUUVOdUZEYTlvdUkwMFFqazRLODVQT3phZV9jN25WeGN3VFZVVUtQVC10OHcta01wblVGeTNCX3pZdHktSUQxX2J6aGRwUm1LcUdudTY5bGxkdzJBRlpEeGhRYlJSam5zeV9COUhaaHp0T2JlODB2dEdQZjhCVnNyaWxnZzRXZEplSkRTYTNuVDRJVHNRX0lxLWxtcTAteEZGX2pWNWYza1UtRGdkNFRySF8tOTE4MlRqUXFnS05pandqdGJmQVU2cm9kUXd0cm11b0hxaHdrNTlQdHRRWHpaZlA1dzVaQWNqS2FRNFZuZmxmcS1zcTYxSldKRzNUR3VaVS1wUU1fVzF5Q0hpNTBsM0dEdWFkNDlhVWR1N1V3dG91dXBtRTVJa21RT3c1aHBXOG9EcFpORWNUT21BNFdYYUZvOUNTVm1aZHpneU9DaVgxWEtnZ09sWE5KX0VKVkVZQ0pCX0o3U3lrSmVtem5BajVlZG1uRTNOZG54ZGVueWJ5VXktZnZPdHNtUG02Ymt5QUQ1cU9TOTJ6bFZYRHEyX0lHOXJ6dkc5U2pzWVdBZHktV3RvdDlHR20xYkxwTGJ5WG9ic1EzN0RwRHF1bjhwWkJ3eUlDSEhtSXhjTDdZLWJiLVJjaGxGVkYwUzg5bGpZMGpXRjg0WGpCZWd3Z1pqaG9IWDloTlU1RlV1blRtNmxxTVpnRklzWlkxQlFFekVHUHU5TV93WEJqWW51a3c1ekE5czczalhrZmdWX181Tld6MXF3dEwwaF9Eak94UDZRU3hmU1RxT2UtTTktaDNwWWlpeERSQXRqN0t3b2h3Q0xvR2ZidEF5X2twZkc5M1FrQTE5N1BvbGk5YTNfbWRaOU85NllFaGg3ZUJ2NHdqS08tX3ZRUHRwbTVMcnZPOE51dUdzY1NOekk1NzNjWlpZUVBFVW0teG5PVlJWLUUtU3FGdTd6aFV1MjVnQkdObE1zVVdDQVpnQk5icXNsYUt2R3duZXNacERiaW5SRUVkSU5OVWxoUUlEb0NKa0M4Vk9zU1VQSGFwM3hMZ2ZaMFMtbWp2R2V3UXFGUURUbXF1YXdlT2VTUmw4eEdiSVFHLXhVa3RYbkNMcGlSQ2kyc0hscGxYQmVvSmRIS1ByazN4bUoyVU1OTG5HVnROMzJXYUdmZUJOYm1GbVY1S0JJVGx3Uzcyc0pXRUYyYjRKazI0aDRoZ24xZWVWa254YmRCXzBkOVdvNkY2LWRGaUZKaDFVdjMwaFBaTU9yVmVib3lJZWpHZ3ZRdFFMRlg4TUYwUFVEazJ5VTFHZ2RSTFVJWFNfRXBaYU5iaWFLSE44YTRkUWtDM3FIYXpkSU1DcE4wTlhlVmExZUtDWDhtbG1rbWdkbElVck5XeTZLSXdkSU01ZUJLWUZ3T1lkNG5WZWRrOEl1Qmt5X0NMUXNwYTdURC1fT1JtOERxTElMRDZNLWdNenVKWjhEX1REcEd6YWZ4VUhVd3o2TkEyaVVXR2lsZWNQMkNLenJLTmdFMDV0Tko2QXF2cEVfMEF5WDNRc0VPc0Y5ejRQXzgzY1E5dXhiVXNqZVE2MHpfc3JYYnB3UDJNSlBIQ3dtQUxvd0RtYmItYTVJMEFyZnQyWXYwSjc0ZC00eVRXWXZLUk9nNDZhcDZTUnNGZzBJOVpsWkMxTDQyajJDMEpJZXE5a3U3cmNxZVNnXzR5dktXdzVuRXdhUnE0WHJELXcyZWhaT2dtSFRwNmpsaVZGRGZRejBHVmJRN3RxX244VzAxbTg4a0t4eGFXRkJfNmVackc0eThlUUNXYktJbEx6OGFUV3c2SG9FTjhkYUdabDhPYWxRRmZiRGJvMEJNNHMybWd1WFJBeG10SDRxNHRQZTlMNDlVLWJBUFlBelFIaW5qUmR6a2lpVG9yVGpPd1M4ZW9GNlpxV0ZGbm15YkNya19vdW40WmFtX215eGxnY1ZEbVBKVWhJMGdkeUlIeFg0cWN4R0NPbHFRQnBLVUc3MkpBa3VjcDBjUnp0UzhmU1Ffa1kzR2hYMUpKQ0tsTENaOWVkbjhVU0FzYUQ1NzJCS1NSU0doR095MjJYUnZFTUU3cGJCVUxRM0dvRE5CNlRaWFVQVDZ2NWNFSXp4WmVGUDlGR3JJMUpONlZvcGoyZXllVnJ1Sk1rUXExLVBSWS1wMFNPVkU0ZmRBUXJ4UzVCR1cxUl9LS0NmS2g5dUxoVERpZEpLQ0d2ZmdPU3NfeUQ2Z24xUXVmdllHQS1tNGJSekxQc2w4WktXOFNNV1pXQklKNkh1UjhrUFlDQ3JCdkh1R1U5Sno3cDN0TUhwZVVhX3ZOd2JvWEFDZlNUNjBsWHJnQTBBdlJzSm9nU0p0YTQxY0tMZmV4cGhOM0RSZUFabUFJMWxmWjFWMDJ0THkwVEZ6Z1JuMUQ0TTYzRHp1Sl92bFBTWGFmcFRFU1ZYTXNZa1Q3UTBSdm5WUzhfWDNNanBQeU1QbU5UVThfYTRQMDltTzRJbEVoWEc2R0tYTDNaSUdpTTd4YWREVExXSUpHMUpvUGdJZDl1Q1ZUaFBROTdRWG9EUXJzOG9VdXNURGtHZE9fTlBaMFVJU1RKNG45ZHZtNjlFa1g2ck9CM0J1V1QySlo1UlhZdUhneTM3WTZsWEp6cE9QVWdJbngtUmY4WEV1TWF4ajh2Z2NzczN3RGVYTGwwMlUzQ0UxRkMzOFg0WmxOSnZfRFBNYTladlZ5YzVwbElveTNGS0M0akRXQnppMkVnal9oUFpZcWI4b3VWdUc0NW80QzdNaWRNaGN3OTV4a0dOYTA1dWhBODliOFpjVnVSaUN0bGVnVzRpUjNReGxEQ24tUFlTa3BfY01TUTJrWUxwUkt0MlU3eVVBSDBpRmNGcjAxWG5POEtXRXJJelZ6emROaXV1TWpoMWNfT3p1QmdBRFpTSVZEaVVQSkcyU1pKR2pveU1hT3dNMG44Tk56bGdJR004VVUtVGU5OEk5X3NqZnBkSXBkRDNXdzJWa2tZRVhSVzR4YllSUnhxRElDMmgxR1lyVkdMYmZ3aGV1cWVITXNCMUZoWTcwM0EyY0xOUjh6X0Z6NTBPV1FQd2l6X0VtbnB5Ymd0bFdURFFUX2o4RFcxTmdjNURsX0V4WWFIOUxvMHhlMEh0Z2J1M0JiVkpjZldNTjgydjJ6SkEyTG9jc0xKRl9BbmJvYmhoanA4c21ENkxSd0NQN0h1dVZRME01M3JyU0JPVWVXQlFtTGhTTXlOblFCVFhma3dJU0Zic0padWF0ZDBHZ3M2bjJoMzg4Mjc4eVp3cDJwVmJvbWJHc1NmSnBqTzJtZDdTRE1aRTZHVGJUQ2tPVnB1TDNxSkE4WGk3VW90bkk3ZlpRUkN2clhmMVBGNWhsQy1GZmtOWXRNc0h3WDJTMnA3clREOVVmNFBfekNhVDRtbWtGbXp3ZDkwYjduRFltTjFPdWU2eldmd1VFdkJJRkYySFk5YXVqNWVXbWFEMWhRVlpkN1lkdlFtZGstRy1SQ3pHTWFndF83LXpuNFNCdXhOYVR1ak5abG5ZMnVUMnVTakZlRjg1OUU2TGN5MXVFZU9GOG5XTnZmaWgxb2h4dVRnOWJXNk5kaXVXXzNLSW5aU0FzUERrQWFGMy0yY3pvTGY3TGZ6RVh3M2lYX1diTmtfcVlyS25Mc2ZWT0xEY3JZOE1IYnlBeFhLWVVfYjJ1WG9PTnJWTHB6UmtjWUpTTTNSODE1b0VnRlFSQXJia1pqNEFpRjFJbFdidFR5NG5Od0dSeTNmV3E1UGRkQkZVckVGM1g1NUhJVjIwTktfZlZWOWtGWmo5OEFkSVpHenh3cUlqY2ZzVC16aHAtU2p5bjYzWXdWelNqZF9rZUJHaVR2aE0xWXdCSVJRWHZvUlFhRndwbUZ2MXBwdGhQNk1kUEwyTlIwelc4aEo4Q0RCZndRakZZc3NsWUdoZWJBVjlESGl4aHlUMGxURmQ4UXFMSkNCblU5R1V0WGpWOGNta1Vna0s4eFNnTkIwMWhsUHl3QkZYZHJnTHdOUkV3aFFhM3Y4dzA4YUhoLXFLeHBUNXdKSlEwajJMRWxTRW9MRzBRU3NDbkMwQXlDTnpiNDR5ODlMMFRHcTc5bTVqUXg5WEt6V1JOVW9BbUliV3F3ZzRmaW15ejNKbV9QUWV1X1puNjhvbDZObE55T29zVHJzQXAxTFNoV2Q5SGNQVmd1RWg3eXRPRDRsb01nTEJKck1QZlozbldybWxnODdPUnZVRi1MVzlNcXlXTDJJVlU0RTV1djJwWTQ4VzZvdE5tdG96QWRqOWU4dlY3NjVIcHgzQ1YzMFlJYnZRcVFXcnNNSG9ic3lfZGVkSXRLcmlLUDh6SDJsUVU5VWdNenFHQy1UUFVXV2dRQnBkYnhPd2VrS3BuNHpTYTg1REpIaHZwc1ZJd3lOOG5CeTZTbXJoeF81RVNmZUNyOEk3VGZPYkxVODc0aGY2czFQcVJpWU5OQXVUXzl1TWh0RzlIYUQ1MnEtVlZDaVo2bGotMWFkdW5TWGRoeElPWHZjWXpNYURxc3BKZkJyOEp6aUE1QjJUZl9vZlNzNlRTVjdxU2o1czd5NENBTlZncXBleEdGS3loZXF1b0l3TEpMalgtQWNNdVZxOXU1ek8xRGN2UTg5WFFlQUE4a1psd2gweGc2eko3Wi1od3hTU3RmMklLbUFfZGJteVJaQnVzeFpNczlhbWh1UVJuRGY3RHhZeFpzZWpPMnRqWnEtLWx3cVQtai0yRHZjdW1iV25odU1KRDRwRXFVSTRVSlhSSmVQd241cjNJMnlzdWRsS2N4UUpGbmdzNFZ6cGlacTRHem5mUjctMWdMUmRTMVRXSGwtQXg4Nm5DSjFCdzVoU1BfYkE2R3lJU2wwMUM5TGl4bVpjN2E4ZnQ5RXpQVVc3aGdxNGxsb1dGVjZKTzhBaTRQNkhBMTNDOWJxbTZOWUxwOW02MHJDVElwYTU3MXZWd0tSYUJyREJuNURuUmlWYTFncTRoSVdZM2VEX3dkN2hEdVlmaklyT1o2SlBlMWxEeURNZ2lhY3B2bXoySlRQbXFfLWVrdzBYd0VaR1QtZUlnLVpudDJBd001V3NmbGJQSEV4WVlQaHNGOXNOSUJhRElqRWhYMkZoZDZHOHRjMkFiQ3FsSFBRY1VERFBpQV9xSzQ5aVZ1a3BJUTBhc3JlUTVvME4zMkY1QVVFdTducEsxMjEycjhnLV9HLXZkRGttOWc3VjJucllmTEMyMnIyc3lsajhGQmNmb0xsR2p4aDNySlZDNnpPX3JmWFZkUG9fLUluYXFETmctTVdXNk0ya1d3U0NFQnc0YnZXT0M1RlNLUnNvSFhxMGJnb2dzd3JQS2xvdHVkQXNjbmUzSUhKZUszRGktRmFRWmpLeEtBdGJ0Q19fd0NnM1M0TG05NjhZb1NFRjhWdVdSLU1GVGZfS1VZNWFhNkpKR25vTzRnUjZxcEtaWHR6cXJwTkZNbUVtOHVKbTJmVXhYTThwVGVyUnBGdnItN0ZsbjdGeVl6Y3ZQWndlWi1fVHlHank1OXBzMVBrc05CcUp6dVVFcWl0S0xmeHN5T2dudkpiWnJDYlhmY05IM2RyLUNnRWVpU3VyazlDVGo2em15OW5Sa1JOVDlpTkxZQzlteGgwUmd4ejg4UXZNb2NVVFhzd2R0ZkNpTEtvaXcwNXUzM2ltT0tIS3B3TVhiU2pzb1VIeWlJZE5mWFZoVFIzM2xnOWpaSkxjZmU3N0d1X1pfM055eFc1cnV2aktHUnpOcW5MQXVnSHVHWG5EMWFBdGZJaGpqRENWNkd2SzFaZHFuQ1RyazhOcGZ2bU9lMm1KRGRFSjR3UzNSRTdldHNZa1VxLXJmTVpYY0hqZC1WMDZCM3c3d2tNQmdRR1pDd2Zad0RmdHpBNUpUaGRxZDZqaHhHNThMRUJXLS0yQzl0NDYwZFhqVHRLZDFWLVphaUxyV181dGI5cElVdFM3RDNET28xbUR6cElQdUdqZzZhVW50V0RtN0t0TEFoNGNzZnl4X2YwVmRiQkI2ZEp3blB0SkJWVWtlb2RYNl9fQ084QTk5a3k5SHNtR2VLOWZ2STFGRjVrNGdIMkZuSlhrM0huX091bmU1RHhtM1hYYXkzSHZtX0ZEdkVQMWJjYWhOSmtsT25DaG53NlQ0MVFtbVdHOUM2TVBOcHVSVTBFMG5Ea1IxejlvRl9MQVJwa1U2R1ZpWDZ3OG5DeGlZNkM3N3VmaHdsU2lVUE1LRGlaR1U1N09zd2lIZS0tZE9IbkJUSUNxYl85TUthRnlndmw4dmUycXpXUHN6Y0dONi0wVExhbUpndUVuOVZYTmc2dWtKRG1ZVGFiZzlJZGw2R2FJVV92MWVsc0hMT25NX1k2NzU4MVlIRWpRNWpxb1RYMzYtVWtVRjRFQ1VNTXk4SUlsVUxOVU5MXzl2Ym5kWUVNalNKbkJuUnJGQlBuNzAwSk1Gd3JnaEFMdnNmblhNcWN3SlVJc3dhbHpfQWxaUGE4RTNuMG9mT2tZa2Y4LVhEaTcweDBteUl3ZnBPTmtIaHRSaXY4QThnajJtSDR3QTMydjRLTkExbzQ3MGViRmNUXy15UXM3Ukt3OVlRREU5eXhJY2JMTExzUmhhd3QtTjE1SW5ZTm5HOUhlYnRTNngybTZhUld3OS1tcHV6OUwxY2xRYzFtVXoyQ0xJcEVkYmlDVkgwYlhCaVhJWEFCeThNN3VJRzhLMDZiTU9Nd2NTajA5NlBULXYyU2l2R0V1aDNFNHI2YTFIbWRoVXUtNEV5OGt5MTNkOUVZTmFieG5JeFB6RFVWcWI2NnlrNWlFeFM3UTlUSVdqc0c0d2JrNmN3UXo2V2VSeUVBSDZ1SF9hYjZrUUw3dmwtYnhLNGJHUGp4RThIY09pSGxSejMwMm43NjY1cGJSVC0yV0xGR1NzQU5TcVo1WGxOS3ZsOGR4Ny0wUHhQdkFRT09hcWxtUURUTjV3TTZuTWlyVmp0Z0hmaTJFSEtfOFI3UkNCVzlRZVVyRWZaTjZIaXpFOG93VkRMemdReG9HOHlSQlBUVWVPY0tqaWNSVjFyZkZ5bDBDamVlS3pDUVpXR3JfWVVSdnhuZDVPT3ZwelJvRWRSdlVyZ1lFTFBfRGNSWXJGR1RtOFB1ZE12VlhXVGNhUENrZmlKSkpHQ2dpZDRZQ2VwTEVKejdhTnVGMXdZWVZpUXVGblotMGdJWkg1akt0b19kai1qVkdDbm1OdnNnbEJPdkxxb2pHS2QzMFdrdVI2M0FQTzA1WmtkZTlRWlF6NlFNdkU5Mmk3ZGtEWTlPZjNBYmxmV1o2WkUxRHFRNTc0czJqOEJHT2RaZFJYVzNjcWpua25uQXVTbzExUzBxeDl3elZRQUNnSjh5ZkRCcUtIN0hNOEFrODFLZVQ1azRhbVpwYTBseXhKaVdJNGlGWkg3TUxzTWpYZ0tvQ2wzZHA2cjI5ZXlOalI5U3VfUjVLU0JQSUpka0NSNm5STnMxdld1TzhkaXNoMDh2V1d0dHp6MHVnbVNmZHpSQzJ2WFl3VUZweGVNWGJKUTVxM255TVBwWDdlSkNlbV9jdGJMRUh1YWtHU3A0V1A3TGwwb1ZpYmdTbzk1T3BvX0JDVTZ6MWtQSTdzbmE3ZUVqT0FPSlVQOWQ5WXhGaUlNVVFHMDc5enMxQkpwN01nazVfcHdSTFJ4R1Y2ek9LM2x0VEJBNjl6OFRVNDZjTEdWRnFDNU9jT0JCXy1tYUdtQkNDT3RsTDZrQXZOYTUzRHRZZzdwOEdyU1E0MmJXdWtSSHlYNE8taVVkYldlTEVIOWV2S3VjcnhfbUhBalU2YVNXNEtJUVVVd3p6WkhJUm02U3JOSWVVRUZxZXlhcmNVTWNkZUI0TGw2aVpobS1KTWVZTTZHOHRaZm1wNE5GdDZjdnpjSVlwR0xxa0JRNmFEeHpYS21JcWVUeklDSU9kUkRzdGZ4VzhENTI3c3MtUndSX2plTXlhMGVIU2EzZGVPTE5nbEdDb04xTnRyUDVka3FZUHBZMEtYQklnVzBnd2dZN1ptaWNxMkt2bHUzUnkzblFNWjZPZFZpb25oR29nSW5GYjNkdWtlS19YcGpmd2tKX2tjYk1PVGhMRG5Fa3lON1VHT2JPTExSWmlPY2lWNFlnZmFxTUlDRUpiUE94eWZ1NnVoTWdCbHhzWEtQRXA3elkwV1ZXb0JvVGNZWkZqMi15SmtLLV9uLU5jMkQyWHk1bTF3eEp5aDI0TDNiNUlEQTQ3QWp1d3hUaldyd3lZcG9uT3BpbzJsV3ZZeTIzMVJLN05MOXJIT2c4ODRqcjMxZmxnSE5xdTZ4SHdJOF9iNkhzelRRU0xjUkE3N013S0VmamY1MXg2Q09NRDZsb3pJV0ltdmRJbWdxdmt3aFlfdXFseXZjRWFfeGNLSWhiT0tKM0hFanVEYnllNWFjNFFuN2thdWdpTnVKTThEVE1KcHVuN1lMS1dvUjVHQTcxZVA3azRQM0Y5WUs1ZDNNenQ2VFVWWUZYMDhIUEVVQldQOUFtTHlJQVFVMTF3SkRrS0pWUXRoQ2dia2FQQnZCTXpxeVkxR0xXNjUwTk9ha3d6SXRWenRveTJLRXVlWTdSTFJ2TXRGcWtqOUFwaGJ6d2FwczljWWRBRXY1bnhsN1lLQ2FfR2lQUWRRRjREeTNxdy1kTFlVbFV4RWp0XzNIUGhPWXNJejFrOTg0S1ZQUFF2MHJ2d1poNnFuTGt5NmQxM3NCdjVZNGJlR2FlNnFQWnhUdURiUVJiLUhybm9JUEtuRXlrRExidzdzTU4wd1ZJNTNIcTZJRTlmTkJxX0NuVVM2Q3NzcHUtdEJ1UFZyVmt1aTJ2MGpwb0ZBOGhEVDlqRjJFeW8wRDhSVEtPbjQ3YlVGM2RISURPbDJZb1pIWlBkdmtXNG05RjVwZU5DUlc1YTlnTmk0bnpEWEY0VU01LWVZV3JFTFFiQTcwSzROaTRvX1I5QWdkaF9kaG9MVUJwMk9yUV96eTVIc25jbXFod2JXWGpUOVlKS3ZVdjNQUGZpUU1KaktscmR2WXRyWEt5YTlNX212VVNIc1ZfWm81dE9Ga0VVQ0RpWmVXLVRJdEoyVHQ5OEZRWXcybVBjWXE4em9MeGpOcHgwazROUkNid0RWcmliOFJlUmoxbXhac1BObXI0TVBXSnM5SklFeDUxck5oMGFjZ2tjOWRWeU5wV2lTSTRXM1ZjajlFcmFTa1NGdjlnVUZURlhxNDdjMzUxT3lMUi1GYUZJZ2RsNlBkdXNmSU1FWW1MbGJ3QlRrLWx3bVFaMHNCQ044SnR2dVpjY2FQRzlnQXNZUUEtZ3d6LUFWYWFVbUhxSmVrUTdNOXBCdDlveGkzbHZfQUI2UFd6WFd0MS1qOU40c3BaZFNqUTczNjFtWEdzWlJDTVl6eHpGa3pCMHRCU09Hczg3SldhRnlTNXhyQzdLNnp3ZlZ3RzdwZm5MdHlhVE5Lel9hS1ZubjhCTjhOQkRwd3M3VEdxUFBPNU1xVjlVSGE4bjVBbXRSYTdKMFhzYzdVMVAxWTlJMFBwcWRzSldia3lNbXhvQXZHWklER09tNUx6TWxoMXFPejdNQmpKZkR4ak9hY1dLaWVQbHNaenNzMlpfNmhwbmNJVW5QeXNkR3VnblAyQktoZkVYbXNYSWFLNEUtNjZIOUUtTm9OMmllS1otUGxRSHM3VXN4eEowc3A3cnh4M0lISk1TckJWYXpJVmxrVDFhWldvclJXVTBvc0tBdUNob1U5YmlCcEp3VDFZM3lZaWR3XzVwdnppX045T1VMYUdGUm1PejJ2N1ppcmJ5UUVHSFZVajd4eTZVVnZlSnJ1YS0tTXFIOV9LbEh1Ym9kWDd0eDNNX3NDTmwtT1J0a1E3RzlDY1EtakF4bEpxV0FmeDlCNWpyMVpPZU02Y2FiTVJtTkJlaF8tamhMS0hKOG1hMkxsWHlYTnIwblB0U3dkWEMwM1lkMmI2R2h2ak9nWmdTaGU2OHFGZHNJeWhPc21XdEFnOTJYdDkzZHNoaGprSVNESzU3cnVDQ2JGT2xoajBMZ1lRcC1IQlU4Yl9aY3BLUDdiREVLUHZyaldNVUdPd3ZQN0pLNmFZWDVfQkVDRjI3ZEpVME05eWhVTlRXekRzSDliVFNkaXkwb0psekI4djJnemFxQkJUQlE2aUpRMk9DMkRhZzhjV0JielFqZGlOeUQzVmJGQUV1Q3hhNmhWa1ZkWGxvcnZubkhCTlp4LVZySE1aUzhxTFZzeGZkeFFwMVJiN0dqbXRBNDFMMk5tdkFDeDBGSWlMRWp0OGMzLW55MTVOTUl3cTFZbjNCanc2cVRoTk9OUEJXdmxDNUZhRzl5bzBKeVI0bDFTR1FwSF9kZHVKLTZaLVNCZTNLM2dwbjhJYUNtYnY4ZzUyWVdKelR5a1NXNU5KeDBFMEFxOFQ0cjI3VE0xMzV4Vjl4bUtOTkFGOFh2OHk3S1hEcUd0aU9xcmk2bmhRdnNKU2hudFdrX3RPdG9iV01JXzJJLVNPQWZrUFRsYTVUdzRUQWJFUkthOGJQTVV5c0U1cktRZDdpbWFUMnhxSHdjbmxmbGptdEF1bUVacVpBUHZsM2ZiUjNGei15R0x6NC1nWm9BTTR3NGhFNklTb0x0aXc1am1DSV9XbEwxc04xOUsyN0pBeF9aYkhla2dFQTAwWEdfUzFqZ3ZBOTNYZ2UzMUVSb0otU1Q0QXppVkpuUTc1My1rN0tPUFF6RERmLWZxUUZMYkl6UEVtOURzWm81NHFOU05QZjNnQ3BnSlpMR1hQOXVjbV9UcUs4V0pOSlVXUVBhb3dLel9SOFk5NFE1bkR2NjhLdVc3dEtjMFV2OF9RV2owM2szM0tfcTNRTGhrZU5JMlZ2MnROa2Z1Y1k4Y0h6Qk1pMU4yaWJRUnVQXy1qRnZRYndwclNPaTVncWpPbzRzcWtXQ043ZzR0RUd1V01DVHJaUmF3VzAxbkxQM3hVZ212OTJkSDJ4aWQ1aVBxY0VrZWRHN0FiN0JTeDdGLTZ2VHE2ZWE0Q2kzVjRpRlNhUFUyeGVvbWdfQjRjRW4wMjdNa0FjeWhsTkRqTFQ3VEJaOUl0X1ZJc3o1VkcyMWJDd250bmxrY21hUnd3WWxwMVpNR1dYb21Cc2VnaUphU3J3TGk3QzdzWVluOVZ4bHlUOWkxdXctcHBUOUNiMXQwbnV3cVB3ODVHeVBSWGN1OUlXYUhGWUFqaURxcDVLVE1rcDFxckNJdG9vZ0JaSWJwZnJrS3RTRG9PdHcwbHhWc2h4Wk42SlZ3bEVJRTNwVVhuWjhtYkpvaDlnU2VMS1dyMVZULWFINU9iM1VlRTRmQ0NoM1FxcWhiOTBHTUJhWnAtVXR2dEZTbFFxLXlYOTBCdkg2d1REdzJCMHJPQm1KejJEZTM4MklBdjJOYjNBX1F2N3JLWTBHZmptZlQyaENOb3h0Ql9Nd0ozTHVSQjNXM0l6WlZnMW9fc0N4MFV1MVB0bFBsTTBtZnNkcTlyUExjU2U3Zmg4UkV0Z0tjWHEwdFh6aTBhck1qaG8zcEQtUlhwX3JoejB5QzQwekRQVGJULTk3ZFlNcHpDc2xKeWsyeVdrams5VlllNkZQWlVkLTczUi1oZjNkcUlCc0VWSmtuWExUSE5ZWEs4LWx3OVZNZDNlbnBvNVlBcVN0bEdDUzQtU3kyWkM4SlcydzlkcXkwYU5XMVBrcElqbUJNV2FLVnM5RDdWbW1SUUtTa0w2X1dDQl9iUGFCb2kySjFoMVJqa2hLSGVzeEJodzc0YUlCSGpFNVByTDdjZmlpMUFCWXFYXzN0d0hKQ3VKS3BqZlhFdDdsSWVwSEtoem1mZXdFRVJvMEdiRWdmSVN5UC12Wl9wQkNZb2JZcHFpWllSZ0FlTUdpWU5LdEJwRGE4cXJmcWRiY1N1SkdCLTJjUzMyVnZnTVBQXzU1NHNlRXR5elNsN3NTd2JhUk51cGQ3d1NLNTZSc2tRZFphR2tPTDhiSEtxazJhNWE4SWhrVG5XNGEwUEVOWmgzUXpXR2FmRFlJd3RVY1phd1V2Mk9Pb0FxOUxSTkpqaHFkX1d3cmJlc2ZTVEY3VllIWVRxcm5zeDluZ1VfODgtdnhKdkVoeHI1eER5bWFEM2t2N2tBNVJnN2ZFQ2xERWdKTDNMSE13d3pQMTRSWjFYZzdER3BndEVmRFkyUFh3ODBpYlNMT1Z0eDl0UENLMkd3X1RyanFaczZEUF9NWVhEc3RvZzBidFJQSG1QMjAxdU5nZ2pkWTF3aC15LVpZWmFNTXhRNHZZQW9FS25uUXFZOXhZcmthMUMwTUVhbUZ6dC14eHNlOV9BX3RZLW9YaThYWTFNYllNUG9YdEp0TXRxS3hQeGJydHgyU2hSRTFsVlMwY0FkY0k0eC1VbUU0b1M4aDJhZHZOOVNWWUpVNzBSUk9rc1dVQ0lqZFkxUXFTLVFyY0Q3OEtQRjYtZFRsSnEyVnNWVHFxVFFEd3BIZmhsY1JJc0J5SllLMVpmZVhZa3VSTmJvc1hVSE9WS0t0aExzSUhpak9EZkxDUWJlWlAyS2ppUERxNjJFYjdCcDJNcXBaaTQyQW9seG5yQUJlZjFxdFJLMlpGVHRMXy1xY2NEUEZUNnpTX3hWa1pocVh2ZW9tQVZyd1p0TWxCZ0lCemlPOEV5bkkwVlZRcmpKbmViRFYzeF9zenB2MC14Y3ExazdJdEJ0cHRieEs2QzR4UENLVFdsV3JzZmlKdFIzOHhmRTF6VFN0WEdoVHNDTWp1NzQwdkxqOUtkdDFfTXJoM3RGV252VFo2Rm8xcVRuUmRELVhZOTJBbXRwcnA1aTdMcFB0aVlMcVY5Q1Jkb05Cb0ZYNWxYMnpwekM3MUY2akpWX3pUd1pYX1NwTGhSLUFPUTBNOXhTMG1pZnV0cGJ2WENBcEVtbDJUdEhuMHdoTGtmbkU0S3NFS1U5YnVTbURRU1dVZm5tLUNKaGM4UVAwOElqT0xPTDgtVUdEdXpXZkNMQkhRM1l4Yl9xc2tQTmFOX0tKaklFeFA1cDQ1djRaNnNhcGNielhrRmM1WktJZkpRZThNckt1R09Uc1U5WmVCRDZvUE1lbHVmLTNTVS1DaUw5V2RRUHpiRVRhUXNCMGp6S3ZrRXdzbzluQjdxRk9oT045SENFR2VxdGp6cEI5eUhNU05ET01ZazJ1aFFwMm1jVVNfdEthR0ZqdXktTE1ybkFORHJkVWk3Qnc3MVktQWhOZU1RZDMwRlVIQWFXb01GUTNkWG5iX21Jd1Z5Y2g4YmYtV2RfQl9kdXRPNjF6NTdSeE5YNjFzYzF0LXJiMFFNZ01OTWdDLWFoQTJBMDRWTXlUYVl0QWZqX1VEQ3o4aE9iQm1WMFhDSjVfMUFtQjNqY1VuUkpuRXJtUzFxMXdDczRpc0tkc3J4U1FibkJ0djluODk2RWQ2bDl2RFVjQUJTRUMwbXJRXzNWNV9WS05vQm5JeTlERGNKRTRFNjlnRndSQ29CV0M0SlBRdFFhTlRkSmt0M0RWc09waEVTM1lJdFFyVHpmWjRkSXlpNUZaUm1iSmhRNXVuQXJDbm9xdHAwaF9QVGI4OXZQTzI3NEc3Qzd1SkhQTW5YRTEySklDYmhTY1RZTmw4MnprWFczNUlDbFZUbkRMUHhnTlAwMDZUbTBBdDNnYVZoR2ExTFNfbDdKclFyOEZ1TGdqejNoemJoeGstZEEtbHhMbUFjX1RDbkVCb3pmVHpkd0h1QzJ1QzdZVW45VzBmX0xseklCQml5VGxyWldnWFRkUUhHVmlVYzd1V1FRWUhTdkR5VGhPSXVoU01FM2pITDJQSGdzalVKZTNENEdYVmJCb2RicU5LZWxKeGMyWDV3Z09DRmpQUTAtTm9nX3hIUnp4aHVmMUd5U2twNV90cFlHWUZtNEFuYm5nY3RLVU9GQi1ZZElkeEZzcjJDOXZRM0NseXpqdDg4ZkZtYVlWeVJyaF85WGc4SG1fM1Bxd0xRaTVQMFJfU1ZUNldOYV9fa1pwU2NFdDlQTHVnQ3JRQk02RzQ5YjE2T0lsYV9idkw0Q01HODRla3NqeUlCSVpOODlvdEdBc1VQY2VMUzFWS0NXRWo2Ulg2dDB1WTREdkZxSWRwZmJUUkFNRXhRWklyU2hSRFNaV3FkdlAwNC1wUFQ5RmxiLXFMemNCT1MzVkhUWnNuMjREdjVKLTlGczVuRkxmcVpsV3F4OWVnalVsVlpIREZ1MHVlWlZaSHpiVG4xblpUel9sTmgxZEpWR3ZyQkxDdy1ZcnlaX1kwNjJRYVlmWG5KMGFiQ25vQ0xEeEdmdjdSc1p0OUs2ZUdhbFVWT010MHVTd1lYN2Q4ZFBFNlBTY0htVUpKOTN1eURHLVhPWnNHZllzcjdLYll3UmEydThTcjFvTTBUMVpJbzJxcU52bEtMR19LRUdPazM2N1dyVW5rQUtfdTl1ckhzMnZRZHgwWkxMWFk3d0lfRlBSOEFuSjVRaHhSWTNxM3Bvb2VuWGh4VVljMEFTanMzdU4tOFhyMEtoeUZPVTI1aWlJdmViUHpzMVNpcnprSmtGNU5OSDFDYnZjUkFzTEhxZ1daUzlpbUprYlc4VFlyNWNUaWh6emxoYmRuUWRRVGpURG4wSzFyb2FCd3RQUVByaDNmUlVjc1VIaEtSZnZ1UUZqRm5LeDlLTDB3aWNmd3paNEZZSWN1Vk9zODV1bU5YRlNqM1JxaFhhZDdYSzRoZ2ZHUmY2RW9pdWNZUExXTnY0XzJQZlhvR3piYWpUcjVXVkh6ZURYbjFTc1RCdjYxVFEtRl9CeFVTYnZlU3o2WDczd2pfckEwUWwzODVqY2ZiRFJldF9lVmlBeGlLaHBDRFdRNVh0VmI4YllvSy13Z1Z2OG9ZMGdUVmQ1SkdURlZWMHdOWnVGbWg2UzQ3LW40VU5yRkxwaGF1anZueDdkZnNYX1ZaSmFXT21tMkZCTFFDZUlYNTlMb1lfNlZTcTBmZXJTNjhfN192T2FJeEkxQTlHazFKYTBuc2UtTVpDOUxSU1lJQW84cFZhY25Wd0ozLXRIVktuUktESGdLcEhwd1FYNEdlM3NENVo0VTRxdUhvMjFiR1hsb1hqbG5McFAyOHVzN1I3QjRLRmtqc0hKSEp6YlpWa1hkcWdHQmJhSXRkazdpbUd4Z1JSNjg5TFEtT1QtelctaHhhUTZBbW9qRzExaWxLRUU1LUgySnBiWXRiWVFCZDgtenBmaXBkXzZHV2ZicHRFZ25OSzJEN0FtbkFlYUw1UG5nek03RUstUFFIZ0UtTDdqQlB3eFlJQWMtLW9IOTBMRURoTm5JdGFHU2Q2Y3R4ZXA2ekhMZ0s5Ulc2T3RsbEowcng4bG0yZ2ZWcGs3MzZjM0QxcElndUV5bWZvRFhrdWo2Y2Fvd000QklHZVYyNXI1QjRCa2dYWUM4S2QxU3R5N0Y0NzB5azNOcTZNb1BZcEV2bnd6RlpZeDlGenphVXItN00td0lSSzNZTTViSGVPNjRxQUJUaDBvb0Q4ZGxvMk5tSWc4VW95OFM2djAyai1HZkQtdG44azN3OEM3Qkd5b215OXlfeHVwSVVURklGeUdISGJFOG50aFdLTmM1TnFBVGNfU0padzUybmJ2QXlFN2pWT1QzdVNiYWxidDV6MEJwbFZMeGFDaDllYTFrRzJFY3IyeW9WbFFvMmNaWXlnMjEwLU52cDZmQlN4VHhVQXZfN1Zqalo5SVVkMWV6RkhwclVoQnlNYkpqZXN2SnlZaVhuNnA3XzhUZFhQMFFrS1FJNWdoX2xzaXZfZTRPUnV1MndtS3BpOF8xVFNlRWczVmRkcUppeWU2d0dGeWhjUDZoMTV1UlNNd2xvOEp2cTBHOWhCaTBMM2FfTXpYMVZLbUpaWGZQQTBIaWY2c2FHSUdUWjNMeXF0NXpSWGc5R0xlbU1nR2N0LWsxVXBHTU5Ra2NrOGtDQVU3d2VWT1B2YXRfUUlBYjZzQUYzMTR0N3VJb251aGtkY0JZcGduUzhzUDB3S2lmc2R0TnlSdnQ3cVI2VjJDTVBwbWx6Sl85ZXhEc1JFYWlTRlRRSE5oUEptZXRDUFZZM2VLX0N6cGpTWE1aVFBqNzlXazBLM3lmYldjemdzRHFfTGJ3ejJFWV84N0ZJY2p4MTFUOXdOcGpnb1VxTjRzRTI1eU1SQ25BdE5KMlhseGJTb29wZHY5MEExREpkR3E1NjJ6Sk1sYUdMWmJlSVE5cWNSOWdaUXJHQk5CcU1FanBRdy0yWm9oUTJERUs3WGJrWmt2Qk9ZNm1xd05UTXFoT1Q5ZkdlWnZyOFVabTI5NlNrXzg5bWV4U0NPZUdOS2JuOUdKSUllajhQeW1IUGZfMXV2bnFLa3RnWkxKSkVsY1lPdzZCaXhOdmtJcy1oY2FoNDJBRndOU01UQlA0RTJhS25yS09iVUJ6anV0dTJYcTNQbmtqR0JSTEdpZjhQR1NUMUQ5SW1YQWVFM3BEUnZTMXJSWmpoRzdCUThmcGo5emw2S2RhYXVKbUNvWDB0ZVZMTGk0YzZ6RnRYVTh2UERfMjFVVl96OHowZXBJRzA3VGU0bHFlNVEtMDJfSmswVkxyTWh3X2Z1VWxxRWRNWWlFbEJ0TTdFUDgtbFFqTGdBQzRmUU5Ccnl5WUtVQVZzNWx4YzdIeGU2aDA2RUpRSkU4STBETWN0TUs4ODNUSHV2NzFabUpRaUJ1YzhvUjlmME9XRUpZWkY4bDZwRElQYnZ5YnIyeUdkN0p3Z1Y3SENoeVFhendfYmU3OS00ejNIOEtzUFRfV1lpOTlvTUF2REZjVjRWRS1fekdHMWdQVDFMNHFsODB4ampzNWtPb3RsUUREME83cXMtbGV3X09zaTJmSWFHVGcxOGMwVlZ2Y3E5clRjemdGMVRmTFR1QmQ5ZV9jUWtVaGN1RzlxcUJuYklhRUVxYTQ3VVE2QmdQYjJWUnZzcDhpMVhteUxjNGN4VFUwaDc1UU8xbEQ2YTdtOGtyUk11ZnphS1pLbXJqUDZCVU5qOGQzZWN3eTAwOFNHQnV5WkpIeDZKNUVDaFVudmwzcVBXRXpQZ3NEQTVIZFhzNW9BZi1jVHpRZjYzNFBLdFF0MjBVQ0RQUHg0Zms3X3pmMTRHdWxhYTF1Zk9aRUdLcXhaMVB4a0tuWmtoeXVvM0JBeTQ3a3RZaGxoRUZlTHZvZkxkbHVKSm04Q29VWmtES0xPUUJtd0I2OGUwbVBpcTNVbWhIYnZQY3liZWljUG1TdGNycjdSdTJaQndnRm1UT2Y5Ynhrai1qS0s4Q1VWNV9HZHp1Wk1XVGhkenFzc0JHRGJwaEtYMElMdTIxcndEN3NDQzZ6OVJDb0pDSWw4ZGpEbGxoVnZiLUhrV1VpdTR4ZmhzOGl0M3dsYzJBYzNSTFlhSkhNdm9wbGR3THMxUUp1QTk3VWJjTGZqc2JlVjN3Wk40VF90NGpyRjMyY0hYM28xdUdWeDQxZm1xZk56RlAtMkF3TlZ0dWRzRTg0eVotZUIyLXdydmZMOHpxR0RVQm9hSXloaEF1NWNRUkdneXNjcVNMUlo4SVMxU1dQUDZWMTlxNDRRVFpRc2l4TUI4cTdqVjhvcTRXc1hhZElqQ05jQWhaMGh3Y0ZvbFEtZlNxVXFfZWNoOC1pTzlpUkxNODdaR1hqZUhjYzBSWTR0ZGpvUjM5a3Nvd0RQM0FDNXh4bUx5N3BaLUhrMXgzbVowTDI5eW03cmR6RFlhOXMwbEdnWmZNRTlSOFJERDVRUmVtMDJUMUhyU2tpQTFkQzNtUUpEZC1CUFNWSzBvLWRGWnJsRkI5ZTAxbGI3dDlrbE0wWWpFejNrSjYteXdQRi1zT2tOVlVzdmE3bk1zMzhyRV9KV0o4eHdPcDYwM09qc3I1MFFpXzdvM1g4cXBPekRhU3FBdEkwb2pwN1dHTTNCamZjYll5TEJkSUdKaFY3VmdWZElIUkpVbXJ5THFMQnFJQlUwTWhLbTd0R21WQkhQdkU4NmVGZGVyRnBmMFloMUF6YTl2bEhrRUJSUVpOZXFPWEpWQjhQYmhOQWJ2RXlGcW1YZ1p4cUstX2dkVzQ4WDNwTUIycHlYWW5YSlpWQk5rLUpMd1djRzV1anh4R3pyeE5sTUVBNWlibGdtY0dTUlIzbkk2WjhvcW95WXBIOXJBblBKOV9IOEhaS0JwYVNzQnQ0UDVpWnJGMU1kYjJtNlJsLTBwME9rZGk5RzE4dm42T3FyZXQ0a1ZMZTB3cFpPY3dWZ19GcXdNZ0V5QnJGM3IyT3NCMnpwdkZMYzhLUjlQblVkYnRFRXp0WmFaM2xpQXMtckd4NV85VEhPdGNkNm9tRVEtcnN0d0x2UXk4UlY1dWRjcjExZlRVZmYtZmF4Tm41RXZVMktpRk1ZRVJ6TklqM2x4MUpKczhpLUo3S05LU0pkVnM4Tk04M0JGR0ZRX0hzWkVSNGZBekRYeVRSYjFXTF9lOTZDUlFyWWwyWnU0b3daS2labVpYemVCN0llQ0o0TTRDX0hOQ2NTbmx0ZVFWWFVFRElHWndFaG9tWmZiVnV6aUxmMEZwemtDTTBiV3RoUU9rakhRc2duekQwdE82aGE4SDhRYUMteU14RmE1V0FmZTRSaWRyenhhb01WNEFWcTdOanFUYmNfZXBPS1BieElUREFoaV85QnRnWVdfTzM0bHg1X1N6ZWQxaTZaLXY5eVc4OGNheldxTWJyZjdPZTk2QnM4YUtBRmd6bl9tM2hrRXAyTHVveFY4cWswYnZQWXlyMkpBZDdrU3pzTzVsZ3VWV1lZUGVHeHZHTFJnQmxfUVdwRHA1LTc2aHp2YUtVbWpGaC1GeXRjdV81RTVxbGk0R1VwMUQtWEtCTklCMThrb0Y2S1BBdW9VbDB3S3MxVVhlS2pza0VfaUZWVThSVVd2aXFGTkRGRUFLN3JEN2NkVEJUMnlBMkZabWJJWjhOaWJzc0R4Q2RBUUdLT3RHcE5JOEhqVUdrOE8wRlZiY1J1Qm9tVFN6RU04RU85WGp3TjhRQ1NtM2stcVdPT1BhclVWRXlIQ2htblY2Zkt0OTNZSk9FYWUwLS1LUjAyeHYzRXBxV2xHTEVCYWZpOVlnLW5pQ1VrYUZiSjB3YmtCVWhZVy1qVDQwc3pURHNBZ0JXN3pWOWtKSXlrenhqdzJFN0M1dHRhNnd4NjU2YWtaeF9yNVVmMnNpM3ZDVkY4Y3BEWm1EWjlQWi14d3BXV19SM2JqLXlpYmZPNlpxOERBN3YxV1NfT3pDU09QSkFzQUppMXhjMDhzUGU1UkFIaGpQdXV6bm53NmRGWjhJNG1xY3BkU2xHcm5hYmlhZ2xoZVFUQ0RzcFNMMXFsTTFIVElLSzdUY1VZOHdaRmsxeWNfblFEUmJHbWtyT3A0djQtSFFLTTAtOElpcUpDSW5CNU5lT3k1NDMyRHNaZW13VTBCNnQ5dkIzNklQelZqbHZYaERaNEcwekoxYm9VeC1ZUnV1RDl6cnFTcFJJYlIwR0V3Q3k0OXFyTXpHb1pnNlZBQXpOQVJOSkZVZHNhTDhONmk3SExXZ19ZZG1NcldDWnl1d0xiV2hzaXpMVWwxeW13R1hQYTh6ZV9TemtvZ2JSWWtqUENGbllIb1IwajRSVEJPaEJ4aTdBa1E3VlFlZ0xGS2JxanVGNV90VEtmNTZXTjY2WlQ5RVNDX1hpaG9mOEkzUmhNRW42SUk3dXFUdkYxWk4yRElBeXJrV2dlYjEybHdud3h2SWxDQjJaeHZwTUZaQUJEazZ1VEQtZ1VDUndYRU1feDh6TUdRSG1hdmV3aXlSRjM3SHktd1o2ZVFvLXNIYVgwY2E2UlRmdDdVOHNMaWFOdFNjdHVBNEtBU3dyYzJLaW1LWXhzSWZQY3BnaVQxZjh4NXlEa01peFVzUkdoWmNBc0Rmamh1YkJyWkRXdTFYNzVldUNXUlVvZHN1cEVMU0pXaGVhUEZIRW5GZHJtempUQzdqYURYMGV1OGhJdVB1ZGU5em53R1VQNXRBUEd2dUl4SmRVRHhkUWhPMV9FQm5wWU1mcldsMDJHdlQxZWM0aHFnbkV2QzE5Q2dvdHlMX3FiNUFTMUNHZG1lU1lNUjZFZ3Q4ZlJWamRmZHhjRWllZXBBNjVhZmxHTUJWUHlmd0hrZVJPOVJKT0YzVUlScVNrWmh4anZWYmNuYlc1ZjBWTzNyWEIwaEIzdW5mOE9oNVdJdXdJa3NnYU1DRDNaUVRzc0xXSlNzNUhFaXdpakVLNjNrZXF6b2dYRmhSMVVrdXNZcHk5RDlDcTFsSFhfSkZTemV3MC1WU25xVE11TVNmYUd6cnV3YURTRHM0V3pTcnlSaXEtYzI0N1dGR25UVWRNRmtYaUtnMVVPcFFsd0RvbXF1allkaVJ3ZFFnMENXLWpqMldiZ3YyaTVWY3ZJUXlFNXZqMjFtVzhNYXl4czJCdGhyT0N4QnRMSXBlSFJaOFR3Q3JrLXNqeG5FWGJVNUlXa0dMMXJIOGZUc2Vqb2lRazRNX1dDbkRnb0p0M1Zxd3VKRU5KWk8tZHdjaTdwZmxwSVQzMnlWVFFybkxhTUo3RWxpamdEMEtCWGNHVkJ0Vl8xblppNlJhNUNqTTNuek01TFZNUWJMQ2VRbGRoV0V4dGxTZnpKSHliMFAzNXFXblV4WW82M3g3Vm1yVUdZY1VzdjlsLUF3QnhibFdhN19CaDZfRGplRGstTFJkU2M4MVFXY25hMjF3NlBvYXd3cUNhQkxZajJrZmRBWEM1Wm9XWkNaT3V6a2UweHA3YU4wS2Nra0EyVmJ2NHNXVGc0eUtWOUdSQzAxY2xhQ0tnNHdDLUdHUzI5SUVRUmJITDR3dlhIdFpnUHVzSVo3eDJpTGFkYmlmajBiaXZMS1BMSkJZNUw5dmUzclNZNEJ6LXZtNHN6d0RuVmt6czBHQjRCOXhNRlVhblJlcFdtQ2NJVm1LUXZTNVhyZ2M0c1BPRmtMZ2p0eGNsQ3NpSHlxdDNLX0NUVnNQVUN2eTluM19PdkRHZklnWVVTLWxaYXdZaWFYaGkxSHVReUNyLWFyNl9Nc01RZzhXQm5RVG5OTzBuamo0VjduaGVidWZxd1NWQXRfNHpidUdnUWx1eUZGdXVjUUdFQjBhVVhVX1dlOTZDZkJPNmtvRjdtVFZRcnFta2pJS0V6UW1HSDE0cDdoYXRiYmU3Q3c2cnVXS1RfME0tM1EyUWVFNHl2aURaTEtwNUN2RXZVUUZ2Sl9GaU9YN0ktWnFMZXhKRkpZR2pHbEFkb1lrS1VldnBKZTlNR0c1VU1BUDBEN0t1VkxLNFdYNmtlQ28xMWlWQjcxQXlQcmdVTGxhOGxxSTRlZXJQNVpIWExlZnNHU2VPWEU2N0VZUEhNY0VaWE9vaEhTSGRmVTMxaWk1QUNURHMtM3F0c01KWG5qdWxQS3RuUEFXb3BIR2hkRTgyZ1ZnTlp2LUpocC0wY25BMTFiV2pQeFZOWmptcnYzcUpfSm5zUGFQamRXRW44aTVScG50Tkd3QTVQODg2ME53V2JGWUl3MUpxMTVFdl8xeTJoTzdRTGgtSzU3WHFwZzVoblY4Wm9YaG5KTlhKeTlBMVZvZnZ1QS1aSDR6S0lucF8tTWpVSEhxVDdxTnl3dktRczNiN0lUVzRNb2FhU2VKWFFYUW5XREtmQ01xLWwta1FiRnhXSTFYLTZab3VVM3dLSjZWWGtRbVhDNk1MbUw5QllpYk9HZGxqbkN2dUp2eDFIemJWMUpUM0lja3U1NW1IWjlZREJ4SE9BTjMzQ0FHSW1PT3pMaTBsVlZTcm9zRnd3U0JJTlNBV1l5a2hPOVdPZ0htVHNhNFY2eTN5Wl90VEJxb0FBdnRydjdMVmxMYkxsVnZEQ29ReFVVTXRVOTRlNzRiWXpJNUtQMFRram5BaEh1RmlUckxxT3UySm9ueVhFTFJva0E0aUdjT2hXdG5KUGhtWXlZUmJDTzRPajZJcUxQSUJKazh6bzd3NkwwTmV3Qk1jN1ViSWpua3JSUDNjc1RYVnY3bW55Y1F4MFljVTAydWN1UDBFbjJYX0diLUJ2RklUTktyR0RxTEZnTEhFZFBIRzVxdEdReGpDd1RSeTZnUmVFbmVMZHJXbW1pbWU3MmJqUlZUUHlWQTJDUmxJb3RzRmozRnplRVF6bDdiWU5ZUmhkUWR1QnRldFllMlozVVRETFAxY0NSNVZFOE1wVTB2OE5LdmV5VjdnV3dvSVNTb21xdjFGblFnMUZ6bXAzMjQtLXpldjVxQXNVVVNleVVVT2YzVzR2YkZLV1hyZXRaNTZHcG51NklRRGZBdDZVNEhfdXAtLW5XYjlOV2N6MjlQYXp3QjJ0V0o4WjRGTUdPczNWbF84VkNWbWNfUE9Qa01rdFZrRW5ldUdaSFdKVXY0YjNWbzBUbWZqQ3hXdlIxaEltM3ZTU2c4czBZMGNKRzJhMkRXMkxFY21fR2JwQS1wOFo5SkR1dmMxRlBWOWlWU3NsTktHUlg2VXdNQ1JUZmR3Z0VPOVNIMHQ1UkZDWjVKWk11Z2xBNDVQYldTdU81QXJ1d3FwaExPVUxlTm5GM0x1MnRkNmFTRnY4a2FXQ1ZjNTZEaHR4ZFo3bWZvd2pzLU5KQzlfcEJrc3lsUkpWZFhJUlROSHBPZDlabHdKS1kyTzdEaVFoZTMwV2ZaWGRXQ0RBZjctSmhlZXVqUGJ6WjFwbzFqbzRKVDFJbW1GVWRRc0lZNmdOX0JMN2FqWkNtZG5uT3NBNHM5WG1BQ29VM3BQOFJOaW9UZmdyb3dlZU4xTnZWeFlrdFFKemFERDdRa2VESENVUl9xc0JnVWM0TUtZQmQ5VXpuSWZ1WVQ1Y0JoT0YzZVF5dWxyX0xGY3FGaVBMVjlnWmVNdW9JejVDMnUwR1A1aVRHczVpQWZicTFUNXJyLXhlLUhXdWNqZmRHOGxjVlczcndpN1JpalpnX2J5Wl81bmRNa1VtazNnOWttME04ZHRPM3g1TGxidG9mLWZnQUtoSFhaT2o0bVVxLXNLNHVLRV9tSjZvd0xGVDBsamNpUFhzNE15R25PcHRlcXhJRXFySWwtM2JXT2gya2k2bElqcDl2SU05NXptWTFKeDY1U29VMkFjd2RIM21ocmgzV0w4NWtWbHJ5UXcxczJjMkRkMlpNUGthSFhrUWdza0RFSU1IZlc1aXluRUcyTEZpUm5SY2d5MnBBbjZDck53OXpMYnY1eDlmV1VvTlFOYXdiSUFsN3FqYUJ2cnk4WllNYU9iNlhCRTdrblVidU1aUEtuc0dkMW5lYkRpNHFPN0hkSjUwakpfek1yYUFIOVhuRWhJXzN0SUh1Yy1oMV92RV9NUm0zOHU1b1MtYWFqWW1oZ2tSbEZ4ZUQ1Tm9QR1ROTXFDLkJOWlpXWVRCQU1UTTBDVGNBQnBSS0E"}' + headers: + Accept: [application/json] + Content-Length: ['43148'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599973b4b1da4.vault.azure.net/certificates/restore?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/3d33352494c14db39d79f293db4d4cfe","kid":"https://vault10511599973b4b1da4.vault.azure.net/keys/cert-name/3d33352494c14db39d79f293db4d4cfe","sid":"https://vault10511599973b4b1da4.vault.azure.net/secrets/cert-name/3d33352494c14db39d79f293db4d4cfe","x5t":"P58y5M_Ly32q8xqMyWxJXIbDmH8","cer":"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","attributes":{"enabled":true,"nbf":1567638725,"exp":1630797725,"created":1567639325,"updated":1567639325,"recoveryLevel":"Purgeable"},"policy":{"id":"https://vault10511599973b4b1da4.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639307,"updated":1567639307}}}'} + headers: {cache-control: no-cache, content-length: '2276', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:22:13 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599973b4b1da4.vault.azure.net, + /certificates/restore, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_crud_operations.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_crud_operations.yaml new file mode 100644 index 000000000000..3d09887c3e76 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_crud_operations.yaml @@ -0,0 +1,191 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:05 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975a0a1e1c.vault.azure.net, + /certificates/cert-name/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"ea606c577fa446748ab76a6d5a4ee90f"}'} + headers: + cache-control: no-cache + content-length: '1342' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:21:06 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '5', a, '0', a, '1', e, '1', c, ., v, a, u, l, t, + ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, c, + e, r, t, '-', n, a, m, e, /, p, e, n, d, i, n, g, '?', a, p, i, '-', v, e, + r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, t, _, i, d, '=', e, + a, '6', '0', '6', c, '5', '7', '7', f, a, '4', '4', '6', '7', '4', '8', a, + b, '7', '6', a, '6', d, '5', a, '4', e, e, '9', '0', f] + pragma: no-cache + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975a0a1e1c.vault.azure.net, + /certificates/cert-name/create, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"ea606c577fa446748ab76a6d5a4ee90f"}'} + headers: {cache-control: no-cache, content-length: '1342', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975a0a1e1c.vault.azure.net, + /certificates/cert-name/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"ea606c577fa446748ab76a6d5a4ee90f"}'} + headers: {cache-control: no-cache, content-length: '1342', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:16 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975a0a1e1c.vault.azure.net, + /certificates/cert-name/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name","request_id":"ea606c577fa446748ab76a6d5a4ee90f"}'} + headers: {cache-control: no-cache, content-length: '1259', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:26 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975a0a1e1c.vault.azure.net, + /certificates/cert-name/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/cfc0483e12114ff19838613309c668a0","kid":"https://vault10511599975a0a1e1c.vault.azure.net/keys/cert-name/cfc0483e12114ff19838613309c668a0","sid":"https://vault10511599975a0a1e1c.vault.azure.net/secrets/cert-name/cfc0483e12114ff19838613309c668a0","x5t":"BFtHG9Xw3t61jFTWaO4ZQOGpitM","cer":"MIIDWjCCAkKgAwIBAgIQeqcT/5KhQb6RRzD/d0IM3TANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wHhcNMTkwOTA0MjMxMTI2WhcNMjEwOTA0MjMyMTI2WjAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDH97+e5IW30ciqXwtRvTzbjKENv/Ce8Y8ZEa50u/jpAitFwJ+avCbMGxXrTg+1Vl3RNBjhfHoKgceazW6mBWllVptl9qrIJvG2BQVDKK5Zu+CTAJYnLR6TqLSavjtraSTQvj0lvQhL7Y4bAbAncx6sPSdL4obvXqV2HDM0ofYm2E4v9vp7F+fqBLpNU3mai8X3JetEYPsldDoemWfIT4talm8Fq2oUf1ghOVCzx/DFtLYZpusetgRTI29wwxFgN+KrtVulCoYelINnJUMi3sfNNlwLnXNI8W5xaNZ9HWhrv9tp7ZfVlB5apVCQbDCaub+QGbvmWQcWZuiOg3b5p7AHAgMBAAGjgZswgZgwDgYDVR0PAQH/BAQDAgWgMAkGA1UdEwQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MB8GA1UdIwQYMBaAFBpl3LxoYs4CLVeiebPX/jkg0VpRMB0GA1UdDgQWBBQaZdy8aGLOAi1Xonmz1/45INFaUTANBgkqhkiG9w0BAQsFAAOCAQEAt/B7XYOOQcKvMaAI/rSrHB3sq4ce1zniUoyAPyUqRW2JaxwEpmW2X9XOM0usMwUKiBbJ5cSqgIAI0bYoQmydW3vKGdpvOYIFSxQ2Xs2uq4Czhf4hRwVmW/+f7esU9QoFE6LPbXzO/3hXmj1kQ5lUYfFCk0ZSYEu2Ip6DmQ3UuDAXQ7eMZORSompdgV5QH8FF+T1fitiD9sdyNph41SydaSTTlOa0H7JGmkCBxJnmtcWMpue0QDa1EQKJzI9EqrGs8Km7ohr4o6zo5WWV4mJEj2j2PAJnX2KVDjNu3s5mTa0nj+Wn9wNcLraHqLhYtiP3YxARc/fXZaVAQmKteDsszg==","attributes":{"enabled":true,"nbf":1567638686,"exp":1630797686,"created":1567639286,"updated":1567639286,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639266,"updated":1567639266}},"pending":{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending"}}'} + headers: {cache-control: no-cache, content-length: '2429', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:32 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975a0a1e1c.vault.azure.net, + /certificates/cert-name/, api-version=7.0, ''] +- request: + body: '{"tags": {"foo": "updated tag"}}' + headers: + Accept: [application/json] + Content-Length: ['32'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: PATCH + uri: https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/cfc0483e12114ff19838613309c668a0","kid":"https://vault10511599975a0a1e1c.vault.azure.net/keys/cert-name/cfc0483e12114ff19838613309c668a0","sid":"https://vault10511599975a0a1e1c.vault.azure.net/secrets/cert-name/cfc0483e12114ff19838613309c668a0","x5t":"BFtHG9Xw3t61jFTWaO4ZQOGpitM","cer":"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","attributes":{"enabled":true,"nbf":1567638686,"exp":1630797686,"created":1567639286,"updated":1567639292,"recoveryLevel":"Recoverable+Purgeable"},"tags":{"foo":"updated + tag"},"policy":{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639266,"updated":1567639266}},"pending":{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending"}}'} + headers: {cache-control: no-cache, content-length: '2458', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:32 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975a0a1e1c.vault.azure.net, + /certificates/cert-name/, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault10511599975a0a1e1c.vault.azure.net/deletedcertificates/cert-name","deletedDate":1567639292,"scheduledPurgeDate":1575415292,"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/cfc0483e12114ff19838613309c668a0","kid":"https://vault10511599975a0a1e1c.vault.azure.net/keys/cert-name/cfc0483e12114ff19838613309c668a0","sid":"https://vault10511599975a0a1e1c.vault.azure.net/secrets/cert-name/cfc0483e12114ff19838613309c668a0","x5t":"BFtHG9Xw3t61jFTWaO4ZQOGpitM","cer":"MIIDWjCCAkKgAwIBAgIQeqcT/5KhQb6RRzD/d0IM3TANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wHhcNMTkwOTA0MjMxMTI2WhcNMjEwOTA0MjMyMTI2WjAaMRgwFgYDVQQDDA8qLm1pY3Jvc29mdC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDH97+e5IW30ciqXwtRvTzbjKENv/Ce8Y8ZEa50u/jpAitFwJ+avCbMGxXrTg+1Vl3RNBjhfHoKgceazW6mBWllVptl9qrIJvG2BQVDKK5Zu+CTAJYnLR6TqLSavjtraSTQvj0lvQhL7Y4bAbAncx6sPSdL4obvXqV2HDM0ofYm2E4v9vp7F+fqBLpNU3mai8X3JetEYPsldDoemWfIT4talm8Fq2oUf1ghOVCzx/DFtLYZpusetgRTI29wwxFgN+KrtVulCoYelINnJUMi3sfNNlwLnXNI8W5xaNZ9HWhrv9tp7ZfVlB5apVCQbDCaub+QGbvmWQcWZuiOg3b5p7AHAgMBAAGjgZswgZgwDgYDVR0PAQH/BAQDAgWgMAkGA1UdEwQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MB8GA1UdIwQYMBaAFBpl3LxoYs4CLVeiebPX/jkg0VpRMB0GA1UdDgQWBBQaZdy8aGLOAi1Xonmz1/45INFaUTANBgkqhkiG9w0BAQsFAAOCAQEAt/B7XYOOQcKvMaAI/rSrHB3sq4ce1zniUoyAPyUqRW2JaxwEpmW2X9XOM0usMwUKiBbJ5cSqgIAI0bYoQmydW3vKGdpvOYIFSxQ2Xs2uq4Czhf4hRwVmW/+f7esU9QoFE6LPbXzO/3hXmj1kQ5lUYfFCk0ZSYEu2Ip6DmQ3UuDAXQ7eMZORSompdgV5QH8FF+T1fitiD9sdyNph41SydaSTTlOa0H7JGmkCBxJnmtcWMpue0QDa1EQKJzI9EqrGs8Km7ohr4o6zo5WWV4mJEj2j2PAJnX2KVDjNu3s5mTa0nj+Wn9wNcLraHqLhYtiP3YxARc/fXZaVAQmKteDsszg==","attributes":{"enabled":true,"nbf":1567638686,"exp":1630797686,"created":1567639286,"updated":1567639292,"recoveryLevel":"Recoverable+Purgeable"},"tags":{"foo":"updated + tag"},"policy":{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639266,"updated":1567639266}},"pending":{"id":"https://vault10511599975a0a1e1c.vault.azure.net/certificates/cert-name/pending"}}'} + headers: {cache-control: no-cache, content-length: '2608', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:32 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975a0a1e1c.vault.azure.net, + /certificates/cert-name, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_list_operations.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_list_operations.yaml new file mode 100644 index 000000000000..20f090aa8879 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_list_operations.yaml @@ -0,0 +1,352 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate0/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:22:32 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate0/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate0/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate0/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"06137c75ccd840e0b5c30cd251fef482"}'} + headers: + cache-control: no-cache + content-length: '1345' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:22:33 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '5', a, b, '9', '1', e, '2', a, ., v, a, u, l, t, + ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, c, + e, r, t, i, f, i, c, a, t, e, '0', /, p, e, n, d, i, n, g, '?', a, p, i, '-', + v, e, r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, t, _, i, d, + '=', '0', '6', '1', '3', '7', c, '7', '5', c, c, d, '8', '4', '0', e, '0', + b, '5', c, '3', '0', c, d, '2', '5', '1', f, e, f, '4', '8', '2'] + pragma: no-cache + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate0/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate1/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate1/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"a6df80136d8e4fe79c3f7f0cf749bf43"}'} + headers: + cache-control: no-cache + content-length: '1345' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:22:34 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '5', a, b, '9', '1', e, '2', a, ., v, a, u, l, t, + ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, c, + e, r, t, i, f, i, c, a, t, e, '1', /, p, e, n, d, i, n, g, '?', a, p, i, '-', + v, e, r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, t, _, i, d, + '=', a, '6', d, f, '8', '0', '1', '3', '6', d, '8', e, '4', f, e, '7', '9', + c, '3', f, '7', f, '0', c, f, '7', '4', '9', b, f, '4', '3'] + pragma: no-cache + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate1/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate2/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate2/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"4429b8a0cc8547c3a59d54e3731ab8f4"}'} + headers: + cache-control: no-cache + content-length: '1345' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:22:34 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '5', a, b, '9', '1', e, '2', a, ., v, a, u, l, t, + ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, c, + e, r, t, i, f, i, c, a, t, e, '2', /, p, e, n, d, i, n, g, '?', a, p, i, '-', + v, e, r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, t, _, i, d, + '=', '4', '4', '2', '9', b, '8', a, '0', c, c, '8', '5', '4', '7', c, '3', + a, '5', '9', d, '5', '4', e, '3', '7', '3', '1', a, b, '8', f, '4'] + pragma: no-cache + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate2/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate3/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate3/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAjydERQrmeiib3FN74SyfvLaq+MoLKNQhRdRq/fM2rszxiXpz2TzXiO3EtsEbckf2WEL99Isd/5mAa09k9rAarhhMp/4Ih2l29YBd8bucS9wsJ/47g+EPR8CSel5kEWmxbwdMeMT5MtVipflsdDz1OgNhLzvXw15ah0uVBRnQ0DOtaJXOjBDAR94hWkBpTbQ64QTUO+PcXTU8mZxgEu+llx/E85Eq5Oj/KLWsJHd8DlFHENKJyHe8K2N6kb1bNKn+FwlQqr67WFV2diWWVasfXzmGgZMVE3PvxkYYbCg6QIjp92ZR0BYPz3xo0n30Ihvr1aPvWPS9SK73BjjUAo5g7wIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAIuah6OsGTt7MCkJvprSiTSXkvtP00+WQo1/UXmTZ3BJaHaavimJT76Se7TT2kZHRWlj9in+jzqyNoxEFYAeiUQ4+y5ngC2Cmf2i+SpyCHoDHfMbczcNz4LY70lHl/yhw2jIlOmWOtu7sNp6IH6cj/ON0fRPmXWvJicRMGxQpfdSCFqRHIF84cctLNIp9NRTA/XoD39Ljyqb1rTMf4/F9zJb45jYdC7u1MmrV240vNEsuqLmwRuqouBh4GErfFixCWzF/elL5wC2YuvKtR2mWZPuJ9t2xb96k04yyN/77nr7UIE49xS1LM0C/U/wEeJGcCvs5Ej+hK/3reCcGP482Bw=","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"92aded50e1274d889173596d0669434b"}'} + headers: + cache-control: no-cache + content-length: '1345' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:22:35 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '5', a, b, '9', '1', e, '2', a, ., v, a, u, l, t, + ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, c, + e, r, t, i, f, i, c, a, t, e, '3', /, p, e, n, d, i, n, g, '?', a, p, i, '-', + v, e, r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, t, _, i, d, + '=', '9', '2', a, d, e, d, '5', '0', e, '1', '2', '7', '4', d, '8', '8', '9', + '1', '7', '3', '5', '9', '6', d, '0', '6', '6', '9', '4', '3', '4', b] + pragma: no-cache + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate3/create, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate0/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate0/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"06137c75ccd840e0b5c30cd251fef482"}'} + headers: {cache-control: no-cache, content-length: '1345', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:22:35 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate0/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate0/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate0/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate0","request_id":"06137c75ccd840e0b5c30cd251fef482"}'} + headers: {cache-control: no-cache, content-length: '1265', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:22:45 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate0/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate1/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate1/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate1","request_id":"a6df80136d8e4fe79c3f7f0cf749bf43"}'} + headers: {cache-control: no-cache, content-length: '1265', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:22:50 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate1/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate2/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate2/pending","issuer":{"name":"Self"},"csr":"MIICyDCCAbACAQAwGjEYMBYGA1UEAwwPKi5taWNyb3NvZnQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqnO22tRfMNgdrWp09PDDV+kJI3XOW6N0tKCUzQeUVseo0LrCiKIwXMysdFo8R+kG2I/w1LeU4XCeg2R6DmSk1+FStnGJ6VLye+3ImPqP8YQXPrNeTYW5f4JJ4hoxpSKXONqfgXNErQTK3SvFn7qSO2L9UgiqvWYPpJ90lZdnotzfENXgkTSoV6N3JjbdQtp1V0yPbj6kDBsi/IgbcYpRS/Cvy3cjK31R6RPDNbYFIjqx4tudV0TI4cMctvEl5i/VetERRj3UzoFVQVDOFwgPCeXH9ZttAE+fvnGCmGyyfTfrPzsLhw9ABkNE5+mR5dtak3NTDAZGTlSMXwr4YJw3lQIDAQABoGkwZwYJKoZIhvcNAQkOMVowWDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBwGA1UdEQQVMBOCEXNkay5henVyZS1pbnQubmV0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQADggEBAGfO8cHXxhSMrpAFCyTIDU7jcu05PYPF4upWamX2n4E80nbghZk+UkIg+Klwf1gL/Cw4XfFwIw5l3T/hUAwzM2FPl4lYr6ePMaLcxLXgDbIG6LZ9+xUAD6Biu8Hr2+w2oZ94diZ5TOgdl0zNiZfImha/973DIY1jv1Aj5ijbeWa0N/4/HZURHoi/rbjscspp0P2zCdYzB2jkjJjRUmT/scFWsFPlbPGlw/pl8hdRtilENJa5+nfNEiMihF7Gvc0xH3QgaMMxcj45UAgKQ0q58NrrPdOXDUvSsMYEwY6qF1lP4NnFAQbhvXg86J/3suGaX2Y0m8gwbbdkRykIlcJI1TU=","cancellation_requested":false,"status":"completed","target":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate2","request_id":"4429b8a0cc8547c3a59d54e3731ab8f4"}'} + headers: {cache-control: no-cache, content-length: '1265', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:22:56 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate2/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate3/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate3/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate3","request_id":"92aded50e1274d889173596d0669434b"}'} + headers: {cache-control: no-cache, content-length: '1265', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:23:00 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/certificate3/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates?api-version=7.0 + response: + body: {string: '{"value":[{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate0","x5t":"_uLpSQSBBACR7D_F4nXiDdgUrZA","attributes":{"enabled":true,"nbf":1567638762,"exp":1630797762,"created":1567639362,"updated":1567639362},"subject":""},{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate1","x5t":"BztUSITf59KUotl37Vd03_EaqiI","attributes":{"enabled":true,"nbf":1567638762,"exp":1630797762,"created":1567639362,"updated":1567639362},"subject":""},{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate2","x5t":"8KR8c4FVCRM-7xVqXN6IRFdesbw","attributes":{"enabled":true,"nbf":1567638762,"exp":1630797762,"created":1567639362,"updated":1567639362},"subject":""},{"id":"https://vault10511599975ab91e2a.vault.azure.net/certificates/certificate3","x5t":"uNwkc7X07ZIsQn0sWuNQFykvtzw","attributes":{"enabled":true,"nbf":1567638762,"exp":1630797762,"created":1567639362,"updated":1567639362},"subject":""}],"nextLink":null}'} + headers: {cache-control: no-cache, content-length: '979', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:23:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975ab91e2a.vault.azure.net/certificates/cert-name/versions?api-version=7.0 + response: + body: {string: '{"value":[],"nextLink":null}'} + headers: {cache-control: no-cache, content-length: '28', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:23:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /certificates/cert-name/versions, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault10511599975ab91e2a.vault.azure.net/deletedcertificates?api-version=7.0 + response: + body: {string: '{"value":[],"nextLink":null}'} + headers: {cache-control: no-cache, content-length: '28', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:23:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault10511599975ab91e2a.vault.azure.net, + /deletedcertificates, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_recover.yaml b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_recover.yaml new file mode 100644 index 000000000000..50e570ff41d2 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/recordings/test_examples_certificates_async.test_example_certificate_recover.yaml @@ -0,0 +1,326 @@ +interactions: +- request: + body: null + headers: + Accept: [application/json] + Content-Length: ['0'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"error":{"code":"Unauthorized","message":"Request is missing + a Bearer or PoP token."}}'} + headers: {cache-control: no-cache, content-length: '87', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:06 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + www-authenticate: 'Bearer authorization="https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47", + resource="https://vault.azure.net"', x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 401, message: Unauthorized} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /certificates/cert-name/create, api-version=7.0, ''] +- request: + body: '{"policy": {"key_props": {"exportable": true, "kty": "RSA", "key_size": + 2048, "reuse_key": false}, "secret_props": {"contentType": "application/x-pkcs12"}, + "x509_props": {"subject": "CN=*.microsoft.com", "sans": {"dns_names": ["sdk.azure-int.net"]}, + "validity_months": 24}, "issuer": {"name": "Self"}}}' + headers: + Accept: [application/json] + Content-Length: ['302'] + Content-Type: [application/json; charset=utf-8] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/create?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"47fabc333e9c40329057e013361f455f"}'} + headers: + cache-control: no-cache + content-length: '1342' + content-type: application/json; charset=utf-8 + date: Wed, 04 Sep 2019 23:21:07 GMT + expires: '-1' + location: [h, t, t, p, s, ':', /, /, v, a, u, l, t, '1', '0', '5', '1', '1', + '5', '9', '9', '9', '7', '7', '5', '5', '3', '1', a, c, '1', ., v, a, u, l, + t, ., a, z, u, r, e, ., n, e, t, /, c, e, r, t, i, f, i, c, a, t, e, s, /, + c, e, r, t, '-', n, a, m, e, /, p, e, n, d, i, n, g, '?', a, p, i, '-', v, + e, r, s, i, o, n, '=', '7', ., '0', '&', r, e, q, u, e, s, t, _, i, d, '=', + '4', '7', f, a, b, c, '3', '3', '3', e, '9', c, '4', '0', '3', '2', '9', '0', + '5', '7', e, '0', '1', '3', '3', '6', '1', f, '4', '5', '5', f] + pragma: no-cache + server: Microsoft-IIS/10.0 + strict-transport-security: max-age=31536000;includeSubDomains + x-aspnet-version: 4.0.30319 + x-content-type-options: nosniff + x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork; + x-ms-keyvault-region: westus + x-ms-keyvault-service-version: 1.1.0.876 + x-powered-by: ASP.NET + status: {code: 202, message: Accepted} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /certificates/cert-name/create, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"47fabc333e9c40329057e013361f455f"}'} + headers: {cache-control: no-cache, content-length: '1342', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:07 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /certificates/cert-name/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"inProgress","status_details":"Pending + certificate created. Certificate request is in progress. This may take some + time based on the issuer provider. Please check again later.","request_id":"47fabc333e9c40329057e013361f455f"}'} + headers: {cache-control: no-cache, content-length: '1342', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:18 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /certificates/cert-name/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending","issuer":{"name":"Self"},"csr":"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","cancellation_requested":false,"status":"completed","target":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name","request_id":"47fabc333e9c40329057e013361f455f"}'} + headers: {cache-control: no-cache, content-length: '1259', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:28 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /certificates/cert-name/pending, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: DELETE + uri: https://vault105115999775531ac1.vault.azure.net/certificates/cert-name?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name","deletedDate":1567639293,"scheduledPurgeDate":1575415293,"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/e06bec0e992a41c3b88a15ef2f644e77","kid":"https://vault105115999775531ac1.vault.azure.net/keys/cert-name/e06bec0e992a41c3b88a15ef2f644e77","sid":"https://vault105115999775531ac1.vault.azure.net/secrets/cert-name/e06bec0e992a41c3b88a15ef2f644e77","x5t":"MsOUQGgynGh9brScHMqWswJzo74","cer":"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","attributes":{"enabled":true,"nbf":1567638687,"exp":1630797687,"created":1567639287,"updated":1567639287,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639268,"updated":1567639268}},"pending":{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending"}}'} + headers: {cache-control: no-cache, content-length: '2579', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:33 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /certificates/cert-name, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: {cache-control: no-cache, content-length: '93', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:33 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /deletedcertificates/cert-name, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: {cache-control: no-cache, content-length: '93', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:36 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /deletedcertificates/cert-name, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: {cache-control: no-cache, content-length: '93', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:39 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /deletedcertificates/cert-name, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: {cache-control: no-cache, content-length: '93', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:43 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /deletedcertificates/cert-name, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: {cache-control: no-cache, content-length: '93', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:46 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /deletedcertificates/cert-name, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"error":{"code":"CertificateNotFound","message":"Deleted Certificate + not found: cert-name"}}'} + headers: {cache-control: no-cache, content-length: '93', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:49 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 404, message: Not Found} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /deletedcertificates/cert-name, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name","deletedDate":1567639293,"scheduledPurgeDate":1575415293,"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/e06bec0e992a41c3b88a15ef2f644e77","kid":"https://vault105115999775531ac1.vault.azure.net/keys/cert-name/e06bec0e992a41c3b88a15ef2f644e77","sid":"https://vault105115999775531ac1.vault.azure.net/secrets/cert-name/e06bec0e992a41c3b88a15ef2f644e77","x5t":"MsOUQGgynGh9brScHMqWswJzo74","cer":"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","attributes":{"enabled":true,"nbf":1567638687,"exp":1630797687,"created":1567639287,"updated":1567639287,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639268,"updated":1567639268}},"pending":{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending"}}'} + headers: {cache-control: no-cache, content-length: '2579', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:52 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /deletedcertificates/cert-name, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: GET + uri: https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name?api-version=7.0 + response: + body: {string: '{"recoveryId":"https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name","deletedDate":1567639293,"scheduledPurgeDate":1575415293,"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/e06bec0e992a41c3b88a15ef2f644e77","kid":"https://vault105115999775531ac1.vault.azure.net/keys/cert-name/e06bec0e992a41c3b88a15ef2f644e77","sid":"https://vault105115999775531ac1.vault.azure.net/secrets/cert-name/e06bec0e992a41c3b88a15ef2f644e77","x5t":"MsOUQGgynGh9brScHMqWswJzo74","cer":"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","attributes":{"enabled":true,"nbf":1567638687,"exp":1630797687,"created":1567639287,"updated":1567639287,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639268,"updated":1567639268}},"pending":{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending"}}'} + headers: {cache-control: no-cache, content-length: '2579', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:52 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /deletedcertificates/cert-name, api-version=7.0, ''] +- request: + body: null + headers: + Accept: [application/json] + User-Agent: [azsdk-python-keyvault-certificates/4.0.0b1 Python/3.6.6 (Windows-10-10.0.18362-SP0)] + method: POST + uri: https://vault105115999775531ac1.vault.azure.net/deletedcertificates/cert-name/recover?api-version=7.0 + response: + body: {string: '{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/e06bec0e992a41c3b88a15ef2f644e77","kid":"https://vault105115999775531ac1.vault.azure.net/keys/cert-name/e06bec0e992a41c3b88a15ef2f644e77","sid":"https://vault105115999775531ac1.vault.azure.net/secrets/cert-name/e06bec0e992a41c3b88a15ef2f644e77","x5t":"MsOUQGgynGh9brScHMqWswJzo74","cer":"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","attributes":{"enabled":true,"nbf":1567638687,"exp":1630797687,"created":1567639287,"updated":1567639287,"recoveryLevel":"Recoverable+Purgeable"},"policy":{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/policy","key_props":{"exportable":true,"kty":"RSA","key_size":2048,"reuse_key":false},"secret_props":{"contentType":"application/x-pkcs12"},"x509_props":{"subject":"CN=*.microsoft.com","sans":{"dns_names":["sdk.azure-int.net"]},"ekus":["1.3.6.1.5.5.7.3.1","1.3.6.1.5.5.7.3.2"],"key_usage":["digitalSignature","keyEncipherment"],"validity_months":24,"basic_constraints":{"ca":false}},"lifetime_actions":[{"trigger":{"lifetime_percentage":80},"action":{"action_type":"AutoRenew"}}],"issuer":{"name":"Self"},"attributes":{"enabled":true,"created":1567639268,"updated":1567639268}},"pending":{"id":"https://vault105115999775531ac1.vault.azure.net/certificates/cert-name/pending"}}'} + headers: {cache-control: no-cache, content-length: '2429', content-type: application/json; + charset=utf-8, date: 'Wed, 04 Sep 2019 23:21:52 GMT', expires: '-1', pragma: no-cache, + server: Microsoft-IIS/10.0, strict-transport-security: max-age=31536000;includeSubDomains, + x-aspnet-version: 4.0.30319, x-content-type-options: nosniff, x-ms-keyvault-network-info: addr=131.107.160.72;act_addr_fam=InterNetwork;, + x-ms-keyvault-region: westus, x-ms-keyvault-service-version: 1.1.0.876, x-powered-by: ASP.NET} + status: {code: 200, message: OK} + url: !!python/object/new:yarl.URL + state: !!python/tuple + - !!python/object/new:urllib.parse.SplitResult [https, vault105115999775531ac1.vault.azure.net, + /deletedcertificates/cert-name/recover, api-version=7.0, ''] +version: 1 diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/seed.txt b/sdk/keyvault/azure-keyvault-certificates/tests/seed.txt new file mode 100644 index 000000000000..799fcfa589bf --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/seed.txt @@ -0,0 +1 @@ +iscai-msft \ No newline at end of file diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/test_certificates_client.py b/sdk/keyvault/azure-keyvault-certificates/tests/test_certificates_client.py new file mode 100644 index 000000000000..0f090ba59f1d --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/test_certificates_client.py @@ -0,0 +1,708 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +import itertools +import time + +from azure_devtools.scenario_tests import RecordingProcessor, RequestUrlNormalizer + +from azure.keyvault.certificates import AdministratorDetails, Contact, CertificatePolicy, KeyProperties +from azure.keyvault.certificates._shared import parse_vault_id +from devtools_testutils import ResourceGroupPreparer +from certificates_preparer import VaultClientPreparer +from certificates_test_case import KeyVaultTestCase +from azure.keyvault.certificates._shared._generated.v7_0.models import CertificatePolicy as CertificatePolicyGenerated +from azure.keyvault.certificates._shared._generated.v7_0.models import ( + SecretProperties, IssuerParameters, X509CertificateProperties, + SubjectAlternativeNames, LifetimeAction, Trigger, Action, ActionType, IssuerAttributes) +from azure.keyvault.certificates.models import Issuer, IssuerBase + +class RetryAfterReplacer(RecordingProcessor): + """Replace the retry after wait time in the replay process to 0.""" + + def process_response(self, response): + if 'retry-after' in response['headers']: + response['headers']['retry-after'] = '0' + return response + + +class CertificateClientTests(KeyVaultTestCase): + FILTER_HEADERS = [ + 'authorization', + 'client-request-id', + 'x-ms-client-request-id', + 'x-ms-correlation-request-id', + 'x-ms-ratelimit-remaining-subscription-reads', + 'x-ms-request-id', + 'x-ms-routing-request-id', + 'x-ms-gateway-service-instanceid', + 'x-ms-ratelimit-remaining-tenant-reads', + 'x-ms-served-by', + 'x-ms-authorization-auxiliary' + ] + def __init__(self, *args, **kwargs): + super(CertificateClientTests, self).__init__(*args, replay_processors=[RetryAfterReplacer(), RequestUrlNormalizer()], **kwargs) + + def _import_common_certificate(self, client, cert_name): + cert_content = b'0\x82\t;\x02\x01\x030\x82\x08\xf7\x06\t*\x86H\x86\xf7\r\x01\x07\x01\xa0\x82\x08\xe8\x04\x82\x08\xe40\x82\x08\xe00\x82\x06\t\x06\t*\x86H\x86\xf7\r\x01\x07\x01\xa0\x82\x05\xfa\x04\x82\x05\xf60\x82\x05\xf20\x82\x05\xee\x06\x0b*\x86H\x86\xf7\r\x01\x0c\n\x01\x02\xa0\x82\x04\xfe0\x82\x04\xfa0\x1c\x06\n*\x86H\x86\xf7\r\x01\x0c\x01\x030\x0e\x04\x08\xf5\xe5\x81\xfd\xa4\xe19\xf0\x02\x02\x07\xd0\x04\x82\x04\xd8.\xb2>H\n\xee\xd9\xd0YE\x04e%\x8e\xd7Cr\xde.F\xa1\xd8W\x11Gw@L;!ght \r\xa8\x06\xb9\x10!\xdb\x0b\xc8\x00\x16g}\xaaa\x1dj\x91lK\x1e\x7f@\xa9x.\xdb\xb0\x04l\xe97\xe7\xeaHM\x96\xa2\xcb\xad\xd8`\x19$\xa5\x1f\xa9\r\xd9\xe0f\xdd}gC\xd6\xacl\x07\x12\xaes\xe8\x11\xd2\xd8b\xf2\xc8\xdf\x12H\xe0\x9bw0\xb3\xed\xb9c\xdf\xee\xc8e\x8a\x0c\x8f\x85\x8e>\x03\xa6\xfe\xd4:S\x8e\x12\x15g\xa4\xe3\xa407l\xde\x03\x88\xbd\xee\xfe\xdf\xb4\xd3g\xb3n\xe6\xb3\x9d\xa3\xa9\xf8N\xbd0=s\xfc2}\x92\x80c\x86\x8a%\xf6\x18Rl\x9c*9\xe7F]5\xdaWR\xdaS\xa4\x01!m\xfa[\xb8@&\xbb\xd8\x86:x\xfbQ\xb9\xd3\xc2\xbel\xd1\xbfjd-\x84\xba\xcfw\x08\xee\x89\x93\xf2q\xcf\xdc<\xa64\xea\x8blZ\xab\xe4\xed\x8c\xd5\x96\x1a,.\xb7C|m\xdd\xe5om\xc3\xe1\xdc\xdd<\x0fXG\x92\x1c\xff(4\xef\x91\x10\x10\xa6\xfa\xd6\xf0\x84\x8a\x9a\x00\xdd\x9b3y\xe4\xf7\xb9\xe7\x11\xdfIa\x81\xee\x03\xf0\xf2\xc6^k\x9e\xc8\xc4\\\xd6\x1d2\xb6\xca\xf4\xec\x96\x8a\x16\xa2\x8b&\x1b\x16\xa7a\x8d\x88\x1b\xf9\xe8\xdcF\xcf9`\xca\x8c\xf6x\x8aV\t{\x92I\xda)\xa6\x97\x13\xf3\xfbg\xb6\x10\xe0\x8a\xa42>\xed\xfc\xd0q\x1c\xf7=7w\x04\xaf\x9b\xb9\xd6|iu\xfcio\xe5:\x02\x92\xf1i\xb1f\x82\xa78\x90MY\xe4\xcdY\x01n\x82i-]\xf7O\x1c\x07q2\x18\xd4^\xa7\x86A\xdf0N\xf6x\x134\r5\xa7\xe8\xbf\t\x08\xec\x85\x7fe\x8a\x1a\xfb\xe4F\xa1\xf5Q\xdd\x96\xd1J M\x17\xa4\xc3\x8f\xfa\x97\x16\xdd07\xf0\x90\x9e\xc1\x80\x99\x00\x066#~\x0f\x89\x98\xee-\xb9v\xd4\xee\xfc\x97;;\x12\xdd\x84\x05\x05\xa4|\x89\xa7*\xd8X\xb7\xef:$\xb9Y\x80^\x101\xe4\x88\xf5\x1a\xff\xc7\x99H\xf071u\x99GTb\xb8;\xee6\xa3#r\xddRK\x07W\x004\xed\x17\xaf%\xfdD\xb5\x92\xc5:\xe7\xbf\x97H/\xba\x97-@\xfe\xeas\xf9~\xf5\xf8.\x07\xa3\xa5\xb4\xef\x9dc\xe5\x93\x13\xeb\x12\xa3\x1a\x1eiy\xee\xccV\xe7n\xc4\x8c\xd7\x8db2\xdd\x84\x9d\xd1\xf2\x13\xddM\x00\xe4\xd2\xc4\xbc\x9fk~Lz&!\xe3D\xbczW[j\xb2\xbbS\xe8\x1b\x06\xb6`\x90GU\x02$\xf2\xea\xb0\xa5C\xbc\x02\r\xc7w\x0f\x03\xf0\x86\xaa\xbeN_`FfP"\x84i\x8d\xea~\xe0\xbf\xcc8;I4,\xf4\xc0{\x96\x1e~\x05\xcd\xdeoi\x13\xce\xbb7}F\xb4uYh\x9f\xd4V\x00\xcda-\xa3\xba\xc7\x9d\xe2\xbc;\xe9\x95\x8d\xe3V\xa4\xc7d\r\xd0\x94\x9e0\x9a\x87^\xa5s\xe8\x02\x9f\xcf\xc2\x02K\xf7E\x9cA\xb2\x04\xdaW\x88\xc4q\xad\x8f\xd0<\xa8\xbf\xc0\xe3p\xaa\xc6\xc3\xc5\x15\xbb\xbd\x94U*\xce\xfc\xa4\x19\x04\xd2K\x1aJ\x19Y\x93\x91\xa4y\xac\x83X/\xfb\x1e/\xcd\xa9Am"Z\n\xf5pw\xa5\xa2\xf1\xa3P\xc6\xbb\x9a\xaah]\xf8\x8d\x97d\xb79\x17\xa7K\x99\xaa\x9a~\x15\xf2\x99j*/2;|\x17\xbc\x87\x08\xf9>-\x8aQ\xb1M\x82\xc9\xcfCV\x80\xc0\xea\xb2 \x7f\xeb\x84?\x88\xe9\xa6\x07\xa1\xb3\x1c\x93\xd2RGk\x1d\xad\xf3\xafQ\xda6\x1d\xb1|\x18Qx\xe0\xc0r\x15\xd2\xfa#\xed\xb2X[7\x91\xfdE\xd1r\xf0o\xd6\xdb\x7fm\x8c;\xb59\x88\xc1\x0f\'b\x06\xac\xc1\x9f\xc1\xc6\xd44\xa3\xd4\xf8\xdc\xd2G\x7f\xf3gxeM7\xd3\xc2\x85L-\xf2\x19\xc4ZwA\xa7\x10}\x0e\x8bx\x84\'\xd1\xdb\xae%\x1b}S\x1b\\\xd1\xce\x17\xe3$\xb5h\x83V\xac\xe7tc\n\x9a\xe2Ru\xf4\xc1*\xf1\x85\xbd\xe8\xc0YS\xb9\x13\x89\xa0.\xfa\x1a2f\xdc\x85\xcd\xc1;\xbb\x0bz\xb6\x87\x9c\x93y\x86\xf3\x01h\xb7\x10#\x7f\r\xf3\xa9\x94}4|\x00\xfe\x80\'\xd76\x93\x9dx)\xa0\xcbrY\xb8\xcf\xa2|t\xcc\xfa\xd2u\x1e\xa3\x90\xf7`==\x1b\xa0Z\xbcQ\xf1J\xf2|0]\x0b\xbb\x9c\xce\x171\x1e<4E\x9b\xd9\x87\xf1m\r\xfe\xc1e!\xa6\x1f\x0f\xf1\x96S\xfc8\xe2d.r6\x81\x93\xdeX\xb6\xa3\x86D\x88\xf9\xf2\xd1\x83Z\xbf"Q\xd1\xf0i\x82\x86\xa9M\xb8\xccg\x91i\xefC\x84U\xcf\xcd\x9b!WVF\xb0\x14\x05E\xaa\x18\x93"\xc0\xc1\xd2V!t\xe2\xf9\xcd\xfba\xa0\xbc\x15\x14\x84\x9esfK\xbfC\xa2\xedJspo+\x81\x18(\x00\xf6+\x18\xedQ\xe6\xebW^\xf8\x80=\x10\xfb\xd6.\'A\x979;)\x06\xf0\x85w\x95S\xd9\x1c9\xcc3k\x03\xf2w\x17\x97\xcc\nN0;0\x1f0\x07\x06\x05+\x0e\x03\x02\x1a\x04\x14\xb1\x82\x1d\xb1\xc8_\xbc\xf1^/\x01\xf7\xc1\x99\x95\xef\xf1H\n\xee\xd9\xd0YE\x04e%\x8e\xd7Cr\xde.F\xa1\xd8W\x11Gw@L;!ght \r\xa8\x06\xb9\x10!\xdb\x0b\xc8\x00\x16g}\xaaa\x1dj\x91lK\x1e\x7f@\xa9x.\xdb\xb0\x04l\xe97\xe7\xeaHM\x96\xa2\xcb\xad\xd8`\x19$\xa5\x1f\xa9\r\xd9\xe0f\xdd}gC\xd6\xacl\x07\x12\xaes\xe8\x11\xd2\xd8b\xf2\xc8\xdf\x12H\xe0\x9bw0\xb3\xed\xb9c\xdf\xee\xc8e\x8a\x0c\x8f\x85\x8e>\x03\xa6\xfe\xd4:S\x8e\x12\x15g\xa4\xe3\xa407l\xde\x03\x88\xbd\xee\xfe\xdf\xb4\xd3g\xb3n\xe6\xb3\x9d\xa3\xa9\xf8N\xbd0=s\xfc2}\x92\x80c\x86\x8a%\xf6\x18Rl\x9c*9\xe7F]5\xdaWR\xdaS\xa4\x01!m\xfa[\xb8@&\xbb\xd8\x86:x\xfbQ\xb9\xd3\xc2\xbel\xd1\xbfjd-\x84\xba\xcfw\x08\xee\x89\x93\xf2q\xcf\xdc<\xa64\xea\x8blZ\xab\xe4\xed\x8c\xd5\x96\x1a,.\xb7C|m\xdd\xe5om\xc3\xe1\xdc\xdd<\x0fXG\x92\x1c\xff(4\xef\x91\x10\x10\xa6\xfa\xd6\xf0\x84\x8a\x9a\x00\xdd\x9b3y\xe4\xf7\xb9\xe7\x11\xdfIa\x81\xee\x03\xf0\xf2\xc6^k\x9e\xc8\xc4\\\xd6\x1d2\xb6\xca\xf4\xec\x96\x8a\x16\xa2\x8b&\x1b\x16\xa7a\x8d\x88\x1b\xf9\xe8\xdcF\xcf9`\xca\x8c\xf6x\x8aV\t{\x92I\xda)\xa6\x97\x13\xf3\xfbg\xb6\x10\xe0\x8a\xa42>\xed\xfc\xd0q\x1c\xf7=7w\x04\xaf\x9b\xb9\xd6|iu\xfcio\xe5:\x02\x92\xf1i\xb1f\x82\xa78\x90MY\xe4\xcdY\x01n\x82i-]\xf7O\x1c\x07q2\x18\xd4^\xa7\x86A\xdf0N\xf6x\x134\r5\xa7\xe8\xbf\t\x08\xec\x85\x7fe\x8a\x1a\xfb\xe4F\xa1\xf5Q\xdd\x96\xd1J M\x17\xa4\xc3\x8f\xfa\x97\x16\xdd07\xf0\x90\x9e\xc1\x80\x99\x00\x066#~\x0f\x89\x98\xee-\xb9v\xd4\xee\xfc\x97;;\x12\xdd\x84\x05\x05\xa4|\x89\xa7*\xd8X\xb7\xef:$\xb9Y\x80^\x101\xe4\x88\xf5\x1a\xff\xc7\x99H\xf071u\x99GTb\xb8;\xee6\xa3#r\xddRK\x07W\x004\xed\x17\xaf%\xfdD\xb5\x92\xc5:\xe7\xbf\x97H/\xba\x97-@\xfe\xeas\xf9~\xf5\xf8.\x07\xa3\xa5\xb4\xef\x9dc\xe5\x93\x13\xeb\x12\xa3\x1a\x1eiy\xee\xccV\xe7n\xc4\x8c\xd7\x8db2\xdd\x84\x9d\xd1\xf2\x13\xddM\x00\xe4\xd2\xc4\xbc\x9fk~Lz&!\xe3D\xbczW[j\xb2\xbbS\xe8\x1b\x06\xb6`\x90GU\x02$\xf2\xea\xb0\xa5C\xbc\x02\r\xc7w\x0f\x03\xf0\x86\xaa\xbeN_`FfP"\x84i\x8d\xea~\xe0\xbf\xcc8;I4,\xf4\xc0{\x96\x1e~\x05\xcd\xdeoi\x13\xce\xbb7}F\xb4uYh\x9f\xd4V\x00\xcda-\xa3\xba\xc7\x9d\xe2\xbc;\xe9\x95\x8d\xe3V\xa4\xc7d\r\xd0\x94\x9e0\x9a\x87^\xa5s\xe8\x02\x9f\xcf\xc2\x02K\xf7E\x9cA\xb2\x04\xdaW\x88\xc4q\xad\x8f\xd0<\xa8\xbf\xc0\xe3p\xaa\xc6\xc3\xc5\x15\xbb\xbd\x94U*\xce\xfc\xa4\x19\x04\xd2K\x1aJ\x19Y\x93\x91\xa4y\xac\x83X/\xfb\x1e/\xcd\xa9Am"Z\n\xf5pw\xa5\xa2\xf1\xa3P\xc6\xbb\x9a\xaah]\xf8\x8d\x97d\xb79\x17\xa7K\x99\xaa\x9a~\x15\xf2\x99j*/2;|\x17\xbc\x87\x08\xf9>-\x8aQ\xb1M\x82\xc9\xcfCV\x80\xc0\xea\xb2 \x7f\xeb\x84?\x88\xe9\xa6\x07\xa1\xb3\x1c\x93\xd2RGk\x1d\xad\xf3\xafQ\xda6\x1d\xb1|\x18Qx\xe0\xc0r\x15\xd2\xfa#\xed\xb2X[7\x91\xfdE\xd1r\xf0o\xd6\xdb\x7fm\x8c;\xb59\x88\xc1\x0f\'b\x06\xac\xc1\x9f\xc1\xc6\xd44\xa3\xd4\xf8\xdc\xd2G\x7f\xf3gxeM7\xd3\xc2\x85L-\xf2\x19\xc4ZwA\xa7\x10}\x0e\x8bx\x84\'\xd1\xdb\xae%\x1b}S\x1b\\\xd1\xce\x17\xe3$\xb5h\x83V\xac\xe7tc\n\x9a\xe2Ru\xf4\xc1*\xf1\x85\xbd\xe8\xc0YS\xb9\x13\x89\xa0.\xfa\x1a2f\xdc\x85\xcd\xc1;\xbb\x0bz\xb6\x87\x9c\x93y\x86\xf3\x01h\xb7\x10#\x7f\r\xf3\xa9\x94}4|\x00\xfe\x80\'\xd76\x93\x9dx)\xa0\xcbrY\xb8\xcf\xa2|t\xcc\xfa\xd2u\x1e\xa3\x90\xf7`==\x1b\xa0Z\xbcQ\xf1J\xf2|0]\x0b\xbb\x9c\xce\x171\x1e<4E\x9b\xd9\x87\xf1m\r\xfe\xc1e!\xa6\x1f\x0f\xf1\x96S\xfc8\xe2d.r6\x81\x93\xdeX\xb6\xa3\x86D\x88\xf9\xf2\xd1\x83Z\xbf"Q\xd1\xf0i\x82\x86\xa9M\xb8\xccg\x91i\xefC\x84U\xcf\xcd\x9b!WVF\xb0\x14\x05E\xaa\x18\x93"\xc0\xc1\xd2V!t\xe2\xf9\xcd\xfba\xa0\xbc\x15\x14\x84\x9esfK\xbfC\xa2\xedJspo+\x81\x18(\x00\xf6+\x18\xedQ\xe6\xebW^\xf8\x80=\x10\xfb\xd6.\'A\x979;)\x06\xf0\x85w\x95S\xd9\x1c9\xcc3k\x03\xf2w\x17\x97\xcc\nN0;0\x1f0\x07\x06\x05+\x0e\x03\x02\x1a\x04\x14\xb1\x82\x1d\xb1\xc8_\xbc\xf1^/\x01\xf7\xc1\x99\x95\xef\xf1 respond with challenge + # 2. second request should be authorized according to the challenge -> respond with success + # 3. third request should match the second -> respond with a new challenge + # 4. fourth request should be authorized according to the new challenge -> respond with success + # 5. fifth request should match the fourth -> respond with success + transport = validating_transport( + requests=( + Request(url), + Request(url, required_headers={"Authorization": "Bearer {}".format(first_token)}), + Request(url, required_headers={"Authorization": "Bearer {}".format(first_token)}), + Request(url, required_headers={"Authorization": "Bearer {}".format(second_token)}), + Request(url, required_headers={"Authorization": "Bearer {}".format(second_token)}), + ), + responses=( + mock_response(status_code=401, headers={"WWW-Authenticate": challenge_fmt.format(first_scope)}), + mock_response(status_code=200), + mock_response(status_code=401, headers={"WWW-Authenticate": challenge_fmt.format(second_scope)}), + mock_response(status_code=200), + mock_response(status_code=200), + ), + ) + + tokens = (t for t in [first_token] * 2 + [second_token] * 2) + credential = Mock(get_token=lambda _: AccessToken(next(tokens), 0)) + pipeline = Pipeline(policies=[ChallengeAuthPolicy(credential=credential)], transport=transport) + + # policy should complete and cache the first challenge + pipeline.run(HttpRequest("GET", url)) + + # The next request will receive a challenge. The policy should handle it and update the cache entry. + pipeline.run(HttpRequest("GET", url)) diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/test_challenge_auth_async.py b/sdk/keyvault/azure-keyvault-certificates/tests/test_challenge_auth_async.py new file mode 100644 index 000000000000..2590f4f654a1 --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/test_challenge_auth_async.py @@ -0,0 +1,116 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +""" +Tests for the HTTP challenge authentication implementation. These tests aren't parallelizable, because +the challenge cache is global to the process. +""" +import asyncio + +try: + from unittest.mock import Mock +except ImportError: # python < 3.3 + from mock import Mock + +from azure.core.credentials import AccessToken +from azure.core.pipeline import AsyncPipeline +from azure.core.pipeline.transport import HttpRequest +from azure.keyvault.certificates._shared import AsyncChallengeAuthPolicy, HttpChallenge, HttpChallengeCache +import pytest + +from certificates_helpers import async_validating_transport, mock_response, Request + + +@pytest.mark.asyncio +async def test_policy(): + # ensure the test starts with an empty cache + HttpChallengeCache.clear() + + expected_scope = "https://challenge.resource/.default" + expected_token = "expected_token" + challenge = Mock( + status_code=401, + headers={ + "WWW-Authenticate": 'Bearer authorization="https://login.authority.net/tenant", resource={}'.format( + expected_scope + ) + }, + ) + success = Mock(status_code=200) + data = {"spam": "eggs"} + + responses = (r for r in (challenge, success)) + + async def send(request): + response = next(responses) + if response is challenge: + # this is the first request + assert not request.body + assert request.headers["Content-Length"] == "0" + elif response is success: + # this is the second request + assert request.body == data + assert expected_token in request.headers["Authorization"] + return response + + async def get_token(*scopes): + print("get token") + assert len(scopes) is 1 + assert scopes[0] == expected_scope + return AccessToken(expected_token, 0) + + credential = Mock(get_token=get_token) + pipeline = AsyncPipeline(policies=[AsyncChallengeAuthPolicy(credential=credential)], transport=Mock(send=send)) + await pipeline.run(HttpRequest("POST", "https://azure.service", data=data)) + + +@pytest.mark.asyncio +async def test_policy_updates_cache(): + """ + It's possible for the challenge returned for a request to change, e.g. when a vault is moved to a new tenant. + When the policy receives a 401, it should update the cached challenge for the requested URL, if one exists. + """ + + # ensure the test starts with an empty cache + HttpChallengeCache.clear() + + url = "https://azure.service/path" + first_scope = "https://first-scope" + first_token = "first-scope-token" + second_scope = "https://second-scope" + second_token = "second-scope-token" + challenge_fmt = 'Bearer authorization="https://login.authority.net/tenant", resource={}' + + # mocking a tenant change: + # 1. first request -> respond with challenge + # 2. second request should be authorized according to the challenge -> respond with success + # 3. third request should match the second -> respond with a new challenge + # 4. fourth request should be authorized according to the new challenge -> respond with success + # 5. fifth request should match the fourth -> respond with success + transport = async_validating_transport( + requests=( + Request(url), + Request(url, required_headers={"Authorization": "Bearer {}".format(first_token)}), + Request(url, required_headers={"Authorization": "Bearer {}".format(first_token)}), + Request(url, required_headers={"Authorization": "Bearer {}".format(second_token)}), + Request(url, required_headers={"Authorization": "Bearer {}".format(second_token)}), + ), + responses=( + mock_response(status_code=401, headers={"WWW-Authenticate": challenge_fmt.format(first_scope)}), + mock_response(status_code=200), + mock_response(status_code=401, headers={"WWW-Authenticate": challenge_fmt.format(second_scope)}), + mock_response(status_code=200), + mock_response(status_code=200), + ), + ) + + tokens = (t for t in [first_token] * 2 + [second_token] * 2) + credential = Mock(get_token=asyncio.coroutine(lambda _: AccessToken(next(tokens), 0))) + pipeline = AsyncPipeline(policies=[AsyncChallengeAuthPolicy(credential=credential)], transport=transport) + + # policy should complete and cache the first challenge + await pipeline.run(HttpRequest("GET", url)) + + # The next request will receive a challenge. The policy should handle it and update the cache entry. + await pipeline.run(HttpRequest("GET", url)) diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/test_examples_certificates.py b/sdk/keyvault/azure-keyvault-certificates/tests/test_examples_certificates.py new file mode 100644 index 000000000000..0072552ac4db --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/test_examples_certificates.py @@ -0,0 +1,262 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from __future__ import print_function +import functools + +from azure.core.exceptions import ResourceNotFoundError +from devtools_testutils import ResourceGroupPreparer +from certificates_preparer import VaultClientPreparer +from certificates_test_case import KeyVaultTestCase + + +def print(*args): + assert all(arg is not None for arg in args) + + +def test_create_certificate_client(): + vault_url = "vault_url" + # pylint:disable=unused-variable + # [START create_certificate_client] + + from azure.identity import DefaultAzureCredential + from azure.keyvault.certificates import CertificateClient + + # Create a CertificateClient using default Azure credentials + credential = DefaultAzureCredential() + certificate_client = CertificateClient(vault_url, credential) + + # [END create_certificate_client] + + +class TestExamplesKeyVault(KeyVaultTestCase): + @ResourceGroupPreparer() + @VaultClientPreparer(enable_soft_delete=True) + def test_example_certificate_crud_operations(self, vault_client, **kwargs): + + certificate_client = vault_client.certificates + # [START create_certificate] + from azure.keyvault.certificates import CertificatePolicy, KeyProperties, SecretContentType + # specify the certificate policy + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['onedrive.microsoft.com', 'xbox.microsoft.com'] + ) + + cert_name = "cert-name" + # create a certificate with optional arguments, returns a long running operation poller + certificate_operation_poller = certificate_client.create_certificate(name=cert_name, policy=cert_policy) + + # Here we are waiting for the certificate creation operation to be completed + certificate_operation_poller.wait() + + # You can get the final status of the certificate operation poller using .result() + print(certificate_operation_poller.result()) + + # [END create_certificate] + + # [START get_certificate] + + # get the certificate + certificate = certificate_client.get_certificate_with_policy(name=cert_name) + + print(certificate.id) + print(certificate.name) + print(certificate.policy.key_properties.exportable) + print(certificate.policy.key_properties.key_type) + print(certificate.policy.key_properties.key_size) + print(certificate.policy.key_properties.reuse_key) + print(certificate.policy.content_type) + print(certificate.policy.issuer_name) + print(certificate.policy.subject_name) + print(certificate.policy.san_dns_names) + print(certificate.policy.validity_in_months) + + # [END get_certificate] + # [START update_certificate] + + # update attributes of an existing certificate + tags = {"foo": "updated tag"} + updated_certificate = certificate_client.update_certificate(name=certificate.name, tags=tags) + + print(updated_certificate.version) + print(updated_certificate.updated) + print(updated_certificate.tags) + + # [END update_certificate] + # [START delete_certificate] + + # delete a certificate + deleted_certificate = certificate_client.delete_certificate(name=certificate.name) + + print(deleted_certificate.name) + + # if the vault has soft-delete enabled, the certificate's deleted date, + # scheduled purge date, and recovery id are available + print(deleted_certificate.deleted_date) + print(deleted_certificate.scheduled_purge_date) + print(deleted_certificate.recovery_id) + + # [END delete_certificate] + + @ResourceGroupPreparer() + @VaultClientPreparer(enable_soft_delete=True) + def test_example_certificate_list_operations(self, vault_client, **kwargs): + from azure.keyvault.certificates import CertificatePolicy, KeyProperties, SecretContentType + certificate_client = vault_client.certificates + + # specify the certificate policy + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['sdk.azure-int.net'] + ) + + for i in range(4): + create_certificate_poller = certificate_client.create_certificate(name="certificate{}".format(i), policy=cert_policy) + create_certificate_poller.wait() + + # [START list_certificates] + + # get an iterator of certificates + certificates = certificate_client.list_certificates() + + for certificate in certificates: + print(certificate.id) + print(certificate.created) + print(certificate.name) + print(certificate.updated) + print(certificate.enabled) + + # [END list_certificates] + # [START list_certificate_versions] + + # get an iterator of a certificate's versions + certificate_versions = certificate_client.list_certificate_versions(name="certificate-name") + + for certificate in certificate_versions: + print(certificate.id) + print(certificate.updated) + print(certificate.version) + + # [END list_certificate_versions] + # [START list_deleted_certificates] + + # get an iterator of deleted certificates (requires soft-delete enabled for the vault) + deleted_certificates = certificate_client.list_deleted_certificates() + + for certificate in deleted_certificates: + print(certificate.id) + print(certificate.name) + print(certificate.deleted_date) + print(certificate.scheduled_purge_date) + print(certificate.deleted_date) + + # [END list_deleted_certificates] + + @ResourceGroupPreparer() + @VaultClientPreparer() + def test_example_certificate_backup_restore(self, vault_client, **kwargs): + from azure.keyvault.certificates import CertificatePolicy, KeyProperties, SecretContentType + import time + certificate_client = vault_client.certificates + + # specify the certificate policy + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['onedrive.microsoft.com', 'xbox.microsoft.com'] + ) + + cert_name = "cert-name" + create_certificate_poller = certificate_client.create_certificate(name=cert_name, policy=cert_policy) + create_certificate_poller.wait() + + # [START backup_certificate] + + # backup certificate + certificate_backup = certificate_client.backup_certificate(name=cert_name) + + # returns the raw byte sof the backed up certificate + print(certificate_backup) + + # [END backup_certificate] + + certificate_client.delete_certificate(name=cert_name) + + # [START restore_certificate] + + # restore a certificate backup + restored_certificate = certificate_client.restore_certificate(backup=certificate_backup) + + print(restored_certificate.id) + print(restored_certificate.name) + print(restored_certificate.version) + + # [END restore_certificate] + + @ResourceGroupPreparer() + @VaultClientPreparer(enable_soft_delete=True) + def test_example_certificate_recover(self, vault_client, **kwargs): + from azure.keyvault.certificates import CertificatePolicy, KeyProperties, SecretContentType + certificate_client = vault_client.certificates + + # specify the certificate policy + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['onedrive.microsoft.com', 'xbox.microsoft.com'] + ) + + cert_name = "cert-name" + create_certificate_poller = certificate_client.create_certificate(name=cert_name, policy=cert_policy) + create_certificate_poller.wait() + certificate_client.delete_certificate(name=cert_name) + self._poll_until_no_exception( + functools.partial(certificate_client.get_deleted_certificate, cert_name), + ResourceNotFoundError + ) + # [START get_deleted_certificate] + + # get a deleted certificate (requires soft-delete enabled for the vault) + deleted_certificate = certificate_client.get_deleted_certificate(name=cert_name) + print(deleted_certificate.name) + + # if the vault has soft-delete enabled, the certificate's deleted date, + # scheduled purge date, and recovery id are available + print(deleted_certificate.deleted_date) + print(deleted_certificate.scheduled_purge_date) + print(deleted_certificate.recovery_id) + + # [END get_deleted_certificate] + # [START recover_deleted_certificate] + + # recover a deleted certificate to its latest version (requires soft-delete enabled for the vault) + recovered_certificate = certificate_client.recover_deleted_certificate(name=cert_name) + + print(recovered_certificate.id) + print(recovered_certificate.name) + + # [END recover_deleted_certificate] diff --git a/sdk/keyvault/azure-keyvault-certificates/tests/test_examples_certificates_async.py b/sdk/keyvault/azure-keyvault-certificates/tests/test_examples_certificates_async.py new file mode 100644 index 000000000000..7f8e8a22844a --- /dev/null +++ b/sdk/keyvault/azure-keyvault-certificates/tests/test_examples_certificates_async.py @@ -0,0 +1,257 @@ +# ------------------------------------ +# Copyright (c) Microsoft Corporation. +# Licensed under the MIT License. +# ------------------------------------ +from azure.core.exceptions import ResourceNotFoundError +from devtools_testutils import ResourceGroupPreparer +from certificates_async_preparer import AsyncVaultClientPreparer +from certificates_async_test_case import AsyncKeyVaultTestCase + + +def print(*args): + assert all(arg is not None for arg in args) + + +def test_create_certificate(): + vault_url = "vault_url" + # pylint:disable=unused-variable + # [START create_certificate_client] + + from azure.identity.aio import DefaultAzureCredential + from azure.keyvault.certificates.aio import CertificateClient + + # Create a Certificate using default Azure credentials + credential = DefaultAzureCredential() + certificate_client = CertificateClient(vault_url, credential) + + # [END create_certificate_client] + + +class TestExamplesKeyVault(AsyncKeyVaultTestCase): + @ResourceGroupPreparer() + @AsyncVaultClientPreparer(enable_soft_delete=True) + @AsyncKeyVaultTestCase.await_prepared_test + async def test_example_certificate_crud_operations(self, vault_client, **kwargs): + import asyncio + certificate_client = vault_client.certificates + # [START create_certificate] + from azure.keyvault.certificates import CertificatePolicy, KeyProperties, SecretContentType + # specify the certificate policy + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['sdk.azure-int.net'] + ) + cert_name = "cert-name" + # create a certificate with optional arguments, returns an async poller + create_certificate_poller = await certificate_client.create_certificate(name=cert_name, policy=cert_policy) + + # awaiting the certificate poller gives us the result of the long running operation + create_certificate_result = await create_certificate_poller + print(create_certificate_result) + + # [END create_certificate] + + # [START get_certificate] + + # get the latest version of a certificate + certificate = await certificate_client.get_certificate_with_policy(name=cert_name) + + print(certificate.id) + print(certificate.name) + print(certificate.policy.key_properties.exportable) + print(certificate.policy.key_properties.key_type) + print(certificate.policy.key_properties.key_size) + print(certificate.policy.key_properties.reuse_key) + print(certificate.policy.content_type) + print(certificate.policy.issuer_name) + print(certificate.policy.subject_name) + print(certificate.policy.san_dns_names) + print(certificate.policy.validity_in_months) + + # [END get_certificate] + # [START update_certificate] + + # update attributes of an existing certificate + tags = {"foo": "updated tag"} + updated_certificate = await certificate_client.update_certificate(certificate.name, tags=tags) + + print(updated_certificate.version) + print(updated_certificate.updated) + print(updated_certificate.tags) + + # [END update_certificate] + # [START delete_certificate] + + # delete a certificate + deleted_certificate = await certificate_client.delete_certificate(name=cert_name) + + print(deleted_certificate.name) + + # if the vault has soft-delete enabled, the certificate's + # scheduled purge date, deleted_date, and recovery id are available + print(deleted_certificate.deleted_date) + print(deleted_certificate.scheduled_purge_date) + print(deleted_certificate.recovery_id) + + # [END delete_certificate] + + @ResourceGroupPreparer() + @AsyncVaultClientPreparer(enable_soft_delete=True) + @AsyncKeyVaultTestCase.await_prepared_test + async def test_example_certificate_list_operations(self, vault_client, **kwargs): + from azure.keyvault.certificates import CertificatePolicy, KeyProperties, SecretContentType + certificate_client = vault_client.certificates + + # specify the certificate policy + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['sdk.azure-int.net'] + ) + + create_certificate_pollers = [] + for i in range(4): + create_certificate_pollers.append(await certificate_client.create_certificate(name="certificate{}".format(i), policy=cert_policy)) + + for poller in create_certificate_pollers: + await poller + + # [START list_certificates] + + # list certificates + certificates = certificate_client.list_certificates() + + async for certificate in certificates: + print(certificate.id) + print(certificate.created) + print(certificate.name) + print(certificate.updated) + print(certificate.enabled) + + # [END list_certificates] + # [START list_certificate_versions] + + # get an iterator of all versions of a certificate + certificate_versions = certificate_client.list_certificate_versions(name="cert-name") + + async for certificate in certificate_versions: + print(certificate.id) + print(certificate.updated) + print(certificate.version) + + # [END list_certificate_versions] + # [START list_deleted_certificates] + + # get an iterator of deleted certificates (requires soft-delete enabled for the vault) + deleted_certificates = certificate_client.list_deleted_certificates() + + async for certificate in deleted_certificates: + print(certificate.id) + print(certificate.name) + print(certificate.scheduled_purge_date) + print(certificate.recovery_id) + print(certificate.deleted_date) + + # [END list_deleted_certificates] + + @ResourceGroupPreparer() + @AsyncVaultClientPreparer() + @AsyncKeyVaultTestCase.await_prepared_test + async def test_example_certificate_backup_restore(self, vault_client, **kwargs): + from azure.keyvault.certificates import CertificatePolicy, KeyProperties, SecretContentType + import asyncio + certificate_client = vault_client.certificates + + # specify the certificate policy + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['sdk.azure-int.net'] + ) + + cert_name = "cert-name" + create_certificate_poller = await certificate_client.create_certificate(name=cert_name, policy=cert_policy) + + await create_certificate_poller + + # [START backup_certificate] + + # backup certificate + certificate_backup = await certificate_client.backup_certificate(name=cert_name) + + # returns the raw byte sof the backed up certificate + print(certificate_backup) + + # [END backup_certificate] + + await certificate_client.delete_certificate(name=cert_name) + + # [START restore_certificate] + + # restores a certificate backup + restored_certificate = await certificate_client.restore_certificate(certificate_backup) + print(restored_certificate.id) + print(restored_certificate.name) + print(restored_certificate.version) + + # [END restore_certificate] + + @ResourceGroupPreparer() + @AsyncVaultClientPreparer(enable_soft_delete=True) + @AsyncKeyVaultTestCase.await_prepared_test + async def test_example_certificate_recover(self, vault_client, **kwargs): + from azure.keyvault.certificates import CertificatePolicy, KeyProperties, SecretContentType + certificate_client = vault_client.certificates + + # specify the certificate policy + cert_policy = CertificatePolicy(key_properties=KeyProperties(exportable=True, + key_type='RSA', + key_size=2048, + reuse_key=False), + content_type=SecretContentType.PFX, + issuer_name='Self', + subject_name='CN=*.microsoft.com', + validity_in_months=24, + san_dns_names=['sdk.azure-int.net'] + ) + + cert_name = "cert-name" + create_certificate_poller = await certificate_client.create_certificate(name=cert_name, policy=cert_policy) + await create_certificate_poller + + await certificate_client.delete_certificate(name=cert_name) + await self._poll_until_no_exception( + certificate_client.get_deleted_certificate, cert_name, expected_exception=ResourceNotFoundError + ) + + # [START get_deleted_certificate] + + # get a deleted certificate (requires soft-delete enabled for the vault) + deleted_certificate = await certificate_client.get_deleted_certificate(name="cert-name") + print(deleted_certificate.name) + + # [END get_deleted_certificate] + # [START recover_deleted_certificate] + + # recover deleted certificate to its latest version (requires soft-delete enabled for the vault) + recovered_certificate = await certificate_client.recover_deleted_certificate(name="cert-name") + print(recovered_certificate.id) + print(recovered_certificate.name) + + # [END recover_deleted_certificate]