Skip to content

Commit c426c81

Browse files
committed
regenerate
1 parent a4f37ab commit c426c81

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+1083
-900
lines changed
Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1 @@
1-
# ------------------------------------
2-
# Copyright (c) Microsoft Corporation.
3-
# Licensed under the MIT License.
4-
# ------------------------------------
51
__path__ = __import__("pkgutil").extend_path(__path__, __name__) # type: ignore
Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1 @@
1-
# ------------------------------------
2-
# Copyright (c) Microsoft Corporation.
3-
# Licensed under the MIT License.
4-
# ------------------------------------
51
__path__ = __import__("pkgutil").extend_path(__path__, __name__) # type: ignore

sdk/keyvault/azure-keyvault-keys/azure/keyvault/keys/_client.py

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
# pylint: disable=too-many-lines
12
# ------------------------------------
23
# Copyright (c) Microsoft Corporation.
34
# Licensed under the MIT License.
@@ -78,12 +79,12 @@ def _get_attributes(
7879
return None
7980

8081
def get_cryptography_client(
81-
self,
82-
key_name: str,
83-
*,
84-
key_version: Optional[str] = None,
85-
**kwargs, # pylint: disable=unused-argument
86-
) -> CryptographyClient:
82+
self,
83+
key_name: str,
84+
*,
85+
key_version: Optional[str] = None,
86+
**kwargs, # pylint: disable=unused-argument
87+
) -> CryptographyClient:
8788
"""Gets a :class:`~azure.keyvault.keys.crypto.CryptographyClient` for the given key.
8889
8990
:param str key_name: The name of the key used to perform cryptographic operations.
@@ -398,7 +399,9 @@ def create_oct_key(
398399
)
399400

400401
@distributed_trace
401-
def begin_delete_key(self, name: str, **kwargs: Any) -> LROPoller[DeletedKey]: # pylint:disable=bad-option-value,delete-operation-wrong-return-type
402+
def begin_delete_key(
403+
self, name: str, **kwargs: Any
404+
) -> LROPoller[DeletedKey]: # pylint:disable=bad-option-value,delete-operation-wrong-return-type
402405
"""Delete all versions of a key and its cryptographic material.
403406
404407
Requires keys/delete permission. When this method returns Key Vault has begun deleting the key. Deletion may
@@ -519,7 +522,7 @@ def list_deleted_keys(self, **kwargs: Any) -> ItemPaged[DeletedKey]:
519522
return self._client.get_deleted_keys(
520523
maxresults=kwargs.pop("max_page_size", None),
521524
cls=lambda objs: [DeletedKey._from_deleted_key_item(x) for x in objs],
522-
**kwargs
525+
**kwargs,
523526
)
524527

525528
@distributed_trace
@@ -542,7 +545,7 @@ def list_properties_of_keys(self, **kwargs: Any) -> ItemPaged[KeyProperties]:
542545
return self._client.get_keys(
543546
maxresults=kwargs.pop("max_page_size", None),
544547
cls=lambda objs: [KeyProperties._from_key_item(x) for x in objs],
545-
**kwargs
548+
**kwargs,
546549
)
547550

548551
@distributed_trace
@@ -568,7 +571,7 @@ def list_properties_of_key_versions(self, name: str, **kwargs: Any) -> ItemPaged
568571
name,
569572
maxresults=kwargs.pop("max_page_size", None),
570573
cls=lambda objs: [KeyProperties._from_key_item(x) for x in objs],
571-
**kwargs
574+
**kwargs,
572575
)
573576

574577
@distributed_trace
@@ -709,9 +712,7 @@ def update_key_properties(
709712
release_policy=policy,
710713
)
711714

712-
bundle = self._client.update_key(
713-
name, key_version=version or "", parameters=parameters, **kwargs
714-
)
715+
bundle = self._client.update_key(name, key_version=version or "", parameters=parameters, **kwargs)
715716
return KeyVaultKey._from_key_bundle(bundle)
716717

717718
@distributed_trace
@@ -770,8 +771,7 @@ def restore_key_backup(self, backup: bytes, **kwargs: Any) -> KeyVaultKey:
770771
:dedent: 8
771772
"""
772773
bundle = self._client.restore_key(
773-
parameters=self._models.KeyRestoreParameters(key_bundle_backup=backup),
774-
**kwargs
774+
parameters=self._models.KeyRestoreParameters(key_bundle_backup=backup), **kwargs
775775
)
776776
return KeyVaultKey._from_key_bundle(bundle)
777777

@@ -877,7 +877,7 @@ def release_key(
877877
nonce=nonce,
878878
enc=algorithm,
879879
),
880-
**kwargs
880+
**kwargs,
881881
)
882882
return ReleaseKeyResult(result.value)
883883

@@ -988,7 +988,7 @@ def update_key_rotation_policy( # pylint: disable=unused-argument
988988
@distributed_trace
989989
def get_key_attestation(self, name: str, version: Optional[str] = None, **kwargs: Any) -> KeyVaultKey:
990990
"""Get a key and its attestation blob.
991-
991+
992992
This method is applicable to any key stored in Azure Key Vault Managed HSM. This operation requires the keys/get
993993
permission.
994994

sdk/keyvault/azure-keyvault-keys/azure/keyvault/keys/_generated/_client.py

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,23 +15,24 @@
1515
from azure.core.rest import HttpRequest, HttpResponse
1616

1717
from ._configuration import KeyVaultClientConfiguration
18-
from ._operations import KeyVaultClientOperationsMixin
18+
from ._operations import _KeyVaultClientOperationsMixin
1919
from ._utils.serialization import Deserializer, Serializer
2020

2121
if TYPE_CHECKING:
2222
from azure.core.credentials import TokenCredential
2323

2424

25-
class KeyVaultClient(KeyVaultClientOperationsMixin):
25+
class KeyVaultClient(_KeyVaultClientOperationsMixin):
2626
"""The key vault client performs cryptographic key operations and vault operations against the Key
2727
Vault service.
2828
2929
:param vault_base_url: Required.
3030
:type vault_base_url: str
3131
:param credential: Credential used to authenticate requests to the service. Required.
3232
:type credential: ~azure.core.credentials.TokenCredential
33-
:keyword api_version: The API version to use for this operation. Default value is "7.6". Note
34-
that overriding this default value may result in unsupported behavior.
33+
:keyword api_version: The API version to use for this operation. Default value is
34+
"2025-06-01-preview". Note that overriding this default value may result in unsupported
35+
behavior.
3536
:paramtype api_version: str
3637
"""
3738

sdk/keyvault/azure-keyvault-keys/azure/keyvault/keys/_generated/_configuration.py

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,14 @@ class KeyVaultClientConfiguration: # pylint: disable=too-many-instance-attribut
2626
:type vault_base_url: str
2727
:param credential: Credential used to authenticate requests to the service. Required.
2828
:type credential: ~azure.core.credentials.TokenCredential
29-
:keyword api_version: The API version to use for this operation. Default value is "7.6". Note
30-
that overriding this default value may result in unsupported behavior.
29+
:keyword api_version: The API version to use for this operation. Default value is
30+
"2025-06-01-preview". Note that overriding this default value may result in unsupported
31+
behavior.
3132
:paramtype api_version: str
3233
"""
3334

3435
def __init__(self, vault_base_url: str, credential: "TokenCredential", **kwargs: Any) -> None:
35-
api_version: str = kwargs.pop("api_version", "7.6")
36+
api_version: str = kwargs.pop("api_version", "2025-06-01-preview")
3637

3738
if vault_base_url is None:
3839
raise ValueError("Parameter 'vault_base_url' must not be None.")
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
{
2+
"apiVersion": "2025-06-01-preview"
3+
}

sdk/keyvault/azure-keyvault-keys/azure/keyvault/keys/_generated/_operations/__init__.py

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,12 @@
1212
if TYPE_CHECKING:
1313
from ._patch import * # pylint: disable=unused-wildcard-import
1414

15-
from ._operations import KeyVaultClientOperationsMixin # type: ignore
15+
from ._operations import _KeyVaultClientOperationsMixin # type: ignore # pylint: disable=unused-import
1616

1717
from ._patch import __all__ as _patch_all
1818
from ._patch import *
1919
from ._patch import patch_sdk as _patch_sdk
2020

21-
__all__ = [
22-
"KeyVaultClientOperationsMixin",
23-
]
21+
__all__ = []
2422
__all__.extend([p for p in _patch_all if p not in __all__]) # pyright: ignore
2523
_patch_sdk()

0 commit comments

Comments
 (0)