Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Final merge to main for Key Vault 7.3 #3783

Merged
merged 20 commits into from
Jul 6, 2022
Merged

Final merge to main for Key Vault 7.3 #3783

merged 20 commits into from
Jul 6, 2022

Conversation

gearama
Copy link
Member

@gearama gearama commented Jun 30, 2022

Bringing the code from the feature branch into main for KV 7.3

Pull Request Checklist

Please leverage this checklist as a reminder to address commonly occurring feedback when submitting a pull request to make sure your PR can be reviewed quickly:

See the detailed list in the contributing guide.

  • C++ Guidelines
  • Doxygen docs
  • Unit tests
  • No unwanted commits/changes
  • Descriptive title/description
    • PR is single purpose
    • Related issue listed
  • Comments in source
  • No typos
  • Update changelog
  • Not work-in-progress
  • External references or docs updated
  • Self review of PR done
  • Any breaking changes?

gearama and others added 16 commits April 11, 2022 15:28
* one commit to rule them all

* update to 7.3 version and comment

* support 7.2
* one commit to rule them all

* updated to version 7.3 and updated tests and recordings.

* 7.2
* one commit to rule them all

* Updated service version to 7.3

* support v7.2

* typo
* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* bump keys version to 7.3

* Revert "bump keys version to 7.3"

This reverts commit e348e96.

* update the versions for the core and identity deps for the keyvault APIs. needed for some api implementations.

* removed identity dep

* put back ident

* remove ident from folder

* 1.4.0

* update vcpkg commit

* put back ident

* remove again

* update vcpkg commit

* PR comment

* vcpkg commit min for azure core 1.5

* increase timeout
* one commit to rule them all

* work in progress

* tests for serialize deserialize

* typos

* to lower

* enable test

* guard live

* typos, types, and many more

* maybe now ? please ...

* PR comments
* step1

* part2

* code maybe

* working to create exportable with release policy

* still not working

* cleanup

* revert attestation change, fix crypto tests

* fix ut

* format and pedantic chars

* PR

* some UTs

* oops

* what can i do

* PR comments
* step1

* part2

* code maybe

* working to create exportable with release policy

* still not working

* Release Key Works now

* format

* qfe

* clean build issues

* build fixes

* PR comments

* cspell

* rework the test to use the source keys instead of jwk. needed to be restored for live tests

* update location
* tests pass

* oops

* update hsm path

* clang

* update test resources

* try try again

* try again

* update variable in azure core

* template worx

* clang

* try pipeline1

* see now

* try try again

* darn json

* oh boy

* oh boy

* rwerwerw

* jioijhjui

* maybe now ?

* maybe now ?

* increase timeout and fix ps script

* keyvault permissions

* rebalance regions

* ssssss

* [p]ppi

* try this

* fsdfsdfsd

* maybe now

* test again

* maybe

* maybe

* maybe 2

* try again

* ssssss

* uyufyut

* maybe now ?

* try again

* t/f/1/0

* cleanup

* maybe now

* edeployment output

* oook

* let's see the envs

* fix 2 tests

* another one

* try try again

* oops

* powershell error

* ps again

* i hate this so much right now

* try try again

* try again

* dsaas

* rewrwr

* erwrw

* windows?

* libcurl ?

* ???

* retry

* retyr message , api version

* again

* ok maybe

* dssds

* final updates

* missing line
* begining

* update readmes

* Update sdk/keyvault/azure-security-keyvault-certificates/CHANGELOG.md

Co-authored-by: Anton Kolesnyk <41349689+antkmsft@users.noreply.github.com>

* Update sdk/keyvault/azure-security-keyvault-keys/CHANGELOG.md

Co-authored-by: Anton Kolesnyk <41349689+antkmsft@users.noreply.github.com>

* Update sdk/keyvault/azure-security-keyvault-keys/README.md

Co-authored-by: Anton Kolesnyk <41349689+antkmsft@users.noreply.github.com>

* Update sdk/keyvault/azure-security-keyvault-secrets/CHANGELOG.md

Co-authored-by: Anton Kolesnyk <41349689+antkmsft@users.noreply.github.com>

Co-authored-by: Anton Kolesnyk <41349689+antkmsft@users.noreply.github.com>
* one commit to rule them all

* Sync eng/common directory with azure-sdk-tools for PR 3000 (#3485)

* Sort by client, mgmt, track2, track1

* sort by the type

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* fix the sorting

* Define the order of new and type

* address comments

* fix typo

* Address your comments

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update Generate-DocIndex.ps1

* Update Generate-DocIndex.ps1

* Update eng/common/docgeneration/Generate-DocIndex.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

Co-authored-by: sima-zhu <sizhu@microsoft.com>
Co-authored-by: Sima Zhu <48036328+sima-zhu@users.noreply.github.com>
Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Support BaseName overrides in CI mode for New-TestResources.ps1 (#3559)

Co-authored-by: Ben Broderick Phillips <bebroder@microsoft.com>

* Do not pass Generated to -BaseName (#3562)

Co-authored-by: Heath Stewart <heaths@microsoft.com>

* Sort by service name first (#3570)

Co-authored-by: sima-zhu <sizhu@microsoft.com>

* Initialize the suppression file. (#3569)

* Sync eng/common directory with azure-sdk-tools for PR 3169 (#3572)

* Use the batch version of ValidateDocsMsPackagesFn

* Use proper pipelining for GetPackageInfoJson function

Co-authored-by: Patrick Hallisey <pahallis@microsoft.com>

* [Tech Docs] Libcurl transport adapter (#3484)

* libcurl transport adapter

* updates

* Update LibcurlTransportAdapter.md

* Update LibcurlTransportAdapter.md

* Update doc/LibcurlTransportAdapter.md

Co-authored-by: Jeffrey Richter <jeffrichter@live.com>

Co-authored-by: Jeffrey Richter <jeffrichter@live.com>

* Skip azcopy download if it already exists (#3576)

Co-authored-by: Patrick Hallisey <pahallis@microsoft.com>

* Pin openssl to 1.1.1n (#3575)

* Pin openssl to 1.1.1n

* Updated vcpkg commit to one containing OpenSSL 1.1.1n

* Fixed version number in vcpkg.json

* Fix typo (#3583)

* update curl transport options to support ignore proxy from system (#3564)

* update curl transport options to support ignore proxy from system

* update changelog

* bug fix for cl

* update log level from Retry policy (#3586)

* update log level

* Update sdk/core/azure-core/CHANGELOG.md

Co-authored-by: Ahson Khan <ahkha@microsoft.com>

Co-authored-by: Ahson Khan <ahkha@microsoft.com>

* Add batch protocol layer (#3580)

* Add batch protocol layer

* some small fixes on Storage cmakefiles (#3588)

* Migrate to matrix generator (#3553)

* Represent existing matrix in json
* Use new matrix
* Move to stage
* Cloud configuration
* MaxParallel
* DependsOn
* Quote CtestRegex
* Use template for cmake generate tests
* Template name mappings
* Formatting, parameters
* Remove duplicate bypass-local-dns.yml
* Enable Location override
* Add Location
* Add spelling words
* Use Ubuntu 20 where the name specifies Ubuntu 20
* Apply suggestions from code review

Co-authored-by: Ben Broderick Phillips <ben@benbp.net>

* PR feedback
* fix storage sample
* Matrix documentation

Co-authored-by: Ben Broderick Phillips <ben@benbp.net>
Co-authored-by: Victor Vazquez <vhvb1989@gmail.com>

* Sync eng/common directory with azure-sdk-tools for PR 3212 (#3587)

* bump consumed version of test proxy. update scripting to target the fully cross-platform image tag name.
* update target version of the test-proxy to one that enforces http/1.1

Co-authored-by: scbedd <45376673+scbedd@users.noreply.github.com>

* Sync eng/common directory with azure-sdk-tools for PR 3238 (#3590)

* pin proxy version to one that properly sets listenoptions
* update targeted test-proxy docker repo. "testproxy" -> "test-proxy"

Co-authored-by: scbedd <45376673+scbedd@users.noreply.github.com>

* Sync eng/common directory with azure-sdk-tools for PR 3221 (#3591)

* Make docs.ms link relative link

* Update Update-DocsMsMetadata.ps1

* Update eng/common/scripts/Update-DocsMsMetadata.ps1

Co-authored-by: Daniel Jurek <djurek@microsoft.com>

Co-authored-by: sima-zhu <sizhu@microsoft.com>
Co-authored-by: Sima Zhu <48036328+sima-zhu@users.noreply.github.com>
Co-authored-by: Daniel Jurek <djurek@microsoft.com>

* Remove the daily branch before date (#3593)

Co-authored-by: sima-zhu <sizhu@microsoft.com>

* Add ClientCertificateCredential (#3578)

* Add ClientCertificateCredential

* Update unit test

* cspell

* Update Readme

* Cosmetic fixes

* Changelog to mention env cred update

* Fix warning

* cspell

* Tell CI to install openssl

* openssl for all Windows

* update dependency manifest

* Re-phrase changelog

* Clang warnings

* Clang warning

* Clang warning - 2

* Ubuntu18 warning

* Update sdk/identity/azure-identity/CHANGELOG.md

Co-authored-by: Victor Vazquez <victor.vazquez@microsoft.com>

* PR feedback

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>
Co-authored-by: Victor Vazquez <victor.vazquez@microsoft.com>

* Sync eng/common directory with azure-sdk-tools for PR 3250 (#3595)

* Change the direction of the commit date

* Log on right place

* remove auth

* fix typo

* Add auth token back

* add delete back

* Update eng/common/scripts/Delete-RemoteBranches.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update Delete-RemoteBranches.ps1

* Update Delete-RemoteBranches.ps1

* Update Delete-RemoteBranches.ps1

* Update Delete-RemoteBranches.ps1

* Update Delete-RemoteBranches.ps1

Co-authored-by: sima-zhu <sizhu@microsoft.com>
Co-authored-by: Sima Zhu <48036328+sima-zhu@users.noreply.github.com>
Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Create a session handle once in the transport ctor and reuse it for all requests rather than creating a new one each time. (#3585)

* Reuse the same session handle for all requests rather than creating a new one each time.

* Move the session handle creation to the transport adapter ctor.

* Update changelog entry.

* Address PR feedback.

* Change CreateSessionHandle to return a local session handle

* Fix-up the changelog entry link for the curtransportoption bug fix (#3598)

* Remove extra period at ends of exception messages in winhttp transport (#3601)

* fix cmake in storage (#3604)

* Reword the curl proxy fix changelog entry. (#3606)

* Add Emma Zhu as code owner (#3605)

* Short circuit out of msdocs publish if no package locations are specified (#3607)

Co-authored-by: Patrick Hallisey <pahallis@microsoft.com>

* sdk/core: Reimplement Md5OpenSSL using EVP API (#3609)

The MD5_Init/Update/Final functions are deprecated in OpenSSL 3.0 and result in
a compile-time warning. Due to the default usage of -Werror during compilation,
these warnings are treated as errors and prevent the SDK from being built on
Ubuntu 22.04, which ships with OpenSSL by default. The deprecated APIs should
be replaced by the EVP APIs, which are already in use for the SHA family of
functions, and supported on all versions of OpenSSL.

* API Review Feedback for Attestation SDK (#3543)

* API Review Feedback for Attestation SDK

* Updated changelog to reflect API Review updates

* Remove version pin for OpenSSL (#3610)

* Remove version pin for OpenSSL

* Gratuitous change to trigger CI pipelines

* Update the version tool to the latest (#3616)

Co-authored-by: sima-zhu <sizhu@microsoft.com>

* Get rid of warnings in nullable.hpp (#3617)

* cl (#3613)

* Update pipeline-generator version (#3623)

Co-authored-by: Patrick Hallisey <pahallis@microsoft.com>

* Prepare Attestation SDK for May Release. (#3625)

* Prepare attestation for May release

* Removed some noise from changelog

* Increment package version after release of azure-core (#3624)

* Update CODEOWNERS (#3628)

* Fix identity samples running in CI (#3632)

* azure identity may 2022 release (#3615)

* Increment package version after release of azure-identity (#3637)

* Removed uwp-x86 from platform matrix. (#3629)

* Increment package version after release of azure-security-attestation (#3636)

* Update readme for -pre and -post TestResource scripts (#3645)

Co-authored-by: Christopher Scott <chriss@microsoft.com>

* Fixed a bug where text of XML element cannot be empty. (#3643)

* String parsing improvements to service directory resource names (#3644)

Co-authored-by: Ben Broderick Phillips <bebroder@microsoft.com>

* Adding Acknowledgments (#3611)

* cl

* Update sdk/core/azure-core/CHANGELOG.md

Co-authored-by: Ahson Khan <ahkha@microsoft.com>

* cspell

Co-authored-by: Ahson Khan <ahkha@microsoft.com>

* Add skip variable for remove test resources to support debugging (#3648)

Co-authored-by: Ben Broderick Phillips <bebroder@microsoft.com>

* Storage Blob Stg78 Features (#3650)

* Clean up target_include_directories() (#3641)

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* Update all-inclusive headers, and CMakeFiles for including all headers (#3640)

* Remove (#3657)

oexcept specifier from Context::IsCancelled()

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* Add Language product slug (#3665)

Co-authored-by: Deyaaeldeen Almahallawi <dealmaha@microsoft.com>

* Sync eng/common directory with azure-sdk-tools for PR 3342 (#3664)

* Delete PR and branch which central PR is closed

* more logging changes

* resume the delete operations.

* Change the pr link directly

* fix the regex

* Refactor on regex name

* change the function to inline logic

* change typo

* delete on branch

* make changes on comments

* add commnets

* Update eng/common/scripts/Delete-RemoteBranches.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/scripts/Delete-RemoteBranches.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/scripts/Delete-RemoteBranches.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Update eng/common/scripts/Delete-RemoteBranches.ps1

Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

Co-authored-by: sima-zhu <sizhu@microsoft.com>
Co-authored-by: Sima Zhu <48036328+sima-zhu@users.noreply.github.com>
Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>

* Split out attestation client factory into separate class (#3654)

* Split out attestation client factory into separate class

* Updated readme; clang-format

* Final set of API review changes

* Replaced () constructors with {} constructors

* Initial implementation of OpenTelemetry APIs. (#3561)

* Start of tracing prototype

* Created initial implementation of azure-core-opentelemetry package

* New version of enabling MSVCRT Lib for static configs

* Attempt to add OpenTelemetry tests to build

* Take a dependency on OpenTelemetry version 1.3

* Added service API level tracing support

* API Review feedback

* storage unittest fix and improvement (#3667)

* main merge

* error

* Sync eng/common directory with azure-sdk-tools for PR 3362 (#3676)

* spell-check skippable by commit

* suceededOrFailed -> succeededOrFailed

Co-authored-by: scbedd <45376673+scbedd@users.noreply.github.com>

* Sync eng/common directory with azure-sdk-tools for PR 3378 (#3679)

* Create json package property parent directory

* Fix the issue in script

Co-authored-by: praveenkuttappan <prmarott@microsoft.com>

* Vcpkg sample (#3670)

* one commit to rule them all

* main merge

* error

* all smoke

* typo

* 120 minutes

* timeout param missing on job

* actual url

* Update samples/integration/vcpkg-all-smoke/src/main.cpp

Co-authored-by: Larry Osterman <LarryOsterman@users.noreply.github.com>

* actual creds

Co-authored-by: Larry Osterman <LarryOsterman@users.noreply.github.com>

* main merge

* error

* Complete the initial implementation of OpenTelemetry (#3677)

* Added telemetry support for HTTP pipeline elements

* Finish OpenTelemetry implementation

* clang-format and added doxygen comments

* Creadscan skips (#3671)

* one commit to rule them all

* main merge

* error

* add recordings for cred scan skipping

* certificates added

* remove dupe

* cspell

* Moved attestation factory back to static method on attestation class … (#3682)

* Moved attestation factory back to static method on attestation class and return a concrete type not a pointer

* Fixed factory in readme file

* main merge

* error

* main merge

* error

* iyuuyyu

* revert space

* OpenTelemetry API Review Feedback (#3687)

* OpenTelemetry API Review Feedback

* vcpkg version

* typos

* Attestation 1.0.0 GA Release (#3693)

* Prepare attestation for release

* removed references to RetrieveResponseValidationCollateral from docs

* Added C++ SDK team as owners of attestation SDK

* Added Ahmad from attestation team to attestation owners

* Removed dead API; switched attestation back to beta-3

* Disable detached head warnings on sparse checkout to commit (#3680)

Co-authored-by: Ben Broderick Phillips <bebroder@microsoft.com>

* Remove samples with docker.io (#3621)

* remove samples using docker.io

* removing docker files

* remove project

* Fix issue where matrix replace was not using imported display names (#3694)

Co-authored-by: Ben Broderick Phillips <bebroder@microsoft.com>

* Additional OpenTelemetry Feedback... (#3691)

* OpenTelemetry API Review Feedback

* Returns std::unique_ptr<DiagnosticTracingFactory instead of raw pointer

* Late breaking pull request feedback

* Renamed clientContext parameter to CreateSpan

* Renamed ContextAndSpanFactory to TracingContextFactory and CreateSpan to CreateTracingContext.

* Added ability to create instance with pointer (#3698)

* Added ability to create instance with pointer

* Pull request feedback

* Core 1.7.0-beta.1 Release (#3684)

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* Increment package version after release of azure-core (#3699)

* Format vcpkg.json (#3701)

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* Update README to list all the vcpkgs (#3704)

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* Removed version>= fields for openssl in vcpkg.json files (#3705)

* Tab vcpkg publishing condition in to apply to the task (#3709)

* Storage June Release (#3686)

* Override live test location default to westus (#3696)

* Changelog updates for secrets and certificates (#3714)

* Changelog updates for secrets and certificates

* Update package versions

* Removed empty sections in changelog (#3718)

* Identity 1.3.0 Release (#3685)

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* OpenTelemetry vcpkg fixes (#3716)

* OpenTelemetry vcpkg fixes

* Update ci.yml

* Drop version >= from project-level vcpkg

* find_package only supports numeric versions

* include(AzureBuildTargetForCI)

* Do not build as Windows/UWP DLL

* Docs and package dependencies

* Update condition

* Move condition down

* Move more under condition

* Rephrase condition

* Try hack for CI that won't affect vcpkg

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* Increment package version after release of azure-identity (#3721)

* Increment version for storage releases (#3713)

* Increment package version after release of azure-storage-common

* Increment package version after release of azure-storage-blobs

* [EngSys] Get Vcpkg automatically (#3614)

* get vcpkg automatically

* Updated changelog (#3726)

* Increment package version after release of azure-core-tracing-opentelemetry (#3727)

* Increment package version after release of azure-security-attestation (#3717)

* Increment package version after release of azure-security-attestation (#3720)

* Enable Distributed Tracing for Attestation SDK client. (#3706)

* Implement tracing for Attestation and Template services

* Pipeline no longer requires service name if opting into distributed tracing; enable tracing in attestation service

* Generate user-agent header from request activity policy

* Added test to catch the redacted header regression

* Updated documentation to reflect API surface changes

* Make sample service an object library (#3728)

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* Include �pi-version to default list of unredacted query params for logging (#3730)

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* Sync eng/common directory with azure-sdk-tools for PR 3433 (#3731)

* add condition

* divide line

Co-authored-by: Mariana Rios Flores <mariari@microsoft.com>

* Sync eng/common directory with azure-sdk-tools for PR 3267 (#3655)

* Use seperate scripts

* address comments.

* do compare and update

* save on the service level readme

* have the helper for reuse function

* remove mgmt table

* changes

* fix

* no return on error

* return if no contents

* Address comments

* change the table

* address wes comments.

* address wes comments.

* address more comments.

Co-authored-by: sima-zhu <sizhu@microsoft.com>

* Sync eng/common directory with azure-sdk-tools for PR 3386 (#3733)

* Update the order of remarks and examples to align with docs.ms

* change all occurance

* Update class.tmpl.partial

Co-authored-by: sizhu <sizhu@microsoft.com>
Co-authored-by: Sima Zhu <48036328+sima-zhu@users.noreply.github.com>

* ensure conditions all work properly in the case of a previous error (#3732)

Co-authored-by: Scott Beddall <scbedd@microsoft.com>

* InputSanitizer: rename to HttpSanitizer, remove static member (#3736)

* InputSanitizer => HttpSanitizer, remove static

* Update cpp

* Clang format

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* Increment version for keyvault releases (#3719)

* Increment package version after release of azure-security-keyvault-certificates

* Increment package version after release of azure-security-keyvault-secrets

* Update DistributedTracing.md (#3715)

Fix typo

* ApiView command line generation script (#3711)

* ApiView command line generation script

* Strongly typed parameters

Co-authored-by: Ben Broderick Phillips <ben@benbp.net>

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>
Co-authored-by: Ben Broderick Phillips <ben@benbp.net>

* Add missing license header to http_sanitizer source file (#3739)

* Add ResourceType parameter - Selects live test or perf test resources (#3740)

Co-authored-by: Mike Harder <mharder@microsoft.com>

* Update identity codeowners (#3744)

* ManagedIdentityCredential: Add support for AppServiceV2019 (#3734)

* ManagedIdentityCredential: Add support for AppServiceV2019

* Attempt to create 2019 before 2017

* Changelog update

Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>

* sasa

* format file

Co-authored-by: Azure SDK Bot <53356347+azure-sdk@users.noreply.github.com>
Co-authored-by: sima-zhu <sizhu@microsoft.com>
Co-authored-by: Sima Zhu <48036328+sima-zhu@users.noreply.github.com>
Co-authored-by: Wes Haggard <weshaggard@users.noreply.github.com>
Co-authored-by: Ben Broderick Phillips <bebroder@microsoft.com>
Co-authored-by: Heath Stewart <heaths@microsoft.com>
Co-authored-by: Patrick Hallisey <pahallis@microsoft.com>
Co-authored-by: Victor Vazquez <victor.vazquez@microsoft.com>
Co-authored-by: Jeffrey Richter <jeffrichter@live.com>
Co-authored-by: Larry Osterman <LarryOsterman@users.noreply.github.com>
Co-authored-by: Rick Winter <rick.winter@microsoft.com>
Co-authored-by: Ahson Khan <ahkha@microsoft.com>
Co-authored-by: JinmingHu <jinmhu@microsoft.com>
Co-authored-by: Daniel Jurek <djurek@microsoft.com>
Co-authored-by: Ben Broderick Phillips <ben@benbp.net>
Co-authored-by: Victor Vazquez <vhvb1989@gmail.com>
Co-authored-by: scbedd <45376673+scbedd@users.noreply.github.com>
Co-authored-by: Anton Kolesnyk <41349689+antkmsft@users.noreply.github.com>
Co-authored-by: Anton Kolesnyk <antkmsft@users.noreply.github.com>
Co-authored-by: Ahson Khan <ahson_ahmedk@yahoo.com>
Co-authored-by: Jeremi Piotrowski <jeremi.piotrowski@gmail.com>
Co-authored-by: Christopher Scott <chriss@microsoft.com>
Co-authored-by: Deyaaeldeen Almahallawi <dealmaha@microsoft.com>
Co-authored-by: praveenkuttappan <prmarott@microsoft.com>
Co-authored-by: Mariana Rios Flores <mariari@microsoft.com>
Co-authored-by: Scott Beddall <scbedd@microsoft.com>
Co-authored-by: Mike Harder <mharder@microsoft.com>
* Per request

* const

* Jeff feedback , clang, and test
* Per request

* const

* Jeff feedback , clang, and test

* API review feedback updates, missed client to update , and some comments that somehow got reverted from the branch

* missed comment
@gearama gearama requested a review from ahsonkhan July 1, 2022 19:20
@gearama
Copy link
Member Author

gearama commented Jul 1, 2022

@ahsonkhan your comments have been addressed , please review and if it 's ok approve so then i can merge and run the live tasts over the weekend

@ahsonkhan
Copy link
Member

Thanks @gearama. Are we targeting this change for the July release?

I would like to discuss the ServiceVersion change some more, to understand the goal better. Let's find some time today for it.

cc @JeffreyRichter

Copy link
Member

@vhvb1989 vhvb1989 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why are we removing ServiceVersion?

@JeffreyRichter
Copy link
Member

I requested the removal of ServiceVersion type and the hard-coding of the version string - I think we should do this in all our client libraries. Here's why: When we build a client library, we only test it with the latest service version and therefore, we can only support customers using this specific version. Different versions (newer or older) may be breaking and it is highly unlikely that our client library will work with a different service version. In which case, customers using this feature will cause our support burden to be very high.

By formalizing the service version concept with a specific data type and with some constant service version values, we are implying that this is a fully supported feature, and that the client library is guaranteed to work with older service versions. But we never test this, and we can't make this guarantee. By removing the ServiceVersion type and just having a simple string, we are not formalizing this concept, we are just implying to a customer that they could try a different string version and the client library may or may not work for them - our documentation for the service version string should even indicate that changing this value is not guaranteed to work. This way, customers understand that we have not tested this and do not support it. But, if it works for them and the specific operations and specific service versions they are trying, then great! We're happy to have made this possible for them.

Copy link
Member

@vhvb1989 vhvb1989 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ok, if removing ServiceVersion is fine, then this LGTM.

@JeffreyRichter , I am sort of confused by this change, because on one hand we say we would never introduce breaking changes and we have the extensible enums protecting the SDK client from Server's responses.
But on the other hand, we are saying we don't test and/or promise that the SDK client will work using an older Service Version?

Isn't one statement sort or contradicting the other? I am probably super wrong, but somehow the first statement makes me thing that old Service Versions previously shipped by the SDK are guaranteed to work, and in fact, a self-documented way for the SDK to show what versions have been supported by that SDK in the past.

Without this, there's not any hint for users to know if the client was ever used with a previous Service Version

Copy link
Member

@ahsonkhan ahsonkhan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Beyond the service version change discussion, this PR looks good to me overall.

Given we are shipping a beta release, I recommend we keep the ServiceVersion class for now, to remain consistent with previously shipped client SDKs (and previous version of KeyVault), and revisit this more broadly. Because it is reversible, either way, if we feel strongly to keep this PR as is, in the interest of time, that works too :)

Though I understand your concern that there might be an implied support to the customer or possible mismatch of expectations, @JeffreyRichter, that can be addressed with similar documentation.

I'd like to discuss the trade-offs a bit, and if we really want to do so, come up with a strategy to update all SDKs going forward. And take our time with such a change, along with update the guidelines as necessary - https://azure.github.io/azure-sdk/cpp_introduction.html#service-versions.

@JeffreyRichter
Copy link
Member

First, swaggers frequently have a mistake in them or lack of clarity that improving the swagger introduces a break which we have to allow because the change causes the swagger to more accurately reflect the true service behavior.

Second, Azure's policy DOES allow services to make breaking changes (we need to do this to be agile and competitive). The policy requires that the service team announce to customers that the latest version is breaking, and the old versions must work as-is for at least 3 more years. So, under this policy, we cannot guarantee that any client lib is backward compatible.

Third, services occasionally break due to legal, security, or compliance issues. In these cases, the customer notice is just 1 year and sometimes less depending on the severity of the issue. These are rare but they do happen.

In short: Service will break customers from time to time and we need to be cognizant of this.

@JeffreyRichter
Copy link
Member

I'm not sure where the C++ guidance on ServiceVersion came from but we can (and should) change that (in my opinion).

@ahsonkhan
Copy link
Member

ahsonkhan commented Jul 5, 2022

First, swaggers frequently have a mistake in them or lack of clarity that improving the swagger introduces a break which we have to allow because the change causes the swagger to more accurately reflect the true service behavior.

Second, Azure's policy DOES allow services to make breaking changes (we need to do this to be agile and competitive). The policy requires that the service team announce to customers that the latest version is breaking, and the old versions must work as-is for at least 3 more years. So, under this policy, we cannot guarantee that any client lib is backward compatible.

Third, services occasionally break due to legal, security, or compliance issues. In these cases, the customer notice is just 1 year and sometimes less depending on the severity of the issue. These are rare but they do happen.

In short: Service will break customers from time to time and we need to be cognizant of this.

Regarding 1, a swagger update to truly reflect the service behavior wouldn't really be a breaking change, so we wouldn't have to worry about that. As far as I understood things, we don't want to design our client SDK and versioning to try to paper over swagger or service-side breaking changes, anyway.

Regarding 2 & 3, since our SDK follows semver, if the service was to actually make breaking changes, we'd follow suite and rev the major version, and that newer SDK version will not support older ServiceVersion enum values, as expected.

@gearama
Copy link
Member Author

gearama commented Jul 5, 2022

/azp run cpp - keyvault

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@LarryOsterman
Copy link
Member

I requested the removal of ServiceVersion type and the hard-coding of the version string - I think we should do this in all our client libraries. Here's why: When we build a client library, we only test it with the latest service version and therefore, we can only support customers using this specific version. Different versions (newer or older) may be breaking and it is highly unlikely that our client library will work with a different service version. In which case, customers using this feature will cause our support burden to be very high.

By formalizing the service version concept with a specific data type and with some constant service version values, we are implying that this is a fully supported feature, and that the client library is guaranteed to work with older service versions. But we never test this, and we can't make this guarantee. By removing the ServiceVersion type and just having a simple string, we are not formalizing this concept, we are just implying to a customer that they could try a different string version and the client library may or may not work for them - our documentation for the service version string should even indicate that changing this value is not guaranteed to work. This way, customers understand that we have not tested this and do not support it. But, if it works for them and the specific operations and specific service versions they are trying, then great! We're happy to have made this possible for them.

That makes sense. However given those restrictions, why do we have a service version construct in the public API surface at all? And should the service throw if it encounters a service version which isn't supported? That way if a client specifies version 4 of the API but the SDK doesn't support version 4, it throws an exception to let the client know that it cannot be supported.

@JeffreyRichter
Copy link
Member

The reason to even offer the ServiceVersion field is that it provides an escape hatch for customers. C++ and many other (but not all) languages allow only one version of a client library to be loaded in a process and it's possible that the customer may want the old service behavior for some of their code and the new service behavior for other parts of their code. This "feature" allows the customer to TRY doing this. Without this feature, the customer MUST modify all their code to expect/use the new service behavior. If this fails, then the customer is forced to update all their code.

Another example where the ServiceVersion field can be useful is when not all clouds support the latest version of a service. This is particularly true for Azure Stack where the customers "own" upgrading the Azure services on the customer's timeframe. Unlike public clouds where MS owns updating the services. For these scenarios, the customer HAS to choose the api-version that is installed/available to them.

Another (rare) example (related to the example above) is something that the AzCopy utility makes BIG usage of: AzCopy allows customers to copy blogs from Azure Stack to a public cloud and vice versa. If this tool were written in C++, it can only load 1 version of the C++ Blob client library, but it must send download requests to Azure Stack using one version and upload requests to the public cloud using another version - the ServiceVersion field makes this possible. And, since Storage remains largely backward compatible and doesn't require newer esoteric features, this actually works very well in practice.

@LarryOsterman
Copy link
Member

LarryOsterman commented Jul 5, 2022

The reason to even offer the ServiceVersion field is that it provides an escape hatch for customers. C++ and many other (but not all) languages allow only one version of a client library to be loaded in a process and it's possible that the customer may want the old service behavior for some of their code and the new service behavior for other parts of their code. This "feature" allows the customer to TRY doing this. Without this feature, the customer MUST modify all their code to expect/use the new service behavior. If this fails, then the customer is forced to update all their code.

Another example where the ServiceVersion field can be useful is when not all clouds support the latest version of a service. This is particularly true for Azure Stack where the customers "own" upgrading the Azure services on the customer's timeframe. Unlike public clouds where MS owns updating the services. For these scenarios, the customer HAS to choose the api-version that is installed/available to them.

Another (rare) example (related to the example above) is something that the AzCopy utility makes BIG usage of: AzCopy allows customers to copy blogs from Azure Stack to a public cloud and vice versa. If this tool were written in C++, it can only load 1 version of the C++ Blob client library, but it must send download requests to Azure Stack using one version and upload requests to the public cloud using another version - the ServiceVersion field makes this possible. And, since Storage remains largely backward compatible and doesn't require newer esoteric features, this actually works very well in practice.

We should probably talk about that tomorrow AM (@ahsonkhan has made a similar request). IMHO, the only time ServiceVersion makes sense is if the client supports multiple versions. And then the client needs to reject requests to create the client with API versions that aren't supported by the client (since there is a presumption that there are breaking changes to the service API associated with each service API version). If the client doesn't understand the ServiceVersion provided by the customer, then the client should reject the ServiceVersion. And yes, that means that it's possible that if we update the client to remove support for a particular API version, it means we may force customers to change their code.

If the client is expected to support multiple versions, then IMHO it is incumbent on the client to ensure that it is tested against each of the versions it supports. There should be no situations where the client supports multiple versions but is tested against only one of them.

For the AzCopy scenario you described above, it only works if the AZ SDK client supports multiple versions. And if the AZ SDK client supports multiple versions, then the existing ServiceVersion construct expresses that support explicitly. And as I said: If a SDK client claims to support multiple API versions, then the SDK client MUST have test collateral for each API version.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants