forked from Azure/azure-sdk-for-python
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Key rotation swagger change (Azure#11965)
* Key rotation swagger change * Run PrettierCheck * fixed spellcheck error * Update specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.3-preview/keys.json Co-authored-by: Heath Stewart <heaths@microsoft.com> * Update based on comments * fix prettier failure * Update Api names * Add custom words * Update to key rotation policy * Remove key rotation policy from response * Remove required * fix validation error * remove parameter force * Rotate api should be post * udpate description * Update UpdateKeyRotationPolicy-example * Update names * Microsoft.KeyVault-DP-7.3-preview-KeyAutoRotation * Update Co-authored-by: Jack Lichwa <52512203+jlichwa@users.noreply.github.com> Co-authored-by: Heath Stewart <heaths@microsoft.com>
- Loading branch information
1 parent
822c826
commit f4a4bad
Showing
5 changed files
with
361 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
37 changes: 37 additions & 0 deletions
37
...a-plane/Microsoft.KeyVault/preview/7.3-preview/examples/GetKeyRotationPolicy-example.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
{ | ||
"parameters": { | ||
"vaultBaseUrl": "https://myvault.vault.azure.net/", | ||
"key-name": "key01", | ||
"api-version": "7.3-preview" | ||
}, | ||
"responses": { | ||
"200": { | ||
"body": { | ||
"id": "https://myvault.vault.azure.net/keys/key01/rotationpolicy", | ||
"lifetimeActions": [ | ||
{ | ||
"trigger": { | ||
"timeAfterCreate": "P90D" | ||
}, | ||
"action": { | ||
"type": "rotate" | ||
} | ||
}, | ||
{ | ||
"trigger": { | ||
"timeBeforeExpiry": "P30D" | ||
}, | ||
"action": { | ||
"type": "notify" | ||
} | ||
} | ||
], | ||
"attributes": { | ||
"expiryTime": "P2Y", | ||
"created": 1482188947, | ||
"updated": 1482188948 | ||
} | ||
} | ||
} | ||
} | ||
} |
37 changes: 37 additions & 0 deletions
37
...eyvault/data-plane/Microsoft.KeyVault/preview/7.3-preview/examples/RotateKey-example.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
{ | ||
"parameters": { | ||
"vaultBaseUrl": "https://myvault.vault.azure.net/", | ||
"key-name": "Key01", | ||
"api-version": "7.3-preview" | ||
}, | ||
"responses": { | ||
"200": { | ||
"body": { | ||
"key": { | ||
"kid": "https://myvault.vault.azure.net/keys/CreateSoftKeyTest/78deebed173b48e48f55abf87ed4cf71", | ||
"kty": "RSA", | ||
"key_ops": [ | ||
"encrypt", | ||
"decrypt", | ||
"sign", | ||
"verify", | ||
"wrapKey", | ||
"unwrapKey" | ||
], | ||
"n": "2HJAE5fU3Cw2Rt9hEuq-F6XjINKGa-zskfISVqopqUy60GOs2eyhxbWbJBeUXNor_gf-tXtNeuqeBgitLeVa640UDvnEjYTKWjCniTxZRaU7ewY8BfTSk-7KxoDdLsPSpX_MX4rwlAx-_1UGk5t4sQgTbm9T6Fm2oqFd37dsz5-Gj27UP2GTAShfJPFD7MqU_zIgOI0pfqsbNL5xTQVM29K6rX4jSPtylZV3uWJtkoQIQnrIHhk1d0SC0KwlBV3V7R_LVYjiXLyIXsFzSNYgQ68ZjAwt8iL7I8Osa-ehQLM13DVvLASaf7Jnu3sC3CWl3Gyirgded6cfMmswJzY87w", | ||
"e": "AQAB" | ||
}, | ||
"attributes": { | ||
"enabled": true, | ||
"created": 1493942451, | ||
"updated": 1493942451, | ||
"recoveryLevel": "Recoverable+Purgeable" | ||
}, | ||
"tags": { | ||
"purpose": "unit test", | ||
"test name ": "CreateGetDeleteKeyTest" | ||
} | ||
} | ||
} | ||
} | ||
} |
60 changes: 60 additions & 0 deletions
60
...lane/Microsoft.KeyVault/preview/7.3-preview/examples/UpdateKeyRotationPolicy-example.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,60 @@ | ||
{ | ||
"parameters": { | ||
"vaultBaseUrl": "https://myvault.vault.azure.net/", | ||
"key-name": "updateKey01", | ||
"api-version": "7.3-preview", | ||
"keyRotationPolicy": { | ||
"lifetimeActions": [ | ||
{ | ||
"trigger": { | ||
"timeAfterCreate": "P90D" | ||
}, | ||
"action": { | ||
"type": "rotate" | ||
} | ||
}, | ||
{ | ||
"trigger": { | ||
"timeBeforeExpiry": "P30D" | ||
}, | ||
"action": { | ||
"type": "notify" | ||
} | ||
} | ||
], | ||
"attributes": { | ||
"expirationTime": "P2Y" | ||
} | ||
} | ||
}, | ||
"responses": { | ||
"200": { | ||
"body": { | ||
"id": "https://myvault.vault.azure.net/keys/updateKey01/rotationpolicy", | ||
"lifetimeActions": [ | ||
{ | ||
"trigger": { | ||
"timeAfterCreate": "P90D" | ||
}, | ||
"action": { | ||
"type": "rotate" | ||
} | ||
}, | ||
{ | ||
"trigger": { | ||
"timeBeforeExpiry": "P30D" | ||
}, | ||
"action": { | ||
"type": "notify" | ||
} | ||
} | ||
], | ||
"attributes": { | ||
"expiryTime": "P2Y", | ||
"created": 1482188947, | ||
"updated": 1482188948 | ||
} | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters