Hello community,
here is the log from the commit of package azure-cli-keyvault for openSUSE:Factory checked in at 2019-10-31 18:16:21
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/azure-cli-keyvault (Old)
and /work/SRC/openSUSE:Factory/.azure-cli-keyvault.new.2990 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "azure-cli-keyvault"
Thu Oct 31 18:16:21 2019 rev:7 rq:742697 version:2.2.16
Changes:
--------
--- /work/SRC/openSUSE:Factory/azure-cli-keyvault/azure-cli-keyvault.changes 2019-06-05 11:43:53.579030031 +0200
+++ /work/SRC/openSUSE:Factory/.azure-cli-keyvault.new.2990/azure-cli-keyvault.changes 2019-10-31 18:16:24.194081815 +0100
@@ -1,0 +2,9 @@
+Thu Oct 24 12:10:47 UTC 2019 - John Paul Adrian Glaubitz
+
+- New upstream release
+ + Version 2.2.11
+ + For detailed information about changes see the
+ HISTORY.txt file provided with this package
+- Update Requires from setup.py
+
+-------------------------------------------------------------------
Old:
----
azure-cli-keyvault-2.2.11.tar.gz
New:
----
azure-cli-keyvault-2.2.16.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ azure-cli-keyvault.spec ++++++
--- /var/tmp/diff_new_pack.o8VTF4/_old 2019-10-31 18:16:25.130082784 +0100
+++ /var/tmp/diff_new_pack.o8VTF4/_new 2019-10-31 18:16:25.134082788 +0100
@@ -17,7 +17,7 @@
Name: azure-cli-keyvault
-Version: 2.2.11
+Version: 2.2.16
Release: 0
Summary: Microsoft Azure CLI 'keyvault' Command Module
License: MIT
@@ -33,7 +33,7 @@
Requires: azure-cli-command-modules-nspkg
Requires: azure-cli-core
Requires: azure-cli-nspkg
-Requires: python3-azure-graphrbac >= 0.53.0
+Requires: python3-azure-graphrbac >= 0.60.0
Requires: python3-azure-keyvault >= 1.1.0
Requires: python3-azure-mgmt-keyvault >= 1.1.0
Requires: python3-azure-nspkg >= 3.0.0
++++++ azure-cli-keyvault-2.2.11.tar.gz -> azure-cli-keyvault-2.2.16.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.2.11/HISTORY.rst new/azure-cli-keyvault-2.2.16/HISTORY.rst
--- old/azure-cli-keyvault-2.2.11/HISTORY.rst 2019-02-12 03:05:13.000000000 +0100
+++ new/azure-cli-keyvault-2.2.16/HISTORY.rst 2019-06-13 23:17:46.000000000 +0200
@@ -2,6 +2,27 @@
Release History
===============
+
+2.2.16
+++++++
+* Minor fixes.
+
+2.2.15
+++++++
+* Minor fixes.
+
+2.2.14
+++++++
+* Minor fixes.
+
+2.2.13
+++++++
+* Minor fixes.
+
+2.2.12
+++++++
+* Minor fixes.
+
2.2.11
++++++
* keyvault secret backup: Fixes issue where some users received an 'unexpected_keyword' error when using --id.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.2.11/PKG-INFO new/azure-cli-keyvault-2.2.16/PKG-INFO
--- old/azure-cli-keyvault-2.2.11/PKG-INFO 2019-02-12 03:05:39.000000000 +0100
+++ new/azure-cli-keyvault-2.2.16/PKG-INFO 2019-06-13 23:18:19.000000000 +0200
@@ -1,6 +1,6 @@
Metadata-Version: 1.1
Name: azure-cli-keyvault
-Version: 2.2.11
+Version: 2.2.16
Summary: Microsoft Azure Command-Line Tools Keyvault Command Module
Home-page: https://github.com/Azure/azure-cli
Author: Microsoft Corporation
@@ -19,6 +19,27 @@
Release History
===============
+
+ 2.2.16
+ ++++++
+ * Minor fixes.
+
+ 2.2.15
+ ++++++
+ * Minor fixes.
+
+ 2.2.14
+ ++++++
+ * Minor fixes.
+
+ 2.2.13
+ ++++++
+ * Minor fixes.
+
+ 2.2.12
+ ++++++
+ * Minor fixes.
+
2.2.11
++++++
* keyvault secret backup: Fixes issue where some users received an 'unexpected_keyword' error when using --id.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_help.py new/azure-cli-keyvault-2.2.16/azure/cli/command_modules/keyvault/_help.py
--- old/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_help.py 2019-02-12 03:05:13.000000000 +0100
+++ new/azure-cli-keyvault-2.2.16/azure/cli/command_modules/keyvault/_help.py 2019-06-13 23:17:46.000000000 +0200
@@ -116,13 +116,17 @@
long-summary: Default permissions are created for the current user or service principal unless the `--no-self-perms` flag is specified.
examples:
- name: Create a key vault. (autogenerated)
- text: az keyvault create --name MyKeyVault --resource-group MyResourceGroup
+ text: az keyvault create --location westus2 --name MyKeyVault --resource-group MyResourceGroup
crafted: true
"""
helps['keyvault delete'] = """
type: command
short-summary: Delete a key vault.
+examples:
+ - name: Delete a key vault. (autogenerated)
+ text: az keyvault delete --name MyKeyVault --resource-group MyResourceGroup
+ crafted: true
"""
helps['keyvault key'] = """
@@ -144,6 +148,10 @@
type: command
short-summary: Recover a key vault.
long-summary: Recovers a previously deleted key vault for which soft delete was enabled.
+examples:
+ - name: Recover a key vault. (autogenerated)
+ text: az keyvault recover --location westus2 --name MyKeyVault --resource-group MyResourceGroup
+ crafted: true
"""
helps['keyvault secret'] = """
@@ -151,6 +159,11 @@
short-summary: Manage secrets.
"""
+helps['keyvault secret set'] = """
+type: command
+short-summary: Create a secret (if one doesn't exist) or update a secret in a KeyVault.
+"""
+
helps['keyvault show'] = """
type: command
short-summary: Show details of a key vault.
@@ -211,4 +224,8 @@
helps['keyvault update'] = """
type: command
short-summary: Update the properties of a key vault.
+examples:
+ - name: Update the properties of a key vault. (autogenerated)
+ text: az keyvault update --enabled-for-disk-encryption true --name MyKeyVault --resource-group MyResourceGroup
+ crafted: true
"""
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_params.py new/azure-cli-keyvault-2.2.16/azure/cli/command_modules/keyvault/_params.py
--- old/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_params.py 2019-02-12 03:05:13.000000000 +0100
+++ new/azure-cli-keyvault-2.2.16/azure/cli/command_modules/keyvault/_params.py 2019-06-13 23:17:46.000000000 +0200
@@ -165,6 +165,10 @@
with self.argument_context('keyvault secret download') as c:
c.argument('file_path', options_list=['--file', '-f'], type=file_type, completer=FilesCompleter(), help='File to receive the secret contents.')
c.argument('encoding', arg_type=get_enum_type(secret_encoding_values), options_list=['--encoding', '-e'], help="Encoding of the destination file. By default, will look for the 'file-encoding' tag on the secret. Otherwise will assume 'utf-8'.", default=None)
+
+ for scope in ['backup', 'restore']:
+ with self.argument_context('keyvault secret {}'.format(scope)) as c:
+ c.argument('file_path', options_list=['--file', '-f'], type=file_type, completer=FilesCompleter(), help='File to receive the secret contents.')
# endregion
# region KeyVault Storage Account
@@ -188,7 +192,7 @@
with self.argument_context('keyvault storage backup') as c:
c.argument('file_path', options_list=['--file', '-f'], type=file_type, completer=FilesCompleter(), help='Local file path in which to store storage account backup.')
- with self.argument_context('keyvault storagerestore') as c:
+ with self.argument_context('keyvault storage restore') as c:
c.argument('file_path', options_list=['--file', '-f'], type=file_type, completer=FilesCompleter(), help='Local key backup from which to restore storage account.')
with self.argument_context('keyvault storage sas-definition', arg_group='Id') as c:
@@ -253,9 +257,11 @@
c.argument('contact_phone', options_list=['--phone'], help='Contact phone number.')
with self.argument_context('keyvault certificate issuer admin') as c:
- c.argument('email', options_list=['--email'], help='Admin e-mail address. Must be unique within the vault.')
- c.argument('name', options_list=['--name'], help='Full admin name.')
- c.argument('phone', options_list=['--phone'], help='Amin phone number.')
+ c.argument('email', help='Admin e-mail address. Must be unique within the vault.')
+ c.argument('name', help='Full admin name.')
+ c.argument('phone', help='Admin phone number.')
+ c.argument('first_name', help='Admin first name.')
+ c.argument('last_name', help='Admin last name.')
with self.argument_context('keyvault certificate issuer') as c:
c.argument('issuer_name', help='Certificate issuer name.')
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/commands.py new/azure-cli-keyvault-2.2.16/azure/cli/command_modules/keyvault/commands.py
--- old/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/commands.py 2019-02-12 03:05:13.000000000 +0100
+++ new/azure-cli-keyvault-2.2.16/azure/cli/command_modules/keyvault/commands.py 2019-06-13 23:17:46.000000000 +0200
@@ -29,7 +29,7 @@
)
kv_vaults_sdk = CliCommandType(
- operations_tmpl='azure.mgmt.keyvault.operations.vaults_operations#VaultsOperations.{}',
+ operations_tmpl='azure.mgmt.keyvault.operations#VaultsOperations.{}',
client_factory=keyvault_client_vaults_factory,
resource_type=ResourceType.MGMT_KEYVAULT
)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/custom.py new/azure-cli-keyvault-2.2.16/azure/cli/command_modules/keyvault/custom.py
--- old/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/custom.py 2019-02-12 03:05:13.000000000 +0100
+++ new/azure-cli-keyvault-2.2.16/azure/cli/command_modules/keyvault/custom.py 2019-06-13 23:17:46.000000000 +0200
@@ -21,7 +21,7 @@
from azure.cli.core import telemetry
-from azure.cli.core.profiles import ResourceType, get_sdk
+from azure.cli.core.profiles import ResourceType
from ._validators import secret_text_encoding_values
@@ -216,12 +216,8 @@
def _create_network_rule_set(cmd, bypass=None, default_action=None):
NetworkRuleSet = cmd.get_models('NetworkRuleSet', resource_type=ResourceType.MGMT_KEYVAULT)
- NetworkRuleBypassOptions = get_sdk(cmd.cli_ctx,
- ResourceType.MGMT_KEYVAULT,
- 'models.key_vault_management_client_enums#NetworkRuleBypassOptions')
- NetworkRuleAction = get_sdk(cmd.cli_ctx,
- ResourceType.MGMT_KEYVAULT,
- 'models.key_vault_management_client_enums#NetworkRuleAction')
+ NetworkRuleBypassOptions = cmd.get_models('NetworkRuleBypassOptions', resource_type=ResourceType.MGMT_KEYVAULT)
+ NetworkRuleAction = cmd.get_models('NetworkRuleAction', resource_type=ResourceType.MGMT_KEYVAULT)
return NetworkRuleSet(bypass=bypass or NetworkRuleBypassOptions.azure_services.value,
default_action=default_action or NetworkRuleAction.allow.value)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.2.11/azure_cli_keyvault.egg-info/PKG-INFO new/azure-cli-keyvault-2.2.16/azure_cli_keyvault.egg-info/PKG-INFO
--- old/azure-cli-keyvault-2.2.11/azure_cli_keyvault.egg-info/PKG-INFO 2019-02-12 03:05:39.000000000 +0100
+++ new/azure-cli-keyvault-2.2.16/azure_cli_keyvault.egg-info/PKG-INFO 2019-06-13 23:18:19.000000000 +0200
@@ -1,6 +1,6 @@
Metadata-Version: 1.1
Name: azure-cli-keyvault
-Version: 2.2.11
+Version: 2.2.16
Summary: Microsoft Azure Command-Line Tools Keyvault Command Module
Home-page: https://github.com/Azure/azure-cli
Author: Microsoft Corporation
@@ -19,6 +19,27 @@
Release History
===============
+
+ 2.2.16
+ ++++++
+ * Minor fixes.
+
+ 2.2.15
+ ++++++
+ * Minor fixes.
+
+ 2.2.14
+ ++++++
+ * Minor fixes.
+
+ 2.2.13
+ ++++++
+ * Minor fixes.
+
+ 2.2.12
+ ++++++
+ * Minor fixes.
+
2.2.11
++++++
* keyvault secret backup: Fixes issue where some users received an 'unexpected_keyword' error when using --id.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.2.11/azure_cli_keyvault.egg-info/requires.txt new/azure-cli-keyvault-2.2.16/azure_cli_keyvault.egg-info/requires.txt
--- old/azure-cli-keyvault-2.2.11/azure_cli_keyvault.egg-info/requires.txt 2019-02-12 03:05:39.000000000 +0100
+++ new/azure-cli-keyvault-2.2.16/azure_cli_keyvault.egg-info/requires.txt 2019-06-13 23:18:19.000000000 +0200
@@ -1,5 +1,5 @@
azure-mgmt-keyvault==1.1.0
azure-keyvault==1.1.0
-azure-graphrbac==0.53.0
+azure-graphrbac==0.60.0
azure-cli-core
pyOpenSSL
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.2.11/setup.py new/azure-cli-keyvault-2.2.16/setup.py
--- old/azure-cli-keyvault-2.2.11/setup.py 2019-02-12 03:05:13.000000000 +0100
+++ new/azure-cli-keyvault-2.2.16/setup.py 2019-06-13 23:17:46.000000000 +0200
@@ -15,7 +15,7 @@
logger.warn("Wheel is not available, disabling bdist_wheel hook")
cmdclass = {}
-VERSION = "2.2.11"
+VERSION = "2.2.16"
# The full list of classifiers is available at
# https://pypi.python.org/pypi?%3Aaction=list_classifiers
@@ -36,7 +36,7 @@
DEPENDENCIES = [
'azure-mgmt-keyvault==1.1.0',
'azure-keyvault==1.1.0',
- 'azure-graphrbac==0.53.0',
+ 'azure-graphrbac==0.60.0',
'azure-cli-core',
'pyOpenSSL'
]