From 66d07b65f58f3f1ccefc9616977e73638e42865b Mon Sep 17 00:00:00 2001 From: Larry Osterman Date: Fri, 19 Sep 2025 14:43:27 -0700 Subject: [PATCH 1/4] Updated emitter version --- eng/emitter-package-lock.json | 194 ++++----- eng/emitter-package.json | 4 +- .../generated/clients/certificate_client.rs | 397 +++++++++++++++--- .../src/generated/mod.rs | 2 + .../src/generated/models/enums.rs | 6 +- .../src/generated/models/method_options.rs | 4 + .../src/generated/clients/key_client.rs | 377 ++++++++++++++--- .../src/generated/mod.rs | 2 + .../src/generated/models/enums.rs | 42 +- .../src/generated/models/method_options.rs | 3 + .../src/generated/clients/secret_client.rs | 182 ++++++-- .../src/generated/mod.rs | 2 + .../src/generated/models/method_options.rs | 3 + .../generated/clients/append_blob_client.rs | 64 ++- .../src/generated/clients/blob_client.rs | 350 ++++++++++++--- .../clients/blob_container_client.rs | 257 ++++++++++-- .../generated/clients/blob_service_client.rs | 109 ++++- .../generated/clients/block_blob_client.rs | 110 ++++- .../src/generated/clients/page_blob_client.rs | 140 +++++- .../azure_storage_blob/src/generated/mod.rs | 2 + .../src/generated/models/enums.rs | 16 +- .../src/generated/models/method_options.rs | 3 + 22 files changed, 1862 insertions(+), 407 deletions(-) diff --git a/eng/emitter-package-lock.json b/eng/emitter-package-lock.json index ca4d93d009..3035c75d0c 100644 --- a/eng/emitter-package-lock.json +++ b/eng/emitter-package-lock.json @@ -5,7 +5,7 @@ "packages": { "": { "dependencies": { - "@azure-tools/typespec-rust": "0.22.0" + "@azure-tools/typespec-rust": "0.23.0" }, "devDependencies": { "@azure-tools/typespec-azure-core": "0.60.0", @@ -144,16 +144,16 @@ } }, "node_modules/@azure-tools/typespec-rust": { - "version": "0.22.0", - "resolved": "https://registry.npmjs.org/@azure-tools/typespec-rust/-/typespec-rust-0.22.0.tgz", - "integrity": "sha512-Lh/cBkMS8Xd79RjROmchdDDwTbrZZG5yYXPHQkyZww45RKAI8Cj6eh3D5hxII+UCN6tA47KfaZqP4QDblS5gfw==", + "version": "0.23.0", + "resolved": "https://registry.npmjs.org/@azure-tools/typespec-rust/-/typespec-rust-0.23.0.tgz", + "integrity": "sha512-qUsumRz0uO5seb1/lwVuVmC24THUTuD2lClL4ekIum8Y5KMX0jVzuFPeFaMgJEFUUW1Tn0FKr6gyGcw+j+q7KA==", "license": "MIT", "dependencies": { "@azure-tools/codegen": "~2.10.1", "@azure-tools/linq": "~3.1.263", "@types/turndown": "^5.0.5", "linkifyjs": "^4.3.2", - "query-string": "9.2.2", + "query-string": "9.3.0", "source-map-support": "0.5.21", "turndown": "^7.2.1" }, @@ -189,16 +189,25 @@ "node": ">=6.9.0" } }, + "node_modules/@inquirer/ansi": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/@inquirer/ansi/-/ansi-1.0.0.tgz", + "integrity": "sha512-JWaTfCxI1eTmJ1BIv86vUfjVatOdxwD0DAVKYevY8SazeUUZtW+tNbsdejVO1GYE0GXJW1N1ahmiC3TFd+7wZA==", + "license": "MIT", + "engines": { + "node": ">=18" + } + }, "node_modules/@inquirer/checkbox": { - "version": "4.2.2", - "resolved": "https://registry.npmjs.org/@inquirer/checkbox/-/checkbox-4.2.2.tgz", - "integrity": "sha512-E+KExNurKcUJJdxmjglTl141EwxWyAHplvsYJQgSwXf8qiNWkTxTuCCqmhFEmbIXd4zLaGMfQFJ6WrZ7fSeV3g==", + "version": "4.2.4", + "resolved": "https://registry.npmjs.org/@inquirer/checkbox/-/checkbox-4.2.4.tgz", + "integrity": "sha512-2n9Vgf4HSciFq8ttKXk+qy+GsyTXPV1An6QAwe/8bkbbqvG4VW1I/ZY1pNu2rf+h9bdzMLPbRSfcNxkHBy/Ydw==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", + "@inquirer/ansi": "^1.0.0", + "@inquirer/core": "^10.2.2", "@inquirer/figures": "^1.0.13", "@inquirer/type": "^3.0.8", - "ansi-escapes": "^4.3.2", "yoctocolors-cjs": "^2.1.2" }, "engines": { @@ -214,12 +223,12 @@ } }, "node_modules/@inquirer/confirm": { - "version": "5.1.16", - "resolved": "https://registry.npmjs.org/@inquirer/confirm/-/confirm-5.1.16.tgz", - "integrity": "sha512-j1a5VstaK5KQy8Mu8cHmuQvN1Zc62TbLhjJxwHvKPPKEoowSF6h/0UdOpA9DNdWZ+9Inq73+puRq1df6OJ8Sag==", + "version": "5.1.18", + "resolved": "https://registry.npmjs.org/@inquirer/confirm/-/confirm-5.1.18.tgz", + "integrity": "sha512-MilmWOzHa3Ks11tzvuAmFoAd/wRuaP3SwlT1IZhyMke31FKLxPiuDWcGXhU+PKveNOpAc4axzAgrgxuIJJRmLw==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", + "@inquirer/core": "^10.2.2", "@inquirer/type": "^3.0.8" }, "engines": { @@ -235,14 +244,14 @@ } }, "node_modules/@inquirer/core": { - "version": "10.2.0", - "resolved": "https://registry.npmjs.org/@inquirer/core/-/core-10.2.0.tgz", - "integrity": "sha512-NyDSjPqhSvpZEMZrLCYUquWNl+XC/moEcVFqS55IEYIYsY0a1cUCevSqk7ctOlnm/RaSBU5psFryNlxcmGrjaA==", + "version": "10.2.2", + "resolved": "https://registry.npmjs.org/@inquirer/core/-/core-10.2.2.tgz", + "integrity": "sha512-yXq/4QUnk4sHMtmbd7irwiepjB8jXU0kkFRL4nr/aDBA2mDz13cMakEWdDwX3eSCTkk03kwcndD1zfRAIlELxA==", "license": "MIT", "dependencies": { + "@inquirer/ansi": "^1.0.0", "@inquirer/figures": "^1.0.13", "@inquirer/type": "^3.0.8", - "ansi-escapes": "^4.3.2", "cli-width": "^4.1.0", "mute-stream": "^2.0.0", "signal-exit": "^4.1.0", @@ -262,13 +271,13 @@ } }, "node_modules/@inquirer/editor": { - "version": "4.2.18", - "resolved": "https://registry.npmjs.org/@inquirer/editor/-/editor-4.2.18.tgz", - "integrity": "sha512-yeQN3AXjCm7+Hmq5L6Dm2wEDeBRdAZuyZ4I7tWSSanbxDzqM0KqzoDbKM7p4ebllAYdoQuPJS6N71/3L281i6w==", + "version": "4.2.20", + "resolved": "https://registry.npmjs.org/@inquirer/editor/-/editor-4.2.20.tgz", + "integrity": "sha512-7omh5y5bK672Q+Brk4HBbnHNowOZwrb/78IFXdrEB9PfdxL3GudQyDk8O9vQ188wj3xrEebS2M9n18BjJoI83g==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", - "@inquirer/external-editor": "^1.0.1", + "@inquirer/core": "^10.2.2", + "@inquirer/external-editor": "^1.0.2", "@inquirer/type": "^3.0.8" }, "engines": { @@ -284,12 +293,12 @@ } }, "node_modules/@inquirer/expand": { - "version": "4.0.18", - "resolved": "https://registry.npmjs.org/@inquirer/expand/-/expand-4.0.18.tgz", - "integrity": "sha512-xUjteYtavH7HwDMzq4Cn2X4Qsh5NozoDHCJTdoXg9HfZ4w3R6mxV1B9tL7DGJX2eq/zqtsFjhm0/RJIMGlh3ag==", + "version": "4.0.20", + "resolved": "https://registry.npmjs.org/@inquirer/expand/-/expand-4.0.20.tgz", + "integrity": "sha512-Dt9S+6qUg94fEvgn54F2Syf0Z3U8xmnBI9ATq2f5h9xt09fs2IJXSCIXyyVHwvggKWFXEY/7jATRo2K6Dkn6Ow==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", + "@inquirer/core": "^10.2.2", "@inquirer/type": "^3.0.8", "yoctocolors-cjs": "^2.1.2" }, @@ -306,13 +315,13 @@ } }, "node_modules/@inquirer/external-editor": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/@inquirer/external-editor/-/external-editor-1.0.1.tgz", - "integrity": "sha512-Oau4yL24d2B5IL4ma4UpbQigkVhzPDXLoqy1ggK4gnHg/stmkffJE4oOXHXF3uz0UEpywG68KcyXsyYpA1Re/Q==", + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/@inquirer/external-editor/-/external-editor-1.0.2.tgz", + "integrity": "sha512-yy9cOoBnx58TlsPrIxauKIFQTiyH+0MK4e97y4sV9ERbI+zDxw7i2hxHLCIEGIE/8PPvDxGhgzIOTSOWcs6/MQ==", "license": "MIT", "dependencies": { "chardet": "^2.1.0", - "iconv-lite": "^0.6.3" + "iconv-lite": "^0.7.0" }, "engines": { "node": ">=18" @@ -336,12 +345,12 @@ } }, "node_modules/@inquirer/input": { - "version": "4.2.2", - "resolved": "https://registry.npmjs.org/@inquirer/input/-/input-4.2.2.tgz", - "integrity": "sha512-hqOvBZj/MhQCpHUuD3MVq18SSoDNHy7wEnQ8mtvs71K8OPZVXJinOzcvQna33dNYLYE4LkA9BlhAhK6MJcsVbw==", + "version": "4.2.4", + "resolved": "https://registry.npmjs.org/@inquirer/input/-/input-4.2.4.tgz", + "integrity": "sha512-cwSGpLBMwpwcZZsc6s1gThm0J+it/KIJ+1qFL2euLmSKUMGumJ5TcbMgxEjMjNHRGadouIYbiIgruKoDZk7klw==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", + "@inquirer/core": "^10.2.2", "@inquirer/type": "^3.0.8" }, "engines": { @@ -357,12 +366,12 @@ } }, "node_modules/@inquirer/number": { - "version": "3.0.18", - "resolved": "https://registry.npmjs.org/@inquirer/number/-/number-3.0.18.tgz", - "integrity": "sha512-7exgBm52WXZRczsydCVftozFTrrwbG5ySE0GqUd2zLNSBXyIucs2Wnm7ZKLe/aUu6NUg9dg7Q80QIHCdZJiY4A==", + "version": "3.0.20", + "resolved": "https://registry.npmjs.org/@inquirer/number/-/number-3.0.20.tgz", + "integrity": "sha512-bbooay64VD1Z6uMfNehED2A2YOPHSJnQLs9/4WNiV/EK+vXczf/R988itL2XLDGTgmhMF2KkiWZo+iEZmc4jqg==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", + "@inquirer/core": "^10.2.2", "@inquirer/type": "^3.0.8" }, "engines": { @@ -378,14 +387,14 @@ } }, "node_modules/@inquirer/password": { - "version": "4.0.18", - "resolved": "https://registry.npmjs.org/@inquirer/password/-/password-4.0.18.tgz", - "integrity": "sha512-zXvzAGxPQTNk/SbT3carAD4Iqi6A2JS2qtcqQjsL22uvD+JfQzUrDEtPjLL7PLn8zlSNyPdY02IiQjzoL9TStA==", + "version": "4.0.20", + "resolved": "https://registry.npmjs.org/@inquirer/password/-/password-4.0.20.tgz", + "integrity": "sha512-nxSaPV2cPvvoOmRygQR+h0B+Av73B01cqYLcr7NXcGXhbmsYfUb8fDdw2Us1bI2YsX+VvY7I7upgFYsyf8+Nug==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", - "@inquirer/type": "^3.0.8", - "ansi-escapes": "^4.3.2" + "@inquirer/ansi": "^1.0.0", + "@inquirer/core": "^10.2.2", + "@inquirer/type": "^3.0.8" }, "engines": { "node": ">=18" @@ -400,21 +409,21 @@ } }, "node_modules/@inquirer/prompts": { - "version": "7.8.4", - "resolved": "https://registry.npmjs.org/@inquirer/prompts/-/prompts-7.8.4.tgz", - "integrity": "sha512-MuxVZ1en1g5oGamXV3DWP89GEkdD54alcfhHd7InUW5BifAdKQEK9SLFa/5hlWbvuhMPlobF0WAx7Okq988Jxg==", + "version": "7.8.6", + "resolved": "https://registry.npmjs.org/@inquirer/prompts/-/prompts-7.8.6.tgz", + "integrity": "sha512-68JhkiojicX9SBUD8FE/pSKbOKtwoyaVj1kwqLfvjlVXZvOy3iaSWX4dCLsZyYx/5Ur07Fq+yuDNOen+5ce6ig==", "license": "MIT", "dependencies": { - "@inquirer/checkbox": "^4.2.2", - "@inquirer/confirm": "^5.1.16", - "@inquirer/editor": "^4.2.18", - "@inquirer/expand": "^4.0.18", - "@inquirer/input": "^4.2.2", - "@inquirer/number": "^3.0.18", - "@inquirer/password": "^4.0.18", - "@inquirer/rawlist": "^4.1.6", - "@inquirer/search": "^3.1.1", - "@inquirer/select": "^4.3.2" + "@inquirer/checkbox": "^4.2.4", + "@inquirer/confirm": "^5.1.18", + "@inquirer/editor": "^4.2.20", + "@inquirer/expand": "^4.0.20", + "@inquirer/input": "^4.2.4", + "@inquirer/number": "^3.0.20", + "@inquirer/password": "^4.0.20", + "@inquirer/rawlist": "^4.1.8", + "@inquirer/search": "^3.1.3", + "@inquirer/select": "^4.3.4" }, "engines": { "node": ">=18" @@ -429,12 +438,12 @@ } }, "node_modules/@inquirer/rawlist": { - "version": "4.1.6", - "resolved": "https://registry.npmjs.org/@inquirer/rawlist/-/rawlist-4.1.6.tgz", - "integrity": "sha512-KOZqa3QNr3f0pMnufzL7K+nweFFCCBs6LCXZzXDrVGTyssjLeudn5ySktZYv1XiSqobyHRYYK0c6QsOxJEhXKA==", + "version": "4.1.8", + "resolved": "https://registry.npmjs.org/@inquirer/rawlist/-/rawlist-4.1.8.tgz", + "integrity": "sha512-CQ2VkIASbgI2PxdzlkeeieLRmniaUU1Aoi5ggEdm6BIyqopE9GuDXdDOj9XiwOqK5qm72oI2i6J+Gnjaa26ejg==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", + "@inquirer/core": "^10.2.2", "@inquirer/type": "^3.0.8", "yoctocolors-cjs": "^2.1.2" }, @@ -451,12 +460,12 @@ } }, "node_modules/@inquirer/search": { - "version": "3.1.1", - "resolved": "https://registry.npmjs.org/@inquirer/search/-/search-3.1.1.tgz", - "integrity": "sha512-TkMUY+A2p2EYVY3GCTItYGvqT6LiLzHBnqsU1rJbrpXUijFfM6zvUx0R4civofVwFCmJZcKqOVwwWAjplKkhxA==", + "version": "3.1.3", + "resolved": "https://registry.npmjs.org/@inquirer/search/-/search-3.1.3.tgz", + "integrity": "sha512-D5T6ioybJJH0IiSUK/JXcoRrrm8sXwzrVMjibuPs+AgxmogKslaafy1oxFiorNI4s3ElSkeQZbhYQgLqiL8h6Q==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", + "@inquirer/core": "^10.2.2", "@inquirer/figures": "^1.0.13", "@inquirer/type": "^3.0.8", "yoctocolors-cjs": "^2.1.2" @@ -474,15 +483,15 @@ } }, "node_modules/@inquirer/select": { - "version": "4.3.2", - "resolved": "https://registry.npmjs.org/@inquirer/select/-/select-4.3.2.tgz", - "integrity": "sha512-nwous24r31M+WyDEHV+qckXkepvihxhnyIaod2MG7eCE6G0Zm/HUF6jgN8GXgf4U7AU6SLseKdanY195cwvU6w==", + "version": "4.3.4", + "resolved": "https://registry.npmjs.org/@inquirer/select/-/select-4.3.4.tgz", + "integrity": "sha512-Qp20nySRmfbuJBBsgPU7E/cL62Hf250vMZRzYDcBHty2zdD1kKCnoDFWRr0WO2ZzaXp3R7a4esaVGJUx0E6zvA==", "license": "MIT", "dependencies": { - "@inquirer/core": "^10.2.0", + "@inquirer/ansi": "^1.0.0", + "@inquirer/core": "^10.2.2", "@inquirer/figures": "^1.0.13", "@inquirer/type": "^3.0.8", - "ansi-escapes": "^4.3.2", "yoctocolors-cjs": "^2.1.2" }, "engines": { @@ -743,21 +752,6 @@ "url": "https://github.com/sponsors/epoberezkin" } }, - "node_modules/ansi-escapes": { - "version": "4.3.2", - "resolved": "https://registry.npmjs.org/ansi-escapes/-/ansi-escapes-4.3.2.tgz", - "integrity": "sha512-gKXj5ALrKWQLsYG9jlTRmR/xKluxHV+Z9QEwNIgCfM1/uwPMCuzVVnh5mwTd+OuBZcwSIMbqssNWRm1lE51QaQ==", - "license": "MIT", - "dependencies": { - "type-fest": "^0.21.3" - }, - "engines": { - "node": ">=8" - }, - "funding": { - "url": "https://github.com/sponsors/sindresorhus" - } - }, "node_modules/ansi-regex": { "version": "5.0.1", "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-5.0.1.tgz", @@ -1114,15 +1108,19 @@ "license": "ISC" }, "node_modules/iconv-lite": { - "version": "0.6.3", - "resolved": "https://registry.npmjs.org/iconv-lite/-/iconv-lite-0.6.3.tgz", - "integrity": "sha512-4fCk79wshMdzMp2rH06qWrJE4iolqLhCUH+OiuIgU++RB0+94NlDL81atO7GX55uUKueo0txHNtvEyI6D7WdMw==", + "version": "0.7.0", + "resolved": "https://registry.npmjs.org/iconv-lite/-/iconv-lite-0.7.0.tgz", + "integrity": "sha512-cf6L2Ds3h57VVmkZe+Pn+5APsT7FpqJtEhhieDCvrE2MK5Qk9MyffgQyuxQTm6BChfeZNtcOLHp9IcWRVcIcBQ==", "license": "MIT", "dependencies": { "safer-buffer": ">= 2.1.2 < 3.0.0" }, "engines": { "node": ">=0.10.0" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/express" } }, "node_modules/ignore": { @@ -1359,9 +1357,9 @@ } }, "node_modules/query-string": { - "version": "9.2.2", - "resolved": "https://registry.npmjs.org/query-string/-/query-string-9.2.2.tgz", - "integrity": "sha512-pDSIZJ9sFuOp6VnD+5IkakSVf+rICAuuU88Hcsr6AKL0QtxSIfVuKiVP2oahFI7tk3CRSexwV+Ya6MOoTxzg9g==", + "version": "9.3.0", + "resolved": "https://registry.npmjs.org/query-string/-/query-string-9.3.0.tgz", + "integrity": "sha512-IQHOQ9aauHAApwAaUYifpEyLHv6fpVGVkMOnwPzcDScLjbLj8tLsILn6unSW79NafOw1llh8oK7Gd0VwmXBFmA==", "license": "MIT", "dependencies": { "decode-uri-component": "^0.4.1", @@ -1598,18 +1596,6 @@ "@mixmark-io/domino": "^2.2.0" } }, - "node_modules/type-fest": { - "version": "0.21.3", - "resolved": "https://registry.npmjs.org/type-fest/-/type-fest-0.21.3.tgz", - "integrity": "sha512-t0rzBq87m3fVcduHDUFhKmyyX+9eo6WQjZvf51Ea/M0Q7+T374Jp1aUiyUl0GKxp8M/OETVHSDvmkyPgvX+X2w==", - "license": "(MIT OR CC0-1.0)", - "engines": { - "node": ">=10" - }, - "funding": { - "url": "https://github.com/sponsors/sindresorhus" - } - }, "node_modules/unicorn-magic": { "version": "0.3.0", "resolved": "https://registry.npmjs.org/unicorn-magic/-/unicorn-magic-0.3.0.tgz", diff --git a/eng/emitter-package.json b/eng/emitter-package.json index f3980763ed..acd09e98f1 100644 --- a/eng/emitter-package.json +++ b/eng/emitter-package.json @@ -1,7 +1,7 @@ { "main": "dist/src/index.js", "dependencies": { - "@azure-tools/typespec-rust": "0.22.0" + "@azure-tools/typespec-rust": "0.23.0" }, "devDependencies": { "@azure-tools/typespec-azure-core": "0.60.0", @@ -14,4 +14,4 @@ "@typespec/versioning": "0.74", "@typespec/xml": "0.74" } -} \ No newline at end of file +} diff --git a/sdk/keyvault/azure_security_keyvault_certificates/src/generated/clients/certificate_client.rs b/sdk/keyvault/azure_security_keyvault_certificates/src/generated/clients/certificate_client.rs index c960dfff8f..19a6e1f74f 100644 --- a/sdk/keyvault/azure_security_keyvault_certificates/src/generated/clients/certificate_client.rs +++ b/sdk/keyvault/azure_security_keyvault_certificates/src/generated/clients/certificate_client.rs @@ -29,12 +29,13 @@ use crate::generated::models::{ }; use azure_core::{ credentials::TokenCredential, + error::CheckSuccessOptions, fmt::SafeDebug, http::{ pager::{PagerResult, PagerState}, policies::{BearerTokenCredentialPolicy, Policy}, - BufResponse, ClientOptions, Method, NoFormat, Pager, Pipeline, Request, RequestContent, - Response, Url, + BufResponse, ClientOptions, Method, NoFormat, Pager, Pipeline, PipelineSendOptions, + Request, RequestContent, Response, Url, }, json, tracing, Result, }; @@ -134,7 +135,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Post); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -173,7 +186,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -208,7 +233,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Delete); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -243,7 +280,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Delete); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -268,7 +317,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Delete); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -303,7 +364,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Delete); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -343,7 +416,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -377,7 +462,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -412,7 +509,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -437,8 +546,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -474,8 +594,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -510,8 +641,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -552,8 +694,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -609,8 +762,18 @@ impl CertificateClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListCertificatePropertiesResult = json::from_json(&bytes)?; @@ -683,8 +846,18 @@ impl CertificateClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListCertificatePropertiesResult = json::from_json(&bytes)?; @@ -753,8 +926,18 @@ impl CertificateClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListDeletedCertificatePropertiesResult = json::from_json(&bytes)?; @@ -817,8 +1000,18 @@ impl CertificateClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListIssuerPropertiesResult = json::from_json(&bytes)?; @@ -869,8 +1062,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -905,8 +1109,19 @@ impl CertificateClient { url.query_pairs_mut() .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Delete); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[204], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -942,8 +1157,19 @@ impl CertificateClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Post); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -971,8 +1197,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1000,8 +1237,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(contacts); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1041,8 +1289,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameter); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1081,8 +1340,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(certificate_operation); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1121,8 +1391,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(certificate_policy); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1167,8 +1448,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1207,8 +1499,19 @@ impl CertificateClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameter); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } } diff --git a/sdk/keyvault/azure_security_keyvault_certificates/src/generated/mod.rs b/sdk/keyvault/azure_security_keyvault_certificates/src/generated/mod.rs index c6745f9d34..32913ac03b 100644 --- a/sdk/keyvault/azure_security_keyvault_certificates/src/generated/mod.rs +++ b/sdk/keyvault/azure_security_keyvault_certificates/src/generated/mod.rs @@ -3,6 +3,8 @@ // Licensed under the MIT License. See License.txt in the project root for license information. // Code generated by Microsoft (R) Rust Code Generator. DO NOT EDIT. +/// Clients used to communicate with the service. pub mod clients; +/// Contains all the data structures and types used by the client library. pub mod models; pub use clients::{CertificateClient, CertificateClientOptions}; diff --git a/sdk/keyvault/azure_security_keyvault_certificates/src/generated/models/enums.rs b/sdk/keyvault/azure_security_keyvault_certificates/src/generated/models/enums.rs index 7025c67972..bea7b43050 100644 --- a/sdk/keyvault/azure_security_keyvault_certificates/src/generated/models/enums.rs +++ b/sdk/keyvault/azure_security_keyvault_certificates/src/generated/models/enums.rs @@ -77,7 +77,7 @@ create_extensible_enum!( #[doc = r#"The type of key pair to be used for the certificate."#] KeyType, #[doc = r#"Elliptic Curve."#] - (EC, "EC"), + (Ec, "EC"), #[doc = r#"Elliptic Curve with a private key which is not exportable from the HSM."#] (EcHsm, "EC-HSM"), #[doc = r#"Octet sequence (used to represent symmetric keys)."#] @@ -85,7 +85,7 @@ create_extensible_enum!( #[doc = r#"Octet sequence with a private key which is not exportable from the HSM."#] (OctHsm, "oct-HSM"), #[doc = r#"RSA (https://tools.ietf.org/html/rfc3447)."#] - (RSA, "RSA"), + (Rsa, "RSA"), #[doc = r#"RSA with a private key which is not exportable from the HSM."#] (RsaHsm, "RSA-HSM") ); @@ -94,7 +94,7 @@ create_extensible_enum!( #[doc = r#"Supported usages of a certificate key."#] KeyUsageType, #[doc = r#"Indicates that the certificate key can be used to sign a certificate revocation list."#] - (CRLSign, "cRLSign"), + (CRlSign, "cRLSign"), #[doc = r#"Indicates that the certificate key can be used for data encryption."#] (DataEncipherment, "dataEncipherment"), #[doc = r#"Indicates that the certificate key can be used for decryption only."#] diff --git a/sdk/keyvault/azure_security_keyvault_certificates/src/generated/models/method_options.rs b/sdk/keyvault/azure_security_keyvault_certificates/src/generated/models/method_options.rs index e2c8dbdeac..a9d4b48c0c 100644 --- a/sdk/keyvault/azure_security_keyvault_certificates/src/generated/models/method_options.rs +++ b/sdk/keyvault/azure_security_keyvault_certificates/src/generated/models/method_options.rs @@ -114,6 +114,7 @@ pub struct CertificateClientListCertificatePropertiesOptions<'a> { } impl CertificateClientListCertificatePropertiesOptions<'_> { + /// Transforms this [`CertificateClientListCertificatePropertiesOptions`] into a new `CertificateClientListCertificatePropertiesOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> CertificateClientListCertificatePropertiesOptions<'static> { CertificateClientListCertificatePropertiesOptions { include_pending: self.include_pending, @@ -136,6 +137,7 @@ pub struct CertificateClientListCertificatePropertiesVersionsOptions<'a> { } impl CertificateClientListCertificatePropertiesVersionsOptions<'_> { + /// Transforms this [`CertificateClientListCertificatePropertiesVersionsOptions`] into a new `CertificateClientListCertificatePropertiesVersionsOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> CertificateClientListCertificatePropertiesVersionsOptions<'static> { CertificateClientListCertificatePropertiesVersionsOptions { maxresults: self.maxresults, @@ -160,6 +162,7 @@ pub struct CertificateClientListDeletedCertificatePropertiesOptions<'a> { } impl CertificateClientListDeletedCertificatePropertiesOptions<'_> { + /// Transforms this [`CertificateClientListDeletedCertificatePropertiesOptions`] into a new `CertificateClientListDeletedCertificatePropertiesOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> CertificateClientListDeletedCertificatePropertiesOptions<'static> { CertificateClientListDeletedCertificatePropertiesOptions { include_pending: self.include_pending, @@ -182,6 +185,7 @@ pub struct CertificateClientListIssuerPropertiesOptions<'a> { } impl CertificateClientListIssuerPropertiesOptions<'_> { + /// Transforms this [`CertificateClientListIssuerPropertiesOptions`] into a new `CertificateClientListIssuerPropertiesOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> CertificateClientListIssuerPropertiesOptions<'static> { CertificateClientListIssuerPropertiesOptions { maxresults: self.maxresults, diff --git a/sdk/keyvault/azure_security_keyvault_keys/src/generated/clients/key_client.rs b/sdk/keyvault/azure_security_keyvault_keys/src/generated/clients/key_client.rs index 0354a281a6..6938575bb7 100644 --- a/sdk/keyvault/azure_security_keyvault_keys/src/generated/clients/key_client.rs +++ b/sdk/keyvault/azure_security_keyvault_keys/src/generated/clients/key_client.rs @@ -22,12 +22,13 @@ use crate::generated::models::{ }; use azure_core::{ credentials::TokenCredential, + error::CheckSuccessOptions, fmt::SafeDebug, http::{ pager::{PagerResult, PagerState}, policies::{BearerTokenCredentialPolicy, Policy}, - BufResponse, ClientOptions, Method, NoFormat, Pager, Pipeline, Request, RequestContent, - Response, Url, + BufResponse, ClientOptions, Method, NoFormat, Pager, Pipeline, PipelineSendOptions, + Request, RequestContent, Response, Url, }, json, tracing, Result, }; @@ -133,8 +134,19 @@ impl KeyClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Post); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -175,8 +187,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -224,8 +247,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -261,8 +295,19 @@ impl KeyClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Delete); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -309,8 +354,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -345,8 +401,19 @@ impl KeyClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -385,8 +452,19 @@ impl KeyClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -425,8 +503,19 @@ impl KeyClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -461,8 +550,19 @@ impl KeyClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -490,8 +590,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -531,8 +642,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -585,8 +707,18 @@ impl KeyClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListDeletedKeyPropertiesResult = json::from_json(&bytes)?; @@ -650,8 +782,18 @@ impl KeyClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListKeyPropertiesResult = json::from_json(&bytes)?; @@ -723,8 +865,18 @@ impl KeyClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListKeyPropertiesResult = json::from_json(&bytes)?; @@ -770,8 +922,19 @@ impl KeyClient { url.query_pairs_mut() .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Delete); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[204], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -807,8 +970,19 @@ impl KeyClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Post); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -851,8 +1025,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -887,8 +1072,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -922,8 +1118,19 @@ impl KeyClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Post); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -966,8 +1173,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1011,8 +1229,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1056,8 +1285,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1095,8 +1335,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(key_rotation_policy); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1141,8 +1392,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1188,8 +1450,19 @@ impl KeyClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } } diff --git a/sdk/keyvault/azure_security_keyvault_keys/src/generated/mod.rs b/sdk/keyvault/azure_security_keyvault_keys/src/generated/mod.rs index 96d724631c..6f174fd5b9 100644 --- a/sdk/keyvault/azure_security_keyvault_keys/src/generated/mod.rs +++ b/sdk/keyvault/azure_security_keyvault_keys/src/generated/mod.rs @@ -3,6 +3,8 @@ // Licensed under the MIT License. See License.txt in the project root for license information. // Code generated by Microsoft (R) Rust Code Generator. DO NOT EDIT. +/// Clients used to communicate with the service. pub mod clients; +/// Contains all the data structures and types used by the client library. pub mod models; pub use clients::{KeyClient, KeyClientOptions}; diff --git a/sdk/keyvault/azure_security_keyvault_keys/src/generated/models/enums.rs b/sdk/keyvault/azure_security_keyvault_keys/src/generated/models/enums.rs index da75278573..369a8ce28d 100644 --- a/sdk/keyvault/azure_security_keyvault_keys/src/generated/models/enums.rs +++ b/sdk/keyvault/azure_security_keyvault_keys/src/generated/models/enums.rs @@ -99,16 +99,16 @@ create_extensible_enum!( using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_1_5, which is included solely for backwards compatibility. Cryptographic standards no longer consider RSA with the PKCS#1 v1.5 padding scheme secure for encryption."#] - (RSA1_5, "RSA1_5"), - #[doc = r#"RSAES using Optimal Asymmetric Encryption Padding with a hash function of SHA-256 and a mask generation function of MGF1 -with SHA-256."#] - (RsaOAEP256, "RSA-OAEP-256"), + (Rsa1_5, "RSA1_5"), #[doc = r#"[Not recommended] RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in , with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_OAEP, which is included solely for backwards compatibility. RSA_OAEP utilizes SHA1, which has known collision problems."#] - (RsaOaep, "RSA-OAEP") + (RsaOaep, "RSA-OAEP"), + #[doc = r#"RSAES using Optimal Asymmetric Encryption Padding with a hash function of SHA-256 and a mask generation function of MGF1 +with SHA-256."#] + (RsaOaep256, "RSA-OAEP-256") ); create_extensible_enum!( @@ -156,7 +156,7 @@ create_extensible_enum!( #[doc = r#"JsonWebKey Key Type (kty), as defined in ."#] KeyType, #[doc = r#"Elliptic Curve."#] - (EC, "EC"), + (Ec, "EC"), #[doc = r#"Elliptic Curve with a private key which is stored in the HSM."#] (EcHsm, "EC-HSM"), #[doc = r#"Octet sequence (used to represent symmetric keys)"#] @@ -164,7 +164,7 @@ create_extensible_enum!( #[doc = r#"Octet sequence (used to represent symmetric keys) which is stored the HSM."#] (OctHsm, "oct-HSM"), #[doc = r#"RSA (https://tools.ietf.org/html/rfc3447)"#] - (RSA, "RSA"), + (Rsa, "RSA"), #[doc = r#"RSA with a private key which is stored in the HSM."#] (RsaHsm, "RSA-HSM") ); @@ -173,31 +173,31 @@ create_extensible_enum!( #[doc = r#"The signing/verification algorithm identifier. For more information on possible algorithm types, see JsonWebKeySignatureAlgorithm."#] SignatureAlgorithm, #[doc = r#"ECDSA using P-256 and SHA-256, as described in ."#] - (ES256, "ES256"), + (Es256, "ES256"), #[doc = r#"ECDSA using P-256K and SHA-256, as described in "#] - (ES256K, "ES256K"), + (Es256K, "ES256K"), #[doc = r#"ECDSA using P-384 and SHA-384, as described in "#] - (ES384, "ES384"), + (Es384, "ES384"), #[doc = r#"ECDSA using P-521 and SHA-512, as described in "#] - (ES512, "ES512"), + (Es512, "ES512"), #[doc = r#"HMAC using SHA-256, as described in "#] - (HS256, "HS256"), + (Hs256, "HS256"), #[doc = r#"HMAC using SHA-384, as described in "#] - (HS384, "HS384"), + (Hs384, "HS384"), #[doc = r#"HMAC using SHA-512, as described in "#] - (HS512, "HS512"), + (Hs512, "HS512"), #[doc = r#"RSASSA-PSS using SHA-256 and MGF1 with SHA-256, as described in "#] - (PS256, "PS256"), + (Ps256, "PS256"), #[doc = r#"RSASSA-PSS using SHA-384 and MGF1 with SHA-384, as described in "#] - (PS384, "PS384"), + (Ps384, "PS384"), #[doc = r#"RSASSA-PSS using SHA-512 and MGF1 with SHA-512, as described in "#] - (PS512, "PS512"), + (Ps512, "PS512"), #[doc = r#"RSASSA-PKCS1-v1_5 using SHA-256, as described in "#] - (RS256, "RS256"), + (Rs256, "RS256"), #[doc = r#"RSASSA-PKCS1-v1_5 using SHA-384, as described in "#] - (RS384, "RS384"), + (Rs384, "RS384"), #[doc = r#"RSASSA-PKCS1-v1_5 using SHA-512, as described in "#] - (RS512, "RS512"), + (Rs512, "RS512"), #[doc = r#"Reserved"#] - (RSNULL, "RSNULL") + (Rsnull, "RSNULL") ); diff --git a/sdk/keyvault/azure_security_keyvault_keys/src/generated/models/method_options.rs b/sdk/keyvault/azure_security_keyvault_keys/src/generated/models/method_options.rs index 361af50dec..213d5ac270 100644 --- a/sdk/keyvault/azure_security_keyvault_keys/src/generated/models/method_options.rs +++ b/sdk/keyvault/azure_security_keyvault_keys/src/generated/models/method_options.rs @@ -107,6 +107,7 @@ pub struct KeyClientListDeletedKeyPropertiesOptions<'a> { } impl KeyClientListDeletedKeyPropertiesOptions<'_> { + /// Transforms this [`KeyClientListDeletedKeyPropertiesOptions`] into a new `KeyClientListDeletedKeyPropertiesOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> KeyClientListDeletedKeyPropertiesOptions<'static> { KeyClientListDeletedKeyPropertiesOptions { maxresults: self.maxresults, @@ -128,6 +129,7 @@ pub struct KeyClientListKeyPropertiesOptions<'a> { } impl KeyClientListKeyPropertiesOptions<'_> { + /// Transforms this [`KeyClientListKeyPropertiesOptions`] into a new `KeyClientListKeyPropertiesOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> KeyClientListKeyPropertiesOptions<'static> { KeyClientListKeyPropertiesOptions { maxresults: self.maxresults, @@ -149,6 +151,7 @@ pub struct KeyClientListKeyPropertiesVersionsOptions<'a> { } impl KeyClientListKeyPropertiesVersionsOptions<'_> { + /// Transforms this [`KeyClientListKeyPropertiesVersionsOptions`] into a new `KeyClientListKeyPropertiesVersionsOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> KeyClientListKeyPropertiesVersionsOptions<'static> { KeyClientListKeyPropertiesVersionsOptions { maxresults: self.maxresults, diff --git a/sdk/keyvault/azure_security_keyvault_secrets/src/generated/clients/secret_client.rs b/sdk/keyvault/azure_security_keyvault_secrets/src/generated/clients/secret_client.rs index 806b7cfcdc..33004d092c 100644 --- a/sdk/keyvault/azure_security_keyvault_secrets/src/generated/clients/secret_client.rs +++ b/sdk/keyvault/azure_security_keyvault_secrets/src/generated/clients/secret_client.rs @@ -16,12 +16,13 @@ use crate::generated::models::{ }; use azure_core::{ credentials::TokenCredential, + error::CheckSuccessOptions, fmt::SafeDebug, http::{ pager::{PagerResult, PagerState}, policies::{BearerTokenCredentialPolicy, Policy}, - BufResponse, ClientOptions, Method, NoFormat, Pager, Pipeline, Request, RequestContent, - Response, Url, + BufResponse, ClientOptions, Method, NoFormat, Pager, Pipeline, PipelineSendOptions, + Request, RequestContent, Response, Url, }, json, tracing, Result, }; @@ -121,8 +122,19 @@ impl SecretClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Post); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -157,8 +169,19 @@ impl SecretClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Delete); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -193,8 +216,19 @@ impl SecretClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -232,8 +266,19 @@ impl SecretClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Get); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -284,8 +329,18 @@ impl SecretClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListDeletedSecretPropertiesResult = json::from_json(&bytes)?; @@ -349,8 +404,18 @@ impl SecretClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListSecretPropertiesResult = json::from_json(&bytes)?; @@ -423,8 +488,18 @@ impl SecretClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListSecretPropertiesResult = json::from_json(&bytes)?; @@ -470,8 +545,19 @@ impl SecretClient { url.query_pairs_mut() .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Delete); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[204], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -506,8 +592,19 @@ impl SecretClient { .append_pair("api-version", &self.api_version); let mut request = Request::new(url, Method::Post); request.insert_header("accept", "application/json"); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -535,8 +632,19 @@ impl SecretClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -576,8 +684,19 @@ impl SecretClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -620,8 +739,19 @@ impl SecretClient { request.insert_header("accept", "application/json"); request.insert_header("content-type", "application/json"); request.set_body(parameters); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } } diff --git a/sdk/keyvault/azure_security_keyvault_secrets/src/generated/mod.rs b/sdk/keyvault/azure_security_keyvault_secrets/src/generated/mod.rs index be580976e8..9a26de892b 100644 --- a/sdk/keyvault/azure_security_keyvault_secrets/src/generated/mod.rs +++ b/sdk/keyvault/azure_security_keyvault_secrets/src/generated/mod.rs @@ -3,6 +3,8 @@ // Licensed under the MIT License. See License.txt in the project root for license information. // Code generated by Microsoft (R) Rust Code Generator. DO NOT EDIT. +/// Clients used to communicate with the service. pub mod clients; +/// Contains all the data structures and types used by the client library. pub mod models; pub use clients::{SecretClient, SecretClientOptions}; diff --git a/sdk/keyvault/azure_security_keyvault_secrets/src/generated/models/method_options.rs b/sdk/keyvault/azure_security_keyvault_secrets/src/generated/models/method_options.rs index 46a61ccbc6..acd2ef4c0d 100644 --- a/sdk/keyvault/azure_security_keyvault_secrets/src/generated/models/method_options.rs +++ b/sdk/keyvault/azure_security_keyvault_secrets/src/generated/models/method_options.rs @@ -47,6 +47,7 @@ pub struct SecretClientListDeletedSecretPropertiesOptions<'a> { } impl SecretClientListDeletedSecretPropertiesOptions<'_> { + /// Transforms this [`SecretClientListDeletedSecretPropertiesOptions`] into a new `SecretClientListDeletedSecretPropertiesOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> SecretClientListDeletedSecretPropertiesOptions<'static> { SecretClientListDeletedSecretPropertiesOptions { maxresults: self.maxresults, @@ -68,6 +69,7 @@ pub struct SecretClientListSecretPropertiesOptions<'a> { } impl SecretClientListSecretPropertiesOptions<'_> { + /// Transforms this [`SecretClientListSecretPropertiesOptions`] into a new `SecretClientListSecretPropertiesOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> SecretClientListSecretPropertiesOptions<'static> { SecretClientListSecretPropertiesOptions { maxresults: self.maxresults, @@ -89,6 +91,7 @@ pub struct SecretClientListSecretPropertiesVersionsOptions<'a> { } impl SecretClientListSecretPropertiesVersionsOptions<'_> { + /// Transforms this [`SecretClientListSecretPropertiesVersionsOptions`] into a new `SecretClientListSecretPropertiesVersionsOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> SecretClientListSecretPropertiesVersionsOptions<'static> { SecretClientListSecretPropertiesVersionsOptions { maxresults: self.maxresults, diff --git a/sdk/storage/azure_storage_blob/src/generated/clients/append_blob_client.rs b/sdk/storage/azure_storage_blob/src/generated/clients/append_blob_client.rs index 96438613a0..3261f4c969 100644 --- a/sdk/storage/azure_storage_blob/src/generated/clients/append_blob_client.rs +++ b/sdk/storage/azure_storage_blob/src/generated/clients/append_blob_client.rs @@ -12,10 +12,12 @@ use crate::generated::models::{ use azure_core::{ base64::encode, credentials::TokenCredential, + error::CheckSuccessOptions, fmt::SafeDebug, http::{ policies::{BearerTokenCredentialPolicy, Policy}, - ClientOptions, Method, NoFormat, Pipeline, Request, RequestContent, Response, Url, + ClientOptions, Method, NoFormat, Pipeline, PipelineSendOptions, Request, RequestContent, + Response, Url, }, time::to_rfc7231, tracing, Bytes, Result, @@ -217,8 +219,19 @@ impl AppendBlobClient { } request.insert_header("x-ms-version", &self.version); request.set_body(body); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -371,8 +384,19 @@ impl AppendBlobClient { request.insert_header("x-ms-source-range", source_range); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -513,8 +537,19 @@ impl AppendBlobClient { request.insert_header("x-ms-tags", blob_tags_string); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -596,8 +631,19 @@ impl AppendBlobClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } } diff --git a/sdk/storage/azure_storage_blob/src/generated/clients/blob_client.rs b/sdk/storage/azure_storage_blob/src/generated/clients/blob_client.rs index acb8c46d59..95e6cbb732 100644 --- a/sdk/storage/azure_storage_blob/src/generated/clients/blob_client.rs +++ b/sdk/storage/azure_storage_blob/src/generated/clients/blob_client.rs @@ -27,11 +27,12 @@ use crate::generated::{ use azure_core::{ base64::encode, credentials::TokenCredential, + error::CheckSuccessOptions, fmt::SafeDebug, http::{ policies::{BearerTokenCredentialPolicy, Policy}, - ClientOptions, Method, NoFormat, Pipeline, Request, RequestContent, Response, Url, - XmlFormat, + ClientOptions, Method, NoFormat, Pipeline, PipelineSendOptions, Request, RequestContent, + Response, Url, XmlFormat, }, time::to_rfc7231, tracing, Result, @@ -169,8 +170,19 @@ impl BlobClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[204], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -258,8 +270,19 @@ impl BlobClient { request.insert_header("x-ms-proposed-lease-id", proposed_lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -344,8 +367,19 @@ impl BlobClient { request.insert_header("x-ms-lease-break-period", break_period.to_string()); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -433,8 +467,19 @@ impl BlobClient { request.insert_header("x-ms-lease-id", lease_id); request.insert_header("x-ms-proposed-lease-id", proposed_lease_id); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -588,8 +633,19 @@ impl BlobClient { request.insert_header("x-ms-tags", blob_tags_string); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -693,8 +749,19 @@ impl BlobClient { } } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -764,8 +831,19 @@ impl BlobClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -827,8 +905,19 @@ impl BlobClient { request.insert_header("x-ms-client-request-id", client_request_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -980,8 +1069,19 @@ impl BlobClient { request.insert_header("x-ms-structured-body", structured_body_type); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200, 206], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1047,8 +1147,19 @@ impl BlobClient { request.insert_header("x-ms-client-request-id", client_request_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1222,8 +1333,19 @@ impl BlobClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1291,8 +1413,19 @@ impl BlobClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1374,8 +1507,19 @@ impl BlobClient { request.insert_header("x-ms-lease-action", "release"); request.insert_header("x-ms-lease-id", lease_id); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1460,8 +1604,19 @@ impl BlobClient { request.insert_header("x-ms-lease-action", "renew"); request.insert_header("x-ms-lease-id", lease_id); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1530,8 +1685,19 @@ impl BlobClient { request.insert_header("x-ms-expiry-time", to_rfc7231(&expires_on)); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1616,8 +1782,19 @@ impl BlobClient { ); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1685,8 +1862,19 @@ impl BlobClient { } request.insert_header("x-ms-legal-hold", legal_hold.to_string()); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1756,8 +1944,19 @@ impl BlobClient { request.insert_header(format!("x-ms-meta-{k}"), v); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1827,8 +2026,19 @@ impl BlobClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1878,8 +2088,19 @@ impl BlobClient { } request.insert_header("x-ms-version", &self.version); request.set_body(tags); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[204], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1931,8 +2152,19 @@ impl BlobClient { request.insert_header("x-ms-rehydrate-priority", rehydrate_priority.to_string()); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200, 202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -2074,8 +2306,19 @@ impl BlobClient { request.insert_header("x-ms-tags", blob_tags_string); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -2130,8 +2373,19 @@ impl BlobClient { request.insert_header("x-ms-client-request-id", client_request_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } } diff --git a/sdk/storage/azure_storage_blob/src/generated/clients/blob_container_client.rs b/sdk/storage/azure_storage_blob/src/generated/clients/blob_container_client.rs index 38dc5fe424..d6730f0139 100644 --- a/sdk/storage/azure_storage_blob/src/generated/clients/blob_container_client.rs +++ b/sdk/storage/azure_storage_blob/src/generated/clients/blob_container_client.rs @@ -26,12 +26,13 @@ use crate::generated::{ }; use azure_core::{ credentials::TokenCredential, + error::CheckSuccessOptions, fmt::SafeDebug, http::{ pager::{PagerResult, PagerState}, policies::{BearerTokenCredentialPolicy, Policy}, - BufResponse, ClientOptions, Method, NoFormat, PageIterator, Pipeline, Request, - RequestContent, Response, Url, XmlFormat, + BufResponse, ClientOptions, Method, NoFormat, PageIterator, Pipeline, PipelineSendOptions, + Request, RequestContent, Response, Url, XmlFormat, }, time::to_rfc7231, tracing, xml, Result, @@ -177,7 +178,19 @@ impl BlobContainerClient { request.insert_header("x-ms-proposed-lease-id", proposed_lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -251,8 +264,19 @@ impl BlobContainerClient { request.insert_header("x-ms-lease-break-period", break_period.to_string()); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -329,8 +353,19 @@ impl BlobContainerClient { request.insert_header("x-ms-lease-id", lease_id); request.insert_header("x-ms-proposed-lease-id", proposed_lease_id); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -377,8 +412,19 @@ impl BlobContainerClient { } } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -417,8 +463,19 @@ impl BlobContainerClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -472,8 +529,19 @@ impl BlobContainerClient { request.insert_header("x-ms-client-request-id", client_request_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -540,8 +608,19 @@ impl BlobContainerClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -603,8 +682,19 @@ impl BlobContainerClient { request.insert_header("x-ms-client-request-id", client_request_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -693,8 +783,19 @@ impl BlobContainerClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -791,8 +892,18 @@ impl BlobContainerClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListBlobsFlatSegmentResponse = xml::read_xml(&bytes)?; @@ -910,8 +1021,18 @@ impl BlobContainerClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListBlobsHierarchySegmentResponse = xml::read_xml(&bytes)?; @@ -995,8 +1116,19 @@ impl BlobContainerClient { request.insert_header("x-ms-lease-action", "release"); request.insert_header("x-ms-lease-id", lease_id); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1056,8 +1188,19 @@ impl BlobContainerClient { request.insert_header("x-ms-source-lease-id", source_lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1131,8 +1274,19 @@ impl BlobContainerClient { request.insert_header("x-ms-lease-action", "renew"); request.insert_header("x-ms-lease-id", lease_id); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1192,8 +1346,19 @@ impl BlobContainerClient { request.insert_header("x-ms-deleted-container-version", deleted_container_version); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1271,8 +1436,19 @@ impl BlobContainerClient { } request.insert_header("x-ms-version", &self.version); request.set_body(container_acl); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1314,8 +1490,19 @@ impl BlobContainerClient { request.insert_header(format!("x-ms-meta-{k}"), v); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } } diff --git a/sdk/storage/azure_storage_blob/src/generated/clients/blob_service_client.rs b/sdk/storage/azure_storage_blob/src/generated/clients/blob_service_client.rs index 5310ec9617..56b50b8032 100644 --- a/sdk/storage/azure_storage_blob/src/generated/clients/blob_service_client.rs +++ b/sdk/storage/azure_storage_blob/src/generated/clients/blob_service_client.rs @@ -16,12 +16,13 @@ use crate::generated::{ }; use azure_core::{ credentials::TokenCredential, + error::CheckSuccessOptions, fmt::SafeDebug, http::{ pager::{PagerResult, PagerState}, policies::{BearerTokenCredentialPolicy, Policy}, - BufResponse, ClientOptions, Method, NoFormat, PageIterator, Pipeline, Request, - RequestContent, Response, Url, XmlFormat, + BufResponse, ClientOptions, Method, NoFormat, PageIterator, Pipeline, PipelineSendOptions, + Request, RequestContent, Response, Url, XmlFormat, }, tracing, xml, Result, }; @@ -135,8 +136,19 @@ impl BlobServiceClient { request.insert_header("x-ms-client-request-id", client_request_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -197,8 +209,19 @@ impl BlobServiceClient { request.insert_header("x-ms-client-request-id", client_request_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -245,8 +268,19 @@ impl BlobServiceClient { request.insert_header("x-ms-client-request-id", client_request_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -301,8 +335,19 @@ impl BlobServiceClient { request.insert_header("x-ms-client-request-id", client_request_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -359,8 +404,19 @@ impl BlobServiceClient { } request.insert_header("x-ms-version", &self.version); request.set_body(key_info); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -429,8 +485,18 @@ impl BlobServiceClient { let ctx = options.method_options.context.clone(); let pipeline = pipeline.clone(); async move { - let rsp = pipeline.send(&ctx, &mut request, None).await?; - + let rsp = pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; let (status, headers, body) = rsp.deconstruct(); let bytes = body.collect().await?; let res: ListContainersSegmentResponse = xml::read_xml(&bytes)?; @@ -477,8 +543,19 @@ impl BlobServiceClient { } request.insert_header("x-ms-version", &self.version); request.set_body(blob_service_properties); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } } diff --git a/sdk/storage/azure_storage_blob/src/generated/clients/block_blob_client.rs b/sdk/storage/azure_storage_blob/src/generated/clients/block_blob_client.rs index 3507008f21..b888cfb16b 100644 --- a/sdk/storage/azure_storage_blob/src/generated/clients/block_blob_client.rs +++ b/sdk/storage/azure_storage_blob/src/generated/clients/block_blob_client.rs @@ -15,11 +15,12 @@ use crate::generated::models::{ use azure_core::{ base64::encode, credentials::TokenCredential, + error::CheckSuccessOptions, fmt::SafeDebug, http::{ policies::{BearerTokenCredentialPolicy, Policy}, - ClientOptions, Method, NoFormat, Pipeline, Request, RequestContent, Response, Url, - XmlFormat, + ClientOptions, Method, NoFormat, Pipeline, PipelineSendOptions, Request, RequestContent, + Response, Url, XmlFormat, }, time::to_rfc7231, tracing, Bytes, Result, @@ -251,8 +252,19 @@ impl BlockBlobClient { } request.insert_header("x-ms-version", &self.version); request.set_body(blocks); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -330,8 +342,19 @@ impl BlockBlobClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -457,8 +480,19 @@ impl BlockBlobClient { } request.insert_header("x-ms-version", &self.version); request.set_body(query_request); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200, 206], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -568,8 +602,19 @@ impl BlockBlobClient { } request.insert_header("x-ms-version", &self.version); request.set_body(body); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -701,8 +746,19 @@ impl BlockBlobClient { request.insert_header("x-ms-source-range", source_range); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -870,8 +926,19 @@ impl BlockBlobClient { } request.insert_header("x-ms-version", &self.version); request.set_body(body); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1053,8 +1120,19 @@ impl BlockBlobClient { request.insert_header("x-ms-tags", blob_tags_string); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } } diff --git a/sdk/storage/azure_storage_blob/src/generated/clients/page_blob_client.rs b/sdk/storage/azure_storage_blob/src/generated/clients/page_blob_client.rs index 9c61a40143..9e6d8f3650 100644 --- a/sdk/storage/azure_storage_blob/src/generated/clients/page_blob_client.rs +++ b/sdk/storage/azure_storage_blob/src/generated/clients/page_blob_client.rs @@ -17,11 +17,12 @@ use crate::generated::models::{ use azure_core::{ base64::encode, credentials::TokenCredential, + error::CheckSuccessOptions, fmt::SafeDebug, http::{ policies::{BearerTokenCredentialPolicy, Policy}, - ClientOptions, Method, NoFormat, Pipeline, Request, RequestContent, Response, Url, - XmlFormat, + ClientOptions, Method, NoFormat, Pipeline, PipelineSendOptions, Request, RequestContent, + Response, Url, XmlFormat, }, time::to_rfc7231, tracing, Bytes, Result, @@ -218,8 +219,19 @@ impl PageBlobClient { } request.insert_header("x-ms-page-write", "clear"); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -307,8 +319,19 @@ impl PageBlobClient { request.insert_header("x-ms-if-tags", if_tags); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[202], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -462,8 +485,19 @@ impl PageBlobClient { request.insert_header("x-ms-tags", blob_tags_string); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -559,8 +593,19 @@ impl PageBlobClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -665,8 +710,19 @@ impl PageBlobClient { request.insert_header("x-ms-previous-snapshot-url", prev_snapshot_url); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -768,8 +824,19 @@ impl PageBlobClient { request.insert_header("x-ms-lease-id", lease_id); } request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -866,8 +933,19 @@ impl PageBlobClient { sequence_number_action.to_string(), ); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[200], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1015,8 +1093,19 @@ impl PageBlobClient { } request.insert_header("x-ms-version", &self.version); request.set_body(body); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } @@ -1184,8 +1273,19 @@ impl PageBlobClient { } request.insert_header("x-ms-source-range", source_range); request.insert_header("x-ms-version", &self.version); - let rsp = self.pipeline.send(&ctx, &mut request, None).await?; - + let rsp = self + .pipeline + .send( + &ctx, + &mut request, + Some(PipelineSendOptions { + check_success: CheckSuccessOptions { + success_codes: &[201], + }, + ..Default::default() + }), + ) + .await?; Ok(rsp.into()) } } diff --git a/sdk/storage/azure_storage_blob/src/generated/mod.rs b/sdk/storage/azure_storage_blob/src/generated/mod.rs index b02ec3fc7e..a978fe1b09 100644 --- a/sdk/storage/azure_storage_blob/src/generated/mod.rs +++ b/sdk/storage/azure_storage_blob/src/generated/mod.rs @@ -3,7 +3,9 @@ // Licensed under the MIT License. See License.txt in the project root for license information. // Code generated by Microsoft (R) Rust Code Generator. DO NOT EDIT. +/// Clients used to communicate with the service. pub mod clients; +/// Contains all the data structures and types used by the client library. pub mod models; pub use clients::{ AppendBlobClient, AppendBlobClientOptions, BlobClient, BlobClientOptions, BlobContainerClient, diff --git a/sdk/storage/azure_storage_blob/src/generated/models/enums.rs b/sdk/storage/azure_storage_blob/src/generated/models/enums.rs index 086152ec14..45c143d2a8 100644 --- a/sdk/storage/azure_storage_blob/src/generated/models/enums.rs +++ b/sdk/storage/azure_storage_blob/src/generated/models/enums.rs @@ -157,7 +157,7 @@ create_enum!( if the x-ms-encryption-key header is provided."#] EncryptionAlgorithmType, #[doc = r#"The AES256 encryption algorithm."#] - (AES256, "AES256") + (Aes256, "AES256") ); create_extensible_enum!( @@ -305,7 +305,7 @@ create_enum!( #[doc = r#"The query request, note only SQL supported"#] QueryRequestType, #[doc = r#"The SQL request query type."#] - (SQL, "SQL") + (Sql, "SQL") ); create_enum!( @@ -316,7 +316,7 @@ create_enum!( #[doc = r#"The query format type is delimited."#] (Delimited, "delimited"), #[doc = r#"The query format type is JSON."#] - (JSON, "json"), + (Json, "json"), #[doc = r#"The query format type is Parquet."#] (Parquet, "parquet") ); @@ -346,15 +346,15 @@ create_enum!( #[doc = r#"The SKU types"#] SkuName, #[doc = r#"The premium LRS SKU."#] - (PremiumLRS, "Premium_LRS"), + (PremiumLrs, "Premium_LRS"), #[doc = r#"The standard GRS SKU."#] - (StandardGRS, "Standard_GRS"), + (StandardGrs, "Standard_GRS"), #[doc = r#"The standard LRS SKU."#] - (StandardLRS, "Standard_LRS"), + (StandardLrs, "Standard_LRS"), #[doc = r#"The standard RAGRS SKU."#] - (StandardRAGRS, "Standard_RAGRS"), + (StandardRagrs, "Standard_RAGRS"), #[doc = r#"The standard ZRS SKU."#] - (StandardZRS, "Standard_ZRS") + (StandardZrs, "Standard_ZRS") ); create_extensible_enum!( diff --git a/sdk/storage/azure_storage_blob/src/generated/models/method_options.rs b/sdk/storage/azure_storage_blob/src/generated/models/method_options.rs index cae5b48a49..3115d42fb7 100644 --- a/sdk/storage/azure_storage_blob/src/generated/models/method_options.rs +++ b/sdk/storage/azure_storage_blob/src/generated/models/method_options.rs @@ -1343,6 +1343,7 @@ pub struct BlobContainerClientListBlobFlatSegmentOptions<'a> { } impl BlobContainerClientListBlobFlatSegmentOptions<'_> { + /// Transforms this [`BlobContainerClientListBlobFlatSegmentOptions`] into a new `BlobContainerClientListBlobFlatSegmentOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> BlobContainerClientListBlobFlatSegmentOptions<'static> { BlobContainerClientListBlobFlatSegmentOptions { client_request_id: self.client_request_id, @@ -1388,6 +1389,7 @@ pub struct BlobContainerClientListBlobHierarchySegmentOptions<'a> { } impl BlobContainerClientListBlobHierarchySegmentOptions<'_> { + /// Transforms this [`BlobContainerClientListBlobHierarchySegmentOptions`] into a new `BlobContainerClientListBlobHierarchySegmentOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> BlobContainerClientListBlobHierarchySegmentOptions<'static> { BlobContainerClientListBlobHierarchySegmentOptions { client_request_id: self.client_request_id, @@ -1628,6 +1630,7 @@ pub struct BlobServiceClientListContainersSegmentOptions<'a> { } impl BlobServiceClientListContainersSegmentOptions<'_> { + /// Transforms this [`BlobServiceClientListContainersSegmentOptions`] into a new `BlobServiceClientListContainersSegmentOptions` that owns the underlying data, cloning it if necessary. pub fn into_owned(self) -> BlobServiceClientListContainersSegmentOptions<'static> { BlobServiceClientListContainersSegmentOptions { client_request_id: self.client_request_id, From 83064cf0ee83db597a342ff88a0d48f022143e6f Mon Sep 17 00:00:00 2001 From: Heath Stewart Date: Fri, 19 Sep 2025 16:53:49 -0700 Subject: [PATCH 2/4] Update emitter dependencies --- eng/emitter-package-lock.json | 8 ++++---- eng/emitter-package.json | 4 ++-- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/eng/emitter-package-lock.json b/eng/emitter-package-lock.json index 3035c75d0c..66ec69fff3 100644 --- a/eng/emitter-package-lock.json +++ b/eng/emitter-package-lock.json @@ -10,7 +10,7 @@ "devDependencies": { "@azure-tools/typespec-azure-core": "0.60.0", "@azure-tools/typespec-azure-rulesets": "0.60.0", - "@azure-tools/typespec-client-generator-core": "0.60.0", + "@azure-tools/typespec-client-generator-core": "0.60.1", "@typespec/compiler": "1.4", "@typespec/http": "1.4", "@typespec/openapi": "1.4", @@ -118,9 +118,9 @@ } }, "node_modules/@azure-tools/typespec-client-generator-core": { - "version": "0.60.0", - "resolved": "https://registry.npmjs.org/@azure-tools/typespec-client-generator-core/-/typespec-client-generator-core-0.60.0.tgz", - "integrity": "sha512-JV9uiqxDCzVVFeMctm4ebmUI4982B3dCdKx0nmonjfRf9a2/MXilEKExPIaNVR3ZqbFPXM/IepheY8t9YZNqSQ==", + "version": "0.60.1", + "resolved": "https://registry.npmjs.org/@azure-tools/typespec-client-generator-core/-/typespec-client-generator-core-0.60.1.tgz", + "integrity": "sha512-JnTUhFfeRJxznU8Q7LEBzg/HoNO13SAXxpmFM8JFrzNqchATTpaKGBuYE1NUPJ9AiuK1lpkI/t/f7mtSGxUKXg==", "license": "MIT", "dependencies": { "change-case": "~5.4.4", diff --git a/eng/emitter-package.json b/eng/emitter-package.json index acd09e98f1..593f91358c 100644 --- a/eng/emitter-package.json +++ b/eng/emitter-package.json @@ -6,7 +6,7 @@ "devDependencies": { "@azure-tools/typespec-azure-core": "0.60.0", "@azure-tools/typespec-azure-rulesets": "0.60.0", - "@azure-tools/typespec-client-generator-core": "0.60.0", + "@azure-tools/typespec-client-generator-core": "0.60.1", "@typespec/compiler": "1.4", "@typespec/http": "1.4", "@typespec/openapi": "1.4", @@ -14,4 +14,4 @@ "@typespec/versioning": "0.74", "@typespec/xml": "0.74" } -} +} \ No newline at end of file From aca3cc13198574872e49ea0e20ba235b3780aa38 Mon Sep 17 00:00:00 2001 From: Heath Stewart Date: Fri, 19 Sep 2025 17:09:11 -0700 Subject: [PATCH 3/4] Update KV tests and CHANGELOGs --- .../CHANGELOG.md | 3 +++ .../tests/certificate_client.rs | 4 ++-- .../azure_security_keyvault_keys/CHANGELOG.md | 6 ++++++ .../benches/benchmarks.rs | 10 +++++----- .../tests/key_client.rs | 18 +++++++++--------- 5 files changed, 25 insertions(+), 16 deletions(-) diff --git a/sdk/keyvault/azure_security_keyvault_certificates/CHANGELOG.md b/sdk/keyvault/azure_security_keyvault_certificates/CHANGELOG.md index 0435503a44..ab1abe3309 100644 --- a/sdk/keyvault/azure_security_keyvault_certificates/CHANGELOG.md +++ b/sdk/keyvault/azure_security_keyvault_certificates/CHANGELOG.md @@ -6,6 +6,9 @@ ### Breaking Changes +- Renamed `KeyType::EC` to `KeyType::Ec` to align with guidelines. +- Renamed `KeyType::RSA` to `KeyType::Rsa` to align with guidelines. + ### Bugs Fixed ### Other Changes diff --git a/sdk/keyvault/azure_security_keyvault_certificates/tests/certificate_client.rs b/sdk/keyvault/azure_security_keyvault_certificates/tests/certificate_client.rs index 3025346ce1..6440fb212e 100644 --- a/sdk/keyvault/azure_security_keyvault_certificates/tests/certificate_client.rs +++ b/sdk/keyvault/azure_security_keyvault_certificates/tests/certificate_client.rs @@ -259,7 +259,7 @@ async fn sign_jwt_with_ec_certificate(ctx: TestContext) -> Result<()> { ..Default::default() }), key_properties: Some(KeyProperties { - key_type: Some(KeyType::EC), + key_type: Some(KeyType::Ec), curve: Some(CurveName::P256), ..Default::default() }), @@ -293,7 +293,7 @@ async fn sign_jwt_with_ec_certificate(ctx: TestContext) -> Result<()> { let digest = sha256(JWT).to_vec(); let body = SignParameters { - algorithm: Some(SignatureAlgorithm::ES256), + algorithm: Some(SignatureAlgorithm::Es256), value: Some(digest), }; let signature = key_client diff --git a/sdk/keyvault/azure_security_keyvault_keys/CHANGELOG.md b/sdk/keyvault/azure_security_keyvault_keys/CHANGELOG.md index fef3363607..218379f4d4 100644 --- a/sdk/keyvault/azure_security_keyvault_keys/CHANGELOG.md +++ b/sdk/keyvault/azure_security_keyvault_keys/CHANGELOG.md @@ -6,6 +6,12 @@ ### Breaking Changes +- Renamed `KeyType::EC` to `KeyType::Ec` to align with guidelines. +- Renamed `KeyType::RSA` to `KeyType::Rsa` to align with guidelines. +- Renamed `EncryptionAlgorithm::RSA1_5` to `EncryptionAlgorithm::Rsa1_5` to align with guidelines. +- Renamed `EncryptionAlgorithm::RsaOAEP256` to `EncryptionAlgorithm::RsaOaep256` to align with guidelines. +- Renamed several variants in `SignatureAlgorithm` to align with guidelines e.g., `ES256K` to `Es256K`. + ### Bugs Fixed ### Other Changes diff --git a/sdk/keyvault/azure_security_keyvault_keys/benches/benchmarks.rs b/sdk/keyvault/azure_security_keyvault_keys/benches/benchmarks.rs index d6b9bd6d1b..b97a0e09cd 100644 --- a/sdk/keyvault/azure_security_keyvault_keys/benches/benchmarks.rs +++ b/sdk/keyvault/azure_security_keyvault_keys/benches/benchmarks.rs @@ -29,7 +29,7 @@ fn key_operations_benchmark(c: &mut Criterion) { let credential = credentials::from_env(None).unwrap(); let client: KeyClient = KeyClient::new(&keyvault_url, credential.clone(), None).unwrap(); let body = CreateKeyParameters { - kty: Some(KeyType::EC), + kty: Some(KeyType::Ec), curve: Some(CurveName::P256), ..Default::default() }; @@ -103,7 +103,7 @@ fn key_2901_benchmark_default(c: &mut Criterion) { let credential = credentials::from_env(None).unwrap(); let client: KeyClient = KeyClient::new(&keyvault_url, credential.clone(), None).unwrap(); let body = CreateKeyParameters { - kty: Some(KeyType::RSA), + kty: Some(KeyType::Rsa), key_size: Some(2048), ..Default::default() }; @@ -134,7 +134,7 @@ fn key_2901_benchmark_default(c: &mut Criterion) { c.bench_function("key_2901_benchmark_default", |b| { b.to_async(&rt).iter(|| async { let parameters = KeyOperationParameters { - algorithm: Some(EncryptionAlgorithm::RsaOAEP256), + algorithm: Some(EncryptionAlgorithm::RsaOaep256), value: Some(dek.to_vec()), ..Default::default() }; @@ -187,7 +187,7 @@ fn key_2901_benchmark_slow(c: &mut Criterion) { let client: KeyClient = KeyClient::new(&keyvault_url, credential.clone(), Some(options)).unwrap(); let body = CreateKeyParameters { - kty: Some(KeyType::RSA), + kty: Some(KeyType::Rsa), key_size: Some(2048), ..Default::default() }; @@ -218,7 +218,7 @@ fn key_2901_benchmark_slow(c: &mut Criterion) { c.bench_function("key_2901_benchmark_slow", |b| { b.to_async(&rt).iter(|| async { let parameters = KeyOperationParameters { - algorithm: Some(EncryptionAlgorithm::RsaOAEP256), + algorithm: Some(EncryptionAlgorithm::RsaOaep256), value: Some(dek.to_vec()), ..Default::default() }; diff --git a/sdk/keyvault/azure_security_keyvault_keys/tests/key_client.rs b/sdk/keyvault/azure_security_keyvault_keys/tests/key_client.rs index f10a12c31c..3ea0279eec 100644 --- a/sdk/keyvault/azure_security_keyvault_keys/tests/key_client.rs +++ b/sdk/keyvault/azure_security_keyvault_keys/tests/key_client.rs @@ -34,7 +34,7 @@ async fn key_roundtrip(ctx: TestContext) -> Result<()> { // Create an RSA key. let body = CreateKeyParameters { - kty: Some(KeyType::RSA), + kty: Some(KeyType::Rsa), key_size: Some(2048), ..Default::default() }; @@ -78,7 +78,7 @@ async fn update_key_properties(ctx: TestContext) -> Result<()> { // Create an EC key. let body = CreateKeyParameters { - kty: Some(KeyType::EC), + kty: Some(KeyType::Ec), curve: Some(CurveName::P256), ..Default::default() }; @@ -179,7 +179,7 @@ async fn purge_key(ctx: TestContext) -> Result<()> { // Create an RSA key. let body = CreateKeyParameters { - kty: Some(KeyType::RSA), + kty: Some(KeyType::Rsa), key_size: Some(2048), ..Default::default() }; @@ -237,7 +237,7 @@ async fn encrypt_decrypt(ctx: TestContext) -> Result<()> { // Create an RSA key. let body = CreateKeyParameters { - kty: Some(KeyType::RSA), + kty: Some(KeyType::Rsa), key_size: Some(2048), ..Default::default() }; @@ -254,7 +254,7 @@ async fn encrypt_decrypt(ctx: TestContext) -> Result<()> { // Encrypt plaintext. let plaintext = b"plaintext".to_vec(); let mut parameters = KeyOperationParameters { - algorithm: Some(EncryptionAlgorithm::RsaOAEP256), + algorithm: Some(EncryptionAlgorithm::RsaOaep256), value: Some(plaintext.clone()), ..Default::default() }; @@ -308,13 +308,13 @@ async fn sign_verify(ctx: TestContext) -> Result<()> { // Create an EC key. let body = CreateKeyParameters { - kty: Some(KeyType::EC), + kty: Some(KeyType::Ec), curve: Some(CurveName::P256), ..Default::default() }; const NAME: &str = "sign-verify"; - const ALG: Option = Some(SignatureAlgorithm::ES256); + const ALG: Option = Some(SignatureAlgorithm::Es256); let key = client .create_key(NAME, body.try_into()?, None) @@ -383,13 +383,13 @@ async fn wrap_key_unwrap_key(ctx: TestContext) -> Result<()> { // Create a KEK using RSA. let body = CreateKeyParameters { - kty: Some(KeyType::RSA), + kty: Some(KeyType::Rsa), key_size: Some(2048), ..Default::default() }; const NAME: &str = "wrap-key-unwrap-key"; - const ALG: Option = Some(EncryptionAlgorithm::RsaOAEP256); + const ALG: Option = Some(EncryptionAlgorithm::RsaOaep256); let key = client .create_key(NAME, body.try_into()?, None) From 3cba648613a9082fb8261d4b5b4327f4f0686e2d Mon Sep 17 00:00:00 2001 From: Heath Stewart Date: Fri, 19 Sep 2025 17:23:46 -0700 Subject: [PATCH 4/4] Fix doc tests --- sdk/keyvault/azure_security_keyvault_certificates/README.md | 4 ++-- sdk/keyvault/azure_security_keyvault_keys/README.md | 6 +++--- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/sdk/keyvault/azure_security_keyvault_certificates/README.md b/sdk/keyvault/azure_security_keyvault_certificates/README.md index 370e5fe1bd..b52fe9e7f3 100644 --- a/sdk/keyvault/azure_security_keyvault_certificates/README.md +++ b/sdk/keyvault/azure_security_keyvault_certificates/README.md @@ -369,7 +369,7 @@ async fn main() -> Result<(), Box> { ..Default::default() }), key_properties: Some(KeyProperties { - key_type: Some(KeyType::EC), + key_type: Some(KeyType::Ec), curve: Some(CurveName::P256), ..Default::default() }), @@ -398,7 +398,7 @@ async fn main() -> Result<(), Box> { None, )?; let body = SignParameters { - algorithm: Some(SignatureAlgorithm::ES256), + algorithm: Some(SignatureAlgorithm::Es256), value: Some(digest), }; diff --git a/sdk/keyvault/azure_security_keyvault_keys/README.md b/sdk/keyvault/azure_security_keyvault_keys/README.md index fd7ab5a00d..46a52004d5 100644 --- a/sdk/keyvault/azure_security_keyvault_keys/README.md +++ b/sdk/keyvault/azure_security_keyvault_keys/README.md @@ -124,7 +124,7 @@ async fn main() -> Result<(), Box> { // Create an EC key. let body = CreateKeyParameters { - kty: Some(KeyType::EC), + kty: Some(KeyType::Ec), curve: Some(CurveName::P256), ..Default::default() }; @@ -296,7 +296,7 @@ async fn main() -> Result<(), Box> { // Create a key encryption key (KEK) using RSA. let body = CreateKeyParameters { - kty: Some(KeyType::RSA), + kty: Some(KeyType::Rsa), key_size: Some(2048), ..Default::default() }; @@ -313,7 +313,7 @@ async fn main() -> Result<(), Box> { // Wrap the DEK. You'd store the wrapped DEK along with your encrypted data. let mut parameters = KeyOperationParameters { - algorithm: Some(EncryptionAlgorithm::RsaOAEP256), + algorithm: Some(EncryptionAlgorithm::RsaOaep256), value: Some(dek.clone()), ..Default::default() };