restic/vendor/github.com/Azure/azure-sdk-for-go/dataplane/keyvault/client.go

5981 lines
235 KiB
Go
Raw Normal View History

// Package keyvault implements the Azure ARM Keyvault service API version 2016-10-01.
2017-08-05 18:30:20 +00:00
//
// The key vault client performs cryptographic key operations and vault operations against the Key Vault service.
2017-08-05 18:30:20 +00:00
package keyvault
// Copyright (c) Microsoft and contributors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
//
// See the License for the specific language governing permissions and
// limitations under the License.
//
// Code generated by Microsoft (R) AutoRest Code Generator.
// Changes may cause incorrect behavior and will be lost if the code is regenerated.
2017-08-05 18:30:20 +00:00
import (
"github.com/Azure/go-autorest/autorest"
"github.com/Azure/go-autorest/autorest/azure"
"github.com/Azure/go-autorest/autorest/validation"
"net/http"
)
const ()
// ManagementClient is the base client for Keyvault.
type ManagementClient struct {
autorest.Client
}
// New creates an instance of the ManagementClient client.
func New() ManagementClient {
return NewWithoutDefaults()
}
// NewWithoutDefaults creates an instance of the ManagementClient client.
func NewWithoutDefaults() ManagementClient {
return ManagementClient{
Client: autorest.NewClientWithUserAgent(UserAgent()),
}
}
// BackupKey the Key Backup operation exports a key from Azure Key Vault in a protected form. Note that this operation
// does NOT return key material in a form that can be used outside the Azure Key Vault system, the returned key
// material is either protected to a Azure Key Vault HSM or to Azure Key Vault itself. The intent of this operation is
// to allow a client to GENERATE a key in one Azure Key Vault instance, BACKUP the key, and then RESTORE it into
// another Azure Key Vault instance. The BACKUP operation may be used to export, in protected form, any key type from
// Azure Key Vault. Individual versions of a key cannot be backed up. BACKUP / RESTORE can be performed within
// geographical boundaries only; meaning that a BACKUP from one geographical area cannot be restored to another
// geographical area. For example, a backup from the US geographical area cannot be restored in an EU geographical
// area.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) BackupKey(vaultBaseURL string, keyName string) (result BackupKeyResult, err error) {
req, err := client.BackupKeyPreparer(vaultBaseURL, keyName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "BackupKey", nil, "Failure preparing request")
return
}
resp, err := client.BackupKeySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "BackupKey", resp, "Failure sending request")
return
}
result, err = client.BackupKeyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "BackupKey", resp, "Failure responding to request")
}
return
}
// BackupKeyPreparer prepares the BackupKey request.
func (client ManagementClient) BackupKeyPreparer(vaultBaseURL string, keyName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/backup", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// BackupKeySender sends the BackupKey request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) BackupKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// BackupKeyResponder handles the response to the BackupKey request. The method always
// closes the http.Response Body.
func (client ManagementClient) BackupKeyResponder(resp *http.Response) (result BackupKeyResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// BackupSecret requests that a backup of the specified secret be downloaded to the client. Authorization: requires the
// secrets/backup permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. secretName is the name of the secret.
func (client ManagementClient) BackupSecret(vaultBaseURL string, secretName string) (result BackupSecretResult, err error) {
req, err := client.BackupSecretPreparer(vaultBaseURL, secretName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "BackupSecret", nil, "Failure preparing request")
return
}
resp, err := client.BackupSecretSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "BackupSecret", resp, "Failure sending request")
return
}
result, err = client.BackupSecretResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "BackupSecret", resp, "Failure responding to request")
}
return
}
// BackupSecretPreparer prepares the BackupSecret request.
func (client ManagementClient) BackupSecretPreparer(vaultBaseURL string, secretName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"secret-name": autorest.Encode("path", secretName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/secrets/{secret-name}/backup", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// BackupSecretSender sends the BackupSecret request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) BackupSecretSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// BackupSecretResponder handles the response to the BackupSecret request. The method always
// closes the http.Response Body.
func (client ManagementClient) BackupSecretResponder(resp *http.Response) (result BackupSecretResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// CreateCertificate if this is the first version, the certificate resource is created.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate. parameters is the parameters to create a certificate.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) CreateCertificate(vaultBaseURL string, certificateName string, parameters CertificateCreateParameters) (result CertificateOperation, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: certificateName,
Constraints: []validation.Constraint{{Target: "certificateName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z-]+$`, Chain: nil}}},
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.CertificatePolicy", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "parameters.CertificatePolicy.X509CertificateProperties", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "parameters.CertificatePolicy.X509CertificateProperties.ValidityInMonths", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "parameters.CertificatePolicy.X509CertificateProperties.ValidityInMonths", Name: validation.InclusiveMinimum, Rule: 0, Chain: nil}}},
}},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "CreateCertificate")
}
req, err := client.CreateCertificatePreparer(vaultBaseURL, certificateName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "CreateCertificate", nil, "Failure preparing request")
return
}
resp, err := client.CreateCertificateSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "CreateCertificate", resp, "Failure sending request")
return
}
result, err = client.CreateCertificateResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "CreateCertificate", resp, "Failure responding to request")
}
return
}
// CreateCertificatePreparer prepares the CreateCertificate request.
func (client ManagementClient) CreateCertificatePreparer(vaultBaseURL string, certificateName string, parameters CertificateCreateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/create", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// CreateCertificateSender sends the CreateCertificate request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) CreateCertificateSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// CreateCertificateResponder handles the response to the CreateCertificate request. The method always
// closes the http.Response Body.
func (client ManagementClient) CreateCertificateResponder(resp *http.Response) (result CertificateOperation, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// CreateKey the create key operation can be used to create any key type in Azure Key Vault. If the named key already
// exists, Azure Key Vault creates a new version of the key.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name for the new key.
// The system will generate the version name for the new key. parameters is the parameters to create a key.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) CreateKey(vaultBaseURL string, keyName string, parameters KeyCreateParameters) (result KeyBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: keyName,
Constraints: []validation.Constraint{{Target: "keyName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z-]+$`, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "CreateKey")
}
req, err := client.CreateKeyPreparer(vaultBaseURL, keyName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "CreateKey", nil, "Failure preparing request")
return
}
resp, err := client.CreateKeySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "CreateKey", resp, "Failure sending request")
return
}
result, err = client.CreateKeyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "CreateKey", resp, "Failure responding to request")
}
return
}
// CreateKeyPreparer prepares the CreateKey request.
func (client ManagementClient) CreateKeyPreparer(vaultBaseURL string, keyName string, parameters KeyCreateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/create", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// CreateKeySender sends the CreateKey request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) CreateKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// CreateKeyResponder handles the response to the CreateKey request. The method always
// closes the http.Response Body.
func (client ManagementClient) CreateKeyResponder(resp *http.Response) (result KeyBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// Decrypt the DECRYPT operation decrypts a well-formed block of ciphertext using the target encryption key and
// specified algorithm. This operation is the reverse of the ENCRYPT operation; only a single block of data may be
// decrypted, the size of this block is dependent on the target key and the algorithm to be used. The DECRYPT operation
// applies to asymmetric and symmetric keys stored in Azure Key Vault since it uses the private portion of the key.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key.
// keyVersion is the version of the key. parameters is the parameters for the decryption operation.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) Decrypt(vaultBaseURL string, keyName string, keyVersion string, parameters KeyOperationsParameters) (result KeyOperationResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Value", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "Decrypt")
}
req, err := client.DecryptPreparer(vaultBaseURL, keyName, keyVersion, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Decrypt", nil, "Failure preparing request")
return
}
resp, err := client.DecryptSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Decrypt", resp, "Failure sending request")
return
}
result, err = client.DecryptResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Decrypt", resp, "Failure responding to request")
}
return
}
// DecryptPreparer prepares the Decrypt request.
func (client ManagementClient) DecryptPreparer(vaultBaseURL string, keyName string, keyVersion string, parameters KeyOperationsParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
"key-version": autorest.Encode("path", keyVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/{key-version}/decrypt", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// DecryptSender sends the Decrypt request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) DecryptSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// DecryptResponder handles the response to the Decrypt request. The method always
// closes the http.Response Body.
func (client ManagementClient) DecryptResponder(resp *http.Response) (result KeyOperationResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// DeleteCertificate deletes all versions of a certificate object along with its associated policy. Delete certificate
// cannot be used to remove individual versions of a certificate object.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate.
func (client ManagementClient) DeleteCertificate(vaultBaseURL string, certificateName string) (result DeletedCertificateBundle, err error) {
2017-08-05 18:30:20 +00:00
req, err := client.DeleteCertificatePreparer(vaultBaseURL, certificateName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificate", nil, "Failure preparing request")
return
}
resp, err := client.DeleteCertificateSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificate", resp, "Failure sending request")
return
}
result, err = client.DeleteCertificateResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificate", resp, "Failure responding to request")
}
return
}
// DeleteCertificatePreparer prepares the DeleteCertificate request.
func (client ManagementClient) DeleteCertificatePreparer(vaultBaseURL string, certificateName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// DeleteCertificateSender sends the DeleteCertificate request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) DeleteCertificateSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// DeleteCertificateResponder handles the response to the DeleteCertificate request. The method always
// closes the http.Response Body.
func (client ManagementClient) DeleteCertificateResponder(resp *http.Response) (result DeletedCertificateBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// DeleteCertificateContacts deletes the certificate contacts for a specified key vault certificate. Authorization:
// requires the certificates/managecontacts permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net.
func (client ManagementClient) DeleteCertificateContacts(vaultBaseURL string) (result Contacts, err error) {
req, err := client.DeleteCertificateContactsPreparer(vaultBaseURL)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificateContacts", nil, "Failure preparing request")
return
}
resp, err := client.DeleteCertificateContactsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificateContacts", resp, "Failure sending request")
return
}
result, err = client.DeleteCertificateContactsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificateContacts", resp, "Failure responding to request")
}
return
}
// DeleteCertificateContactsPreparer prepares the DeleteCertificateContacts request.
func (client ManagementClient) DeleteCertificateContactsPreparer(vaultBaseURL string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/certificates/contacts"),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// DeleteCertificateContactsSender sends the DeleteCertificateContacts request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) DeleteCertificateContactsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// DeleteCertificateContactsResponder handles the response to the DeleteCertificateContacts request. The method always
// closes the http.Response Body.
func (client ManagementClient) DeleteCertificateContactsResponder(resp *http.Response) (result Contacts, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// DeleteCertificateIssuer the DeleteCertificateIssuer operation permanently removes the specified certificate issuer
// from the vault.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. issuerName is the name of the issuer.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) DeleteCertificateIssuer(vaultBaseURL string, issuerName string) (result IssuerBundle, err error) {
req, err := client.DeleteCertificateIssuerPreparer(vaultBaseURL, issuerName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificateIssuer", nil, "Failure preparing request")
return
}
resp, err := client.DeleteCertificateIssuerSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificateIssuer", resp, "Failure sending request")
return
}
result, err = client.DeleteCertificateIssuerResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificateIssuer", resp, "Failure responding to request")
}
return
}
// DeleteCertificateIssuerPreparer prepares the DeleteCertificateIssuer request.
func (client ManagementClient) DeleteCertificateIssuerPreparer(vaultBaseURL string, issuerName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"issuer-name": autorest.Encode("path", issuerName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/issuers/{issuer-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// DeleteCertificateIssuerSender sends the DeleteCertificateIssuer request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) DeleteCertificateIssuerSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// DeleteCertificateIssuerResponder handles the response to the DeleteCertificateIssuer request. The method always
// closes the http.Response Body.
func (client ManagementClient) DeleteCertificateIssuerResponder(resp *http.Response) (result IssuerBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// DeleteCertificateOperation deletes the operation for a specified certificate. Authorization: requires the
// certificates/update permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) DeleteCertificateOperation(vaultBaseURL string, certificateName string) (result CertificateOperation, err error) {
req, err := client.DeleteCertificateOperationPreparer(vaultBaseURL, certificateName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificateOperation", nil, "Failure preparing request")
return
}
resp, err := client.DeleteCertificateOperationSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificateOperation", resp, "Failure sending request")
return
}
result, err = client.DeleteCertificateOperationResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteCertificateOperation", resp, "Failure responding to request")
}
return
}
// DeleteCertificateOperationPreparer prepares the DeleteCertificateOperation request.
func (client ManagementClient) DeleteCertificateOperationPreparer(vaultBaseURL string, certificateName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/pending", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// DeleteCertificateOperationSender sends the DeleteCertificateOperation request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) DeleteCertificateOperationSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// DeleteCertificateOperationResponder handles the response to the DeleteCertificateOperation request. The method always
// closes the http.Response Body.
func (client ManagementClient) DeleteCertificateOperationResponder(resp *http.Response) (result CertificateOperation, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// DeleteKey the delete key operation cannot be used to remove individual versions of a key. This operation removes the
// cryptographic material associated with the key, which means the key is not usable for Sign/Verify, Wrap/Unwrap or
// Encrypt/Decrypt operations.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key to
// delete.
func (client ManagementClient) DeleteKey(vaultBaseURL string, keyName string) (result DeletedKeyBundle, err error) {
2017-08-05 18:30:20 +00:00
req, err := client.DeleteKeyPreparer(vaultBaseURL, keyName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteKey", nil, "Failure preparing request")
return
}
resp, err := client.DeleteKeySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteKey", resp, "Failure sending request")
return
}
result, err = client.DeleteKeyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteKey", resp, "Failure responding to request")
}
return
}
// DeleteKeyPreparer prepares the DeleteKey request.
func (client ManagementClient) DeleteKeyPreparer(vaultBaseURL string, keyName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// DeleteKeySender sends the DeleteKey request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) DeleteKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// DeleteKeyResponder handles the response to the DeleteKey request. The method always
// closes the http.Response Body.
func (client ManagementClient) DeleteKeyResponder(resp *http.Response) (result DeletedKeyBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// DeleteSasDefinition deletes a SAS definition from a specified storage account.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account. sasDefinitionName is the name of the SAS definition.
func (client ManagementClient) DeleteSasDefinition(vaultBaseURL string, storageAccountName string, sasDefinitionName string) (result SasDefinitionBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}},
{TargetValue: sasDefinitionName,
Constraints: []validation.Constraint{{Target: "sasDefinitionName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "DeleteSasDefinition")
}
req, err := client.DeleteSasDefinitionPreparer(vaultBaseURL, storageAccountName, sasDefinitionName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteSasDefinition", nil, "Failure preparing request")
return
}
resp, err := client.DeleteSasDefinitionSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteSasDefinition", resp, "Failure sending request")
return
}
result, err = client.DeleteSasDefinitionResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteSasDefinition", resp, "Failure responding to request")
}
return
}
// DeleteSasDefinitionPreparer prepares the DeleteSasDefinition request.
func (client ManagementClient) DeleteSasDefinitionPreparer(vaultBaseURL string, storageAccountName string, sasDefinitionName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"sas-definition-name": autorest.Encode("path", sasDefinitionName),
"storage-account-name": autorest.Encode("path", storageAccountName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}/sas/{sas-definition-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// DeleteSasDefinitionSender sends the DeleteSasDefinition request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) DeleteSasDefinitionSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// DeleteSasDefinitionResponder handles the response to the DeleteSasDefinition request. The method always
// closes the http.Response Body.
func (client ManagementClient) DeleteSasDefinitionResponder(resp *http.Response) (result SasDefinitionBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// DeleteSecret the DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an
// individual version of a secret.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. secretName is the name of the secret.
func (client ManagementClient) DeleteSecret(vaultBaseURL string, secretName string) (result DeletedSecretBundle, err error) {
2017-08-05 18:30:20 +00:00
req, err := client.DeleteSecretPreparer(vaultBaseURL, secretName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteSecret", nil, "Failure preparing request")
return
}
resp, err := client.DeleteSecretSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteSecret", resp, "Failure sending request")
return
}
result, err = client.DeleteSecretResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteSecret", resp, "Failure responding to request")
}
return
}
// DeleteSecretPreparer prepares the DeleteSecret request.
func (client ManagementClient) DeleteSecretPreparer(vaultBaseURL string, secretName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"secret-name": autorest.Encode("path", secretName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/secrets/{secret-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// DeleteSecretSender sends the DeleteSecret request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) DeleteSecretSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// DeleteSecretResponder handles the response to the DeleteSecret request. The method always
// closes the http.Response Body.
func (client ManagementClient) DeleteSecretResponder(resp *http.Response) (result DeletedSecretBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// DeleteStorageAccount deletes a storage account.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account.
func (client ManagementClient) DeleteStorageAccount(vaultBaseURL string, storageAccountName string) (result StorageBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "DeleteStorageAccount")
}
req, err := client.DeleteStorageAccountPreparer(vaultBaseURL, storageAccountName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteStorageAccount", nil, "Failure preparing request")
return
}
resp, err := client.DeleteStorageAccountSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteStorageAccount", resp, "Failure sending request")
return
}
result, err = client.DeleteStorageAccountResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "DeleteStorageAccount", resp, "Failure responding to request")
}
return
}
// DeleteStorageAccountPreparer prepares the DeleteStorageAccount request.
func (client ManagementClient) DeleteStorageAccountPreparer(vaultBaseURL string, storageAccountName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"storage-account-name": autorest.Encode("path", storageAccountName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// DeleteStorageAccountSender sends the DeleteStorageAccount request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) DeleteStorageAccountSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// DeleteStorageAccountResponder handles the response to the DeleteStorageAccount request. The method always
// closes the http.Response Body.
func (client ManagementClient) DeleteStorageAccountResponder(resp *http.Response) (result StorageBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// Encrypt the ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in
// Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is
// dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly
// necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed
// using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that
// have a key-reference but do not have access to the public key material.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key.
// keyVersion is the version of the key. parameters is the parameters for the encryption operation.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) Encrypt(vaultBaseURL string, keyName string, keyVersion string, parameters KeyOperationsParameters) (result KeyOperationResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Value", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "Encrypt")
}
req, err := client.EncryptPreparer(vaultBaseURL, keyName, keyVersion, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Encrypt", nil, "Failure preparing request")
return
}
resp, err := client.EncryptSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Encrypt", resp, "Failure sending request")
return
}
result, err = client.EncryptResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Encrypt", resp, "Failure responding to request")
}
return
}
// EncryptPreparer prepares the Encrypt request.
func (client ManagementClient) EncryptPreparer(vaultBaseURL string, keyName string, keyVersion string, parameters KeyOperationsParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
"key-version": autorest.Encode("path", keyVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/{key-version}/encrypt", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// EncryptSender sends the Encrypt request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) EncryptSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// EncryptResponder handles the response to the Encrypt request. The method always
// closes the http.Response Body.
func (client ManagementClient) EncryptResponder(resp *http.Response) (result KeyOperationResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetCertificate gets information about a specified certificate. Authorization: requires the certificates/get
// permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate in the given vault. certificateVersion is the version of the certificate.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) GetCertificate(vaultBaseURL string, certificateName string, certificateVersion string) (result CertificateBundle, err error) {
req, err := client.GetCertificatePreparer(vaultBaseURL, certificateName, certificateVersion)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificate", nil, "Failure preparing request")
return
}
resp, err := client.GetCertificateSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificate", resp, "Failure sending request")
return
}
result, err = client.GetCertificateResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificate", resp, "Failure responding to request")
}
return
}
// GetCertificatePreparer prepares the GetCertificate request.
func (client ManagementClient) GetCertificatePreparer(vaultBaseURL string, certificateName string, certificateVersion string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
"certificate-version": autorest.Encode("path", certificateVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/{certificate-version}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetCertificateSender sends the GetCertificate request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetCertificateSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetCertificateResponder handles the response to the GetCertificate request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetCertificateResponder(resp *http.Response) (result CertificateBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetCertificateContacts the GetCertificateContacts operation returns the set of certificate contact resources in the
// specified key vault.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net.
func (client ManagementClient) GetCertificateContacts(vaultBaseURL string) (result Contacts, err error) {
req, err := client.GetCertificateContactsPreparer(vaultBaseURL)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateContacts", nil, "Failure preparing request")
return
}
resp, err := client.GetCertificateContactsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateContacts", resp, "Failure sending request")
return
}
result, err = client.GetCertificateContactsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateContacts", resp, "Failure responding to request")
}
return
}
// GetCertificateContactsPreparer prepares the GetCertificateContacts request.
func (client ManagementClient) GetCertificateContactsPreparer(vaultBaseURL string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/certificates/contacts"),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetCertificateContactsSender sends the GetCertificateContacts request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetCertificateContactsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetCertificateContactsResponder handles the response to the GetCertificateContacts request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetCertificateContactsResponder(resp *http.Response) (result Contacts, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetCertificateIssuer the GetCertificateIssuer operation returns the specified certificate issuer resources in the
// specified key vault
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. issuerName is the name of the issuer.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) GetCertificateIssuer(vaultBaseURL string, issuerName string) (result IssuerBundle, err error) {
req, err := client.GetCertificateIssuerPreparer(vaultBaseURL, issuerName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateIssuer", nil, "Failure preparing request")
return
}
resp, err := client.GetCertificateIssuerSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateIssuer", resp, "Failure sending request")
return
}
result, err = client.GetCertificateIssuerResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateIssuer", resp, "Failure responding to request")
}
return
}
// GetCertificateIssuerPreparer prepares the GetCertificateIssuer request.
func (client ManagementClient) GetCertificateIssuerPreparer(vaultBaseURL string, issuerName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"issuer-name": autorest.Encode("path", issuerName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/issuers/{issuer-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetCertificateIssuerSender sends the GetCertificateIssuer request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetCertificateIssuerSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetCertificateIssuerResponder handles the response to the GetCertificateIssuer request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetCertificateIssuerResponder(resp *http.Response) (result IssuerBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetCertificateIssuers the GetCertificateIssuers operation returns the set of certificate issuer resources in the
// specified key vault
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. maxresults is maximum number of results
// to return in a page. If not specified the service will return up to 25 results.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) GetCertificateIssuers(vaultBaseURL string, maxresults *int32) (result CertificateIssuerListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetCertificateIssuers")
}
req, err := client.GetCertificateIssuersPreparer(vaultBaseURL, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateIssuers", nil, "Failure preparing request")
return
}
resp, err := client.GetCertificateIssuersSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateIssuers", resp, "Failure sending request")
return
}
result, err = client.GetCertificateIssuersResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateIssuers", resp, "Failure responding to request")
}
return
}
// GetCertificateIssuersPreparer prepares the GetCertificateIssuers request.
func (client ManagementClient) GetCertificateIssuersPreparer(vaultBaseURL string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/certificates/issuers"),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetCertificateIssuersSender sends the GetCertificateIssuers request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetCertificateIssuersSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetCertificateIssuersResponder handles the response to the GetCertificateIssuers request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetCertificateIssuersResponder(resp *http.Response) (result CertificateIssuerListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetCertificateIssuersNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetCertificateIssuersNextResults(lastResults CertificateIssuerListResult) (result CertificateIssuerListResult, err error) {
req, err := lastResults.CertificateIssuerListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateIssuers", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetCertificateIssuersSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateIssuers", resp, "Failure sending next results request")
}
result, err = client.GetCertificateIssuersResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateIssuers", resp, "Failure responding to next results request")
}
return
}
// GetCertificateIssuersComplete gets all elements from the list without paging.
func (client ManagementClient) GetCertificateIssuersComplete(vaultBaseURL string, maxresults *int32, cancel <-chan struct{}) (<-chan CertificateIssuerItem, <-chan error) {
resultChan := make(chan CertificateIssuerItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetCertificateIssuers(vaultBaseURL, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetCertificateIssuersNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetCertificateOperation gets the operation associated with a specified certificate. Authorization: requires the
// certificates/get permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) GetCertificateOperation(vaultBaseURL string, certificateName string) (result CertificateOperation, err error) {
req, err := client.GetCertificateOperationPreparer(vaultBaseURL, certificateName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateOperation", nil, "Failure preparing request")
return
}
resp, err := client.GetCertificateOperationSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateOperation", resp, "Failure sending request")
return
}
result, err = client.GetCertificateOperationResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateOperation", resp, "Failure responding to request")
}
return
}
// GetCertificateOperationPreparer prepares the GetCertificateOperation request.
func (client ManagementClient) GetCertificateOperationPreparer(vaultBaseURL string, certificateName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/pending", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetCertificateOperationSender sends the GetCertificateOperation request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetCertificateOperationSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetCertificateOperationResponder handles the response to the GetCertificateOperation request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetCertificateOperationResponder(resp *http.Response) (result CertificateOperation, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetCertificatePolicy the GetCertificatePolicy operation returns the specified certificate policy resources in the
// specified key vault
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate in a given key vault.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) GetCertificatePolicy(vaultBaseURL string, certificateName string) (result CertificatePolicy, err error) {
req, err := client.GetCertificatePolicyPreparer(vaultBaseURL, certificateName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificatePolicy", nil, "Failure preparing request")
return
}
resp, err := client.GetCertificatePolicySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificatePolicy", resp, "Failure sending request")
return
}
result, err = client.GetCertificatePolicyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificatePolicy", resp, "Failure responding to request")
}
return
}
// GetCertificatePolicyPreparer prepares the GetCertificatePolicy request.
func (client ManagementClient) GetCertificatePolicyPreparer(vaultBaseURL string, certificateName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/policy", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetCertificatePolicySender sends the GetCertificatePolicy request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetCertificatePolicySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetCertificatePolicyResponder handles the response to the GetCertificatePolicy request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetCertificatePolicyResponder(resp *http.Response) (result CertificatePolicy, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetCertificates the GetCertificates operation returns the set of certificates resources in the specified key vault.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. maxresults is maximum number of results
// to return in a page. If not specified the service will return up to 25 results.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) GetCertificates(vaultBaseURL string, maxresults *int32) (result CertificateListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetCertificates")
}
req, err := client.GetCertificatesPreparer(vaultBaseURL, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificates", nil, "Failure preparing request")
return
}
resp, err := client.GetCertificatesSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificates", resp, "Failure sending request")
return
}
result, err = client.GetCertificatesResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificates", resp, "Failure responding to request")
}
return
}
// GetCertificatesPreparer prepares the GetCertificates request.
func (client ManagementClient) GetCertificatesPreparer(vaultBaseURL string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/certificates"),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetCertificatesSender sends the GetCertificates request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetCertificatesSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetCertificatesResponder handles the response to the GetCertificates request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetCertificatesResponder(resp *http.Response) (result CertificateListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetCertificatesNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetCertificatesNextResults(lastResults CertificateListResult) (result CertificateListResult, err error) {
req, err := lastResults.CertificateListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificates", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetCertificatesSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificates", resp, "Failure sending next results request")
}
result, err = client.GetCertificatesResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificates", resp, "Failure responding to next results request")
}
return
}
// GetCertificatesComplete gets all elements from the list without paging.
func (client ManagementClient) GetCertificatesComplete(vaultBaseURL string, maxresults *int32, cancel <-chan struct{}) (<-chan CertificateItem, <-chan error) {
resultChan := make(chan CertificateItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetCertificates(vaultBaseURL, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetCertificatesNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetCertificateVersions the GetCertificateVersions operation returns the versions of a certificate in the specified
// key vault
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate. maxresults is maximum number of results to return in a page. If not specified the service will return
// up to 25 results.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) GetCertificateVersions(vaultBaseURL string, certificateName string, maxresults *int32) (result CertificateListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetCertificateVersions")
}
req, err := client.GetCertificateVersionsPreparer(vaultBaseURL, certificateName, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateVersions", nil, "Failure preparing request")
return
}
resp, err := client.GetCertificateVersionsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateVersions", resp, "Failure sending request")
return
}
result, err = client.GetCertificateVersionsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateVersions", resp, "Failure responding to request")
}
return
}
// GetCertificateVersionsPreparer prepares the GetCertificateVersions request.
func (client ManagementClient) GetCertificateVersionsPreparer(vaultBaseURL string, certificateName string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/versions", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetCertificateVersionsSender sends the GetCertificateVersions request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetCertificateVersionsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetCertificateVersionsResponder handles the response to the GetCertificateVersions request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetCertificateVersionsResponder(resp *http.Response) (result CertificateListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetCertificateVersionsNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetCertificateVersionsNextResults(lastResults CertificateListResult) (result CertificateListResult, err error) {
req, err := lastResults.CertificateListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateVersions", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetCertificateVersionsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateVersions", resp, "Failure sending next results request")
}
result, err = client.GetCertificateVersionsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetCertificateVersions", resp, "Failure responding to next results request")
}
return
}
// GetCertificateVersionsComplete gets all elements from the list without paging.
func (client ManagementClient) GetCertificateVersionsComplete(vaultBaseURL string, certificateName string, maxresults *int32, cancel <-chan struct{}) (<-chan CertificateItem, <-chan error) {
resultChan := make(chan CertificateItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetCertificateVersions(vaultBaseURL, certificateName, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetCertificateVersionsNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetDeletedCertificate the GetDeletedCertificate operation retrieves the deleted certificate information plus its
// attributes, such as retention interval, scheduled permanent deletion and the current deletion recovery level.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate
func (client ManagementClient) GetDeletedCertificate(vaultBaseURL string, certificateName string) (result DeletedCertificateBundle, err error) {
req, err := client.GetDeletedCertificatePreparer(vaultBaseURL, certificateName)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedCertificate", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.GetDeletedCertificateSender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedCertificate", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.GetDeletedCertificateResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedCertificate", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// GetDeletedCertificatePreparer prepares the GetDeletedCertificate request.
func (client ManagementClient) GetDeletedCertificatePreparer(vaultBaseURL string, certificateName string) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
2017-08-05 18:30:20 +00:00
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/deletedcertificates/{certificate-name}", pathParameters),
2017-08-05 18:30:20 +00:00
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetDeletedCertificateSender sends the GetDeletedCertificate request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) GetDeletedCertificateSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetDeletedCertificateResponder handles the response to the GetDeletedCertificate request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) GetDeletedCertificateResponder(resp *http.Response) (result DeletedCertificateBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetDeletedCertificates the GetDeletedCertificates operation retrieves the certificates in the current vault which
// are in a deleted state and ready for recovery or purging.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. maxresults is maximum number of results
// to return in a page. If not specified the service will return up to 25 results.
func (client ManagementClient) GetDeletedCertificates(vaultBaseURL string, maxresults *int32) (result DeletedCertificateListResult, err error) {
2017-08-05 18:30:20 +00:00
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetDeletedCertificates")
2017-08-05 18:30:20 +00:00
}
req, err := client.GetDeletedCertificatesPreparer(vaultBaseURL, maxresults)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedCertificates", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.GetDeletedCertificatesSender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedCertificates", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.GetDeletedCertificatesResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedCertificates", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// GetDeletedCertificatesPreparer prepares the GetDeletedCertificates request.
func (client ManagementClient) GetDeletedCertificatesPreparer(vaultBaseURL string, maxresults *int32) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/deletedcertificates"),
2017-08-05 18:30:20 +00:00
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetDeletedCertificatesSender sends the GetDeletedCertificates request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) GetDeletedCertificatesSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetDeletedCertificatesResponder handles the response to the GetDeletedCertificates request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) GetDeletedCertificatesResponder(resp *http.Response) (result DeletedCertificateListResult, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetDeletedCertificatesNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetDeletedCertificatesNextResults(lastResults DeletedCertificateListResult) (result DeletedCertificateListResult, err error) {
req, err := lastResults.DeletedCertificateListResultPreparer()
2017-08-05 18:30:20 +00:00
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedCertificates", nil, "Failure preparing next results request")
2017-08-05 18:30:20 +00:00
}
if req == nil {
return
}
resp, err := client.GetDeletedCertificatesSender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedCertificates", resp, "Failure sending next results request")
2017-08-05 18:30:20 +00:00
}
result, err = client.GetDeletedCertificatesResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedCertificates", resp, "Failure responding to next results request")
2017-08-05 18:30:20 +00:00
}
return
}
// GetDeletedCertificatesComplete gets all elements from the list without paging.
func (client ManagementClient) GetDeletedCertificatesComplete(vaultBaseURL string, maxresults *int32, cancel <-chan struct{}) (<-chan DeletedCertificateItem, <-chan error) {
resultChan := make(chan DeletedCertificateItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetDeletedCertificates(vaultBaseURL, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetDeletedCertificatesNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetDeletedKey retrieves the deleted key information plus its attributes. Authorization: Requires the keys/get
// permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key
func (client ManagementClient) GetDeletedKey(vaultBaseURL string, keyName string) (result DeletedKeyBundle, err error) {
req, err := client.GetDeletedKeyPreparer(vaultBaseURL, keyName)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedKey", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.GetDeletedKeySender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedKey", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.GetDeletedKeyResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedKey", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// GetDeletedKeyPreparer prepares the GetDeletedKey request.
func (client ManagementClient) GetDeletedKeyPreparer(vaultBaseURL string, keyName string) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/deletedkeys/{key-name}", pathParameters),
2017-08-05 18:30:20 +00:00
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetDeletedKeySender sends the GetDeletedKey request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) GetDeletedKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// GetDeletedKeyResponder handles the response to the GetDeletedKey request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) GetDeletedKeyResponder(resp *http.Response) (result DeletedKeyBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetDeletedKeys list deleted keys in the specified vault. Authorization: Requires the keys/list permission.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. maxresults is maximum number of results
// to return in a page. If not specified the service will return up to 25 results.
func (client ManagementClient) GetDeletedKeys(vaultBaseURL string, maxresults *int32) (result DeletedKeyListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetDeletedKeys")
}
req, err := client.GetDeletedKeysPreparer(vaultBaseURL, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedKeys", nil, "Failure preparing request")
return
}
resp, err := client.GetDeletedKeysSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedKeys", resp, "Failure sending request")
return
}
result, err = client.GetDeletedKeysResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedKeys", resp, "Failure responding to request")
}
return
}
// GetDeletedKeysPreparer prepares the GetDeletedKeys request.
func (client ManagementClient) GetDeletedKeysPreparer(vaultBaseURL string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/deletedkeys"),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetDeletedKeysSender sends the GetDeletedKeys request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetDeletedKeysSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetDeletedKeysResponder handles the response to the GetDeletedKeys request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetDeletedKeysResponder(resp *http.Response) (result DeletedKeyListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetDeletedKeysNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetDeletedKeysNextResults(lastResults DeletedKeyListResult) (result DeletedKeyListResult, err error) {
req, err := lastResults.DeletedKeyListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedKeys", nil, "Failure preparing next results request")
2017-08-05 18:30:20 +00:00
}
if req == nil {
return
}
resp, err := client.GetDeletedKeysSender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedKeys", resp, "Failure sending next results request")
2017-08-05 18:30:20 +00:00
}
result, err = client.GetDeletedKeysResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedKeys", resp, "Failure responding to next results request")
}
return
}
// GetDeletedKeysComplete gets all elements from the list without paging.
func (client ManagementClient) GetDeletedKeysComplete(vaultBaseURL string, maxresults *int32, cancel <-chan struct{}) (<-chan DeletedKeyItem, <-chan error) {
resultChan := make(chan DeletedKeyItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetDeletedKeys(vaultBaseURL, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetDeletedKeysNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetDeletedSecret retrieves the deleted secret information plus its attributes. Authorization: requires the
// secrets/get permission.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. secretName is the name of the secret
func (client ManagementClient) GetDeletedSecret(vaultBaseURL string, secretName string) (result DeletedSecretBundle, err error) {
req, err := client.GetDeletedSecretPreparer(vaultBaseURL, secretName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedSecret", nil, "Failure preparing request")
return
}
resp, err := client.GetDeletedSecretSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedSecret", resp, "Failure sending request")
return
}
result, err = client.GetDeletedSecretResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedSecret", resp, "Failure responding to request")
}
return
}
// GetDeletedSecretPreparer prepares the GetDeletedSecret request.
func (client ManagementClient) GetDeletedSecretPreparer(vaultBaseURL string, secretName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"secret-name": autorest.Encode("path", secretName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/deletedsecrets/{secret-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetDeletedSecretSender sends the GetDeletedSecret request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetDeletedSecretSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetDeletedSecretResponder handles the response to the GetDeletedSecret request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetDeletedSecretResponder(resp *http.Response) (result DeletedSecretBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetDeletedSecrets list deleted secrets in the specified vault. Authorization: requires the secrets/list permission.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. maxresults is maximum number of results
// to return in a page. If not specified the service will return up to 25 results.
func (client ManagementClient) GetDeletedSecrets(vaultBaseURL string, maxresults *int32) (result DeletedSecretListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetDeletedSecrets")
}
req, err := client.GetDeletedSecretsPreparer(vaultBaseURL, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedSecrets", nil, "Failure preparing request")
return
}
resp, err := client.GetDeletedSecretsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedSecrets", resp, "Failure sending request")
return
2017-08-05 18:30:20 +00:00
}
result, err = client.GetDeletedSecretsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedSecrets", resp, "Failure responding to request")
}
return
}
// GetDeletedSecretsPreparer prepares the GetDeletedSecrets request.
func (client ManagementClient) GetDeletedSecretsPreparer(vaultBaseURL string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/deletedsecrets"),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetDeletedSecretsSender sends the GetDeletedSecrets request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetDeletedSecretsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetDeletedSecretsResponder handles the response to the GetDeletedSecrets request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetDeletedSecretsResponder(resp *http.Response) (result DeletedSecretListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetDeletedSecretsNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetDeletedSecretsNextResults(lastResults DeletedSecretListResult) (result DeletedSecretListResult, err error) {
req, err := lastResults.DeletedSecretListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedSecrets", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetDeletedSecretsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedSecrets", resp, "Failure sending next results request")
}
result, err = client.GetDeletedSecretsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetDeletedSecrets", resp, "Failure responding to next results request")
}
return
}
// GetDeletedSecretsComplete gets all elements from the list without paging.
func (client ManagementClient) GetDeletedSecretsComplete(vaultBaseURL string, maxresults *int32, cancel <-chan struct{}) (<-chan DeletedSecretItem, <-chan error) {
resultChan := make(chan DeletedSecretItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetDeletedSecrets(vaultBaseURL, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetDeletedSecretsNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetKey the get key operation is applicable to all key types. If the requested key is symmetric, then no key material
// is released in the response.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key to get.
// keyVersion is adding the version parameter retrieves a specific version of a key.
func (client ManagementClient) GetKey(vaultBaseURL string, keyName string, keyVersion string) (result KeyBundle, err error) {
req, err := client.GetKeyPreparer(vaultBaseURL, keyName, keyVersion)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKey", nil, "Failure preparing request")
return
}
resp, err := client.GetKeySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKey", resp, "Failure sending request")
return
}
result, err = client.GetKeyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKey", resp, "Failure responding to request")
}
return
}
// GetKeyPreparer prepares the GetKey request.
func (client ManagementClient) GetKeyPreparer(vaultBaseURL string, keyName string, keyVersion string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
"key-version": autorest.Encode("path", keyVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/{key-version}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetKeySender sends the GetKey request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetKeyResponder handles the response to the GetKey request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetKeyResponder(resp *http.Response) (result KeyBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetKeys retrieves a list of the keys in the Key Vault as JSON Web Key structures that contain the public part of a
// stored key. The LIST operation is applicable to all key types, however only the base key identifier,attributes, and
// tags are provided in the response. Individual versions of a key are not listed in the response. Authorization:
// Requires the keys/list permission.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. maxresults is maximum number of results
// to return in a page. If not specified the service will return up to 25 results.
func (client ManagementClient) GetKeys(vaultBaseURL string, maxresults *int32) (result KeyListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetKeys")
}
req, err := client.GetKeysPreparer(vaultBaseURL, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeys", nil, "Failure preparing request")
return
}
resp, err := client.GetKeysSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeys", resp, "Failure sending request")
return
}
result, err = client.GetKeysResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeys", resp, "Failure responding to request")
}
return
}
// GetKeysPreparer prepares the GetKeys request.
func (client ManagementClient) GetKeysPreparer(vaultBaseURL string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/keys"),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetKeysSender sends the GetKeys request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetKeysSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetKeysResponder handles the response to the GetKeys request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetKeysResponder(resp *http.Response) (result KeyListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetKeysNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetKeysNextResults(lastResults KeyListResult) (result KeyListResult, err error) {
req, err := lastResults.KeyListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeys", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetKeysSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeys", resp, "Failure sending next results request")
}
result, err = client.GetKeysResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeys", resp, "Failure responding to next results request")
}
return
}
// GetKeysComplete gets all elements from the list without paging.
func (client ManagementClient) GetKeysComplete(vaultBaseURL string, maxresults *int32, cancel <-chan struct{}) (<-chan KeyItem, <-chan error) {
resultChan := make(chan KeyItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetKeys(vaultBaseURL, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetKeysNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetKeyVersions the full key identifier, attributes, and tags are provided in the response.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key.
// maxresults is maximum number of results to return in a page. If not specified the service will return up to 25
// results.
func (client ManagementClient) GetKeyVersions(vaultBaseURL string, keyName string, maxresults *int32) (result KeyListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetKeyVersions")
}
req, err := client.GetKeyVersionsPreparer(vaultBaseURL, keyName, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeyVersions", nil, "Failure preparing request")
return
}
resp, err := client.GetKeyVersionsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeyVersions", resp, "Failure sending request")
return
}
result, err = client.GetKeyVersionsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeyVersions", resp, "Failure responding to request")
}
return
}
// GetKeyVersionsPreparer prepares the GetKeyVersions request.
func (client ManagementClient) GetKeyVersionsPreparer(vaultBaseURL string, keyName string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/versions", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetKeyVersionsSender sends the GetKeyVersions request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetKeyVersionsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetKeyVersionsResponder handles the response to the GetKeyVersions request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetKeyVersionsResponder(resp *http.Response) (result KeyListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetKeyVersionsNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetKeyVersionsNextResults(lastResults KeyListResult) (result KeyListResult, err error) {
req, err := lastResults.KeyListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeyVersions", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetKeyVersionsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeyVersions", resp, "Failure sending next results request")
}
result, err = client.GetKeyVersionsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetKeyVersions", resp, "Failure responding to next results request")
}
return
}
// GetKeyVersionsComplete gets all elements from the list without paging.
func (client ManagementClient) GetKeyVersionsComplete(vaultBaseURL string, keyName string, maxresults *int32, cancel <-chan struct{}) (<-chan KeyItem, <-chan error) {
resultChan := make(chan KeyItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetKeyVersions(vaultBaseURL, keyName, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetKeyVersionsNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetSasDefinition gets information about a SAS definition for the specified storage account.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account. sasDefinitionName is the name of the SAS definition.
func (client ManagementClient) GetSasDefinition(vaultBaseURL string, storageAccountName string, sasDefinitionName string) (result SasDefinitionBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}},
{TargetValue: sasDefinitionName,
Constraints: []validation.Constraint{{Target: "sasDefinitionName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetSasDefinition")
}
req, err := client.GetSasDefinitionPreparer(vaultBaseURL, storageAccountName, sasDefinitionName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSasDefinition", nil, "Failure preparing request")
return
}
resp, err := client.GetSasDefinitionSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSasDefinition", resp, "Failure sending request")
return
}
result, err = client.GetSasDefinitionResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSasDefinition", resp, "Failure responding to request")
}
return
}
// GetSasDefinitionPreparer prepares the GetSasDefinition request.
func (client ManagementClient) GetSasDefinitionPreparer(vaultBaseURL string, storageAccountName string, sasDefinitionName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"sas-definition-name": autorest.Encode("path", sasDefinitionName),
"storage-account-name": autorest.Encode("path", storageAccountName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}/sas/{sas-definition-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetSasDefinitionSender sends the GetSasDefinition request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetSasDefinitionSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetSasDefinitionResponder handles the response to the GetSasDefinition request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetSasDefinitionResponder(resp *http.Response) (result SasDefinitionBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetSasDefinitions list storage SAS definitions for the given storage account.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account. maxresults is maximum number of results to return in a page. If not specified the service will
// return up to 25 results.
func (client ManagementClient) GetSasDefinitions(vaultBaseURL string, storageAccountName string, maxresults *int32) (result SasDefinitionListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}},
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetSasDefinitions")
}
req, err := client.GetSasDefinitionsPreparer(vaultBaseURL, storageAccountName, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSasDefinitions", nil, "Failure preparing request")
return
}
resp, err := client.GetSasDefinitionsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSasDefinitions", resp, "Failure sending request")
return
}
result, err = client.GetSasDefinitionsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSasDefinitions", resp, "Failure responding to request")
}
return
}
// GetSasDefinitionsPreparer prepares the GetSasDefinitions request.
func (client ManagementClient) GetSasDefinitionsPreparer(vaultBaseURL string, storageAccountName string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"storage-account-name": autorest.Encode("path", storageAccountName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}/sas", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetSasDefinitionsSender sends the GetSasDefinitions request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetSasDefinitionsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetSasDefinitionsResponder handles the response to the GetSasDefinitions request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetSasDefinitionsResponder(resp *http.Response) (result SasDefinitionListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetSasDefinitionsNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetSasDefinitionsNextResults(lastResults SasDefinitionListResult) (result SasDefinitionListResult, err error) {
req, err := lastResults.SasDefinitionListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSasDefinitions", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetSasDefinitionsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSasDefinitions", resp, "Failure sending next results request")
}
result, err = client.GetSasDefinitionsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSasDefinitions", resp, "Failure responding to next results request")
}
return
}
// GetSasDefinitionsComplete gets all elements from the list without paging.
func (client ManagementClient) GetSasDefinitionsComplete(vaultBaseURL string, storageAccountName string, maxresults *int32, cancel <-chan struct{}) (<-chan SasDefinitionItem, <-chan error) {
resultChan := make(chan SasDefinitionItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetSasDefinitions(vaultBaseURL, storageAccountName, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetSasDefinitionsNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetSecret the GET operation is applicable to any secret stored in Azure Key Vault.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. secretName is the name of the secret.
// secretVersion is the version of the secret.
func (client ManagementClient) GetSecret(vaultBaseURL string, secretName string, secretVersion string) (result SecretBundle, err error) {
req, err := client.GetSecretPreparer(vaultBaseURL, secretName, secretVersion)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecret", nil, "Failure preparing request")
return
}
resp, err := client.GetSecretSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecret", resp, "Failure sending request")
return
}
result, err = client.GetSecretResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecret", resp, "Failure responding to request")
}
return
}
// GetSecretPreparer prepares the GetSecret request.
func (client ManagementClient) GetSecretPreparer(vaultBaseURL string, secretName string, secretVersion string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"secret-name": autorest.Encode("path", secretName),
"secret-version": autorest.Encode("path", secretVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/secrets/{secret-name}/{secret-version}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetSecretSender sends the GetSecret request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetSecretSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetSecretResponder handles the response to the GetSecret request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetSecretResponder(resp *http.Response) (result SecretBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetSecrets the LIST operation is applicable to the entire vault, however only the base secret identifier and
// attributes are provided in the response. Individual secret versions are not listed in the response.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. maxresults is maximum number of results
// to return in a page. If not specified the service will return up to 25 results.
func (client ManagementClient) GetSecrets(vaultBaseURL string, maxresults *int32) (result SecretListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetSecrets")
}
req, err := client.GetSecretsPreparer(vaultBaseURL, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecrets", nil, "Failure preparing request")
return
}
resp, err := client.GetSecretsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecrets", resp, "Failure sending request")
return
}
result, err = client.GetSecretsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecrets", resp, "Failure responding to request")
}
return
}
// GetSecretsPreparer prepares the GetSecrets request.
func (client ManagementClient) GetSecretsPreparer(vaultBaseURL string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/secrets"),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetSecretsSender sends the GetSecrets request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetSecretsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetSecretsResponder handles the response to the GetSecrets request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetSecretsResponder(resp *http.Response) (result SecretListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetSecretsNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetSecretsNextResults(lastResults SecretListResult) (result SecretListResult, err error) {
req, err := lastResults.SecretListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecrets", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetSecretsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecrets", resp, "Failure sending next results request")
}
result, err = client.GetSecretsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecrets", resp, "Failure responding to next results request")
}
return
}
// GetSecretsComplete gets all elements from the list without paging.
func (client ManagementClient) GetSecretsComplete(vaultBaseURL string, maxresults *int32, cancel <-chan struct{}) (<-chan SecretItem, <-chan error) {
resultChan := make(chan SecretItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetSecrets(vaultBaseURL, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetSecretsNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetSecretVersions the LIST VERSIONS operation can be applied to all versions having the same secret name in the same
// key vault. The full secret identifier and attributes are provided in the response. No values are returned for the
// secrets and only current versions of a secret are listed.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. secretName is the name of the secret.
// maxresults is maximum number of results to return in a page. If not specified the service will return up to 25
// results.
func (client ManagementClient) GetSecretVersions(vaultBaseURL string, secretName string, maxresults *int32) (result SecretListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetSecretVersions")
}
req, err := client.GetSecretVersionsPreparer(vaultBaseURL, secretName, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecretVersions", nil, "Failure preparing request")
return
}
resp, err := client.GetSecretVersionsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecretVersions", resp, "Failure sending request")
return
}
result, err = client.GetSecretVersionsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecretVersions", resp, "Failure responding to request")
}
return
}
// GetSecretVersionsPreparer prepares the GetSecretVersions request.
func (client ManagementClient) GetSecretVersionsPreparer(vaultBaseURL string, secretName string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"secret-name": autorest.Encode("path", secretName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/secrets/{secret-name}/versions", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetSecretVersionsSender sends the GetSecretVersions request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetSecretVersionsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetSecretVersionsResponder handles the response to the GetSecretVersions request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetSecretVersionsResponder(resp *http.Response) (result SecretListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetSecretVersionsNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetSecretVersionsNextResults(lastResults SecretListResult) (result SecretListResult, err error) {
req, err := lastResults.SecretListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecretVersions", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetSecretVersionsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecretVersions", resp, "Failure sending next results request")
}
result, err = client.GetSecretVersionsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetSecretVersions", resp, "Failure responding to next results request")
}
return
}
// GetSecretVersionsComplete gets all elements from the list without paging.
func (client ManagementClient) GetSecretVersionsComplete(vaultBaseURL string, secretName string, maxresults *int32, cancel <-chan struct{}) (<-chan SecretItem, <-chan error) {
resultChan := make(chan SecretItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetSecretVersions(vaultBaseURL, secretName, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetSecretVersionsNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// GetStorageAccount gets information about a specified storage account.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account.
func (client ManagementClient) GetStorageAccount(vaultBaseURL string, storageAccountName string) (result StorageBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetStorageAccount")
}
req, err := client.GetStorageAccountPreparer(vaultBaseURL, storageAccountName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetStorageAccount", nil, "Failure preparing request")
return
}
resp, err := client.GetStorageAccountSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetStorageAccount", resp, "Failure sending request")
return
}
result, err = client.GetStorageAccountResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetStorageAccount", resp, "Failure responding to request")
}
return
}
// GetStorageAccountPreparer prepares the GetStorageAccount request.
func (client ManagementClient) GetStorageAccountPreparer(vaultBaseURL string, storageAccountName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"storage-account-name": autorest.Encode("path", storageAccountName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetStorageAccountSender sends the GetStorageAccount request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetStorageAccountSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetStorageAccountResponder handles the response to the GetStorageAccount request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetStorageAccountResponder(resp *http.Response) (result StorageBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetStorageAccounts list storage accounts managed by specified key vault
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. maxresults is maximum number of results
// to return in a page. If not specified the service will return up to 25 results.
func (client ManagementClient) GetStorageAccounts(vaultBaseURL string, maxresults *int32) (result StorageListResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: maxresults,
Constraints: []validation.Constraint{{Target: "maxresults", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "maxresults", Name: validation.InclusiveMaximum, Rule: 25, Chain: nil},
{Target: "maxresults", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "GetStorageAccounts")
}
req, err := client.GetStorageAccountsPreparer(vaultBaseURL, maxresults)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetStorageAccounts", nil, "Failure preparing request")
return
}
resp, err := client.GetStorageAccountsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetStorageAccounts", resp, "Failure sending request")
return
}
result, err = client.GetStorageAccountsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetStorageAccounts", resp, "Failure responding to request")
}
return
}
// GetStorageAccountsPreparer prepares the GetStorageAccounts request.
func (client ManagementClient) GetStorageAccountsPreparer(vaultBaseURL string, maxresults *int32) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
if maxresults != nil {
queryParameters["maxresults"] = autorest.Encode("query", *maxresults)
}
preparer := autorest.CreatePreparer(
autorest.AsGet(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/storage"),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// GetStorageAccountsSender sends the GetStorageAccounts request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) GetStorageAccountsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// GetStorageAccountsResponder handles the response to the GetStorageAccounts request. The method always
// closes the http.Response Body.
func (client ManagementClient) GetStorageAccountsResponder(resp *http.Response) (result StorageListResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// GetStorageAccountsNextResults retrieves the next set of results, if any.
func (client ManagementClient) GetStorageAccountsNextResults(lastResults StorageListResult) (result StorageListResult, err error) {
req, err := lastResults.StorageListResultPreparer()
if err != nil {
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetStorageAccounts", nil, "Failure preparing next results request")
}
if req == nil {
return
}
resp, err := client.GetStorageAccountsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
return result, autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetStorageAccounts", resp, "Failure sending next results request")
}
result, err = client.GetStorageAccountsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "GetStorageAccounts", resp, "Failure responding to next results request")
}
return
}
// GetStorageAccountsComplete gets all elements from the list without paging.
func (client ManagementClient) GetStorageAccountsComplete(vaultBaseURL string, maxresults *int32, cancel <-chan struct{}) (<-chan StorageAccountItem, <-chan error) {
resultChan := make(chan StorageAccountItem)
errChan := make(chan error, 1)
go func() {
defer func() {
close(resultChan)
close(errChan)
}()
list, err := client.GetStorageAccounts(vaultBaseURL, maxresults)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
for list.NextLink != nil {
list, err = client.GetStorageAccountsNextResults(list)
if err != nil {
errChan <- err
return
}
if list.Value != nil {
for _, item := range *list.Value {
select {
case <-cancel:
return
case resultChan <- item:
// Intentionally left blank
}
}
}
}
}()
return resultChan, errChan
}
// ImportCertificate imports an existing valid certificate, containing a private key, into Azure Key Vault. The
// certificate to be imported can be in either PFX or PEM format. If the certificate is in PEM format the PEM file must
// contain the key as well as x509 certificates.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate. parameters is the parameters to import the certificate.
func (client ManagementClient) ImportCertificate(vaultBaseURL string, certificateName string, parameters CertificateImportParameters) (result CertificateBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: certificateName,
Constraints: []validation.Constraint{{Target: "certificateName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z-]+$`, Chain: nil}}},
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Base64EncodedCertificate", Name: validation.Null, Rule: true, Chain: nil},
{Target: "parameters.CertificatePolicy", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "parameters.CertificatePolicy.X509CertificateProperties", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "parameters.CertificatePolicy.X509CertificateProperties.ValidityInMonths", Name: validation.Null, Rule: false,
Chain: []validation.Constraint{{Target: "parameters.CertificatePolicy.X509CertificateProperties.ValidityInMonths", Name: validation.InclusiveMinimum, Rule: 0, Chain: nil}}},
}},
}}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "ImportCertificate")
}
req, err := client.ImportCertificatePreparer(vaultBaseURL, certificateName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "ImportCertificate", nil, "Failure preparing request")
return
}
resp, err := client.ImportCertificateSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "ImportCertificate", resp, "Failure sending request")
return
}
result, err = client.ImportCertificateResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "ImportCertificate", resp, "Failure responding to request")
}
return
}
// ImportCertificatePreparer prepares the ImportCertificate request.
func (client ManagementClient) ImportCertificatePreparer(vaultBaseURL string, certificateName string, parameters CertificateImportParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/import", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// ImportCertificateSender sends the ImportCertificate request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) ImportCertificateSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// ImportCertificateResponder handles the response to the ImportCertificate request. The method always
// closes the http.Response Body.
func (client ManagementClient) ImportCertificateResponder(resp *http.Response) (result CertificateBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// ImportKey the import key operation may be used to import any key type into an Azure Key Vault. If the named key
// already exists, Azure Key Vault creates a new version of the key.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is name for the imported key.
// parameters is the parameters to import a key.
func (client ManagementClient) ImportKey(vaultBaseURL string, keyName string, parameters KeyImportParameters) (result KeyBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: keyName,
Constraints: []validation.Constraint{{Target: "keyName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z-]+$`, Chain: nil}}},
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Key", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "ImportKey")
}
req, err := client.ImportKeyPreparer(vaultBaseURL, keyName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "ImportKey", nil, "Failure preparing request")
return
}
resp, err := client.ImportKeySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "ImportKey", resp, "Failure sending request")
return
}
result, err = client.ImportKeyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "ImportKey", resp, "Failure responding to request")
}
return
}
// ImportKeyPreparer prepares the ImportKey request.
func (client ManagementClient) ImportKeyPreparer(vaultBaseURL string, keyName string, parameters KeyImportParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPut(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// ImportKeySender sends the ImportKey request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) ImportKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// ImportKeyResponder handles the response to the ImportKey request. The method always
// closes the http.Response Body.
func (client ManagementClient) ImportKeyResponder(resp *http.Response) (result KeyBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// MergeCertificate the MergeCertificate operation performs the merging of a certificate or certificate chain with a
// key pair currently available in the service. Authorization: requires the certificates/update permission.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate. parameters is the parameters to merge certificate.
func (client ManagementClient) MergeCertificate(vaultBaseURL string, certificateName string, parameters CertificateMergeParameters) (result CertificateBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.X509Certificates", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "MergeCertificate")
}
req, err := client.MergeCertificatePreparer(vaultBaseURL, certificateName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "MergeCertificate", nil, "Failure preparing request")
return
}
resp, err := client.MergeCertificateSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "MergeCertificate", resp, "Failure sending request")
return
}
result, err = client.MergeCertificateResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "MergeCertificate", resp, "Failure responding to request")
}
return
}
// MergeCertificatePreparer prepares the MergeCertificate request.
func (client ManagementClient) MergeCertificatePreparer(vaultBaseURL string, certificateName string, parameters CertificateMergeParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/pending/merge", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// MergeCertificateSender sends the MergeCertificate request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) MergeCertificateSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// MergeCertificateResponder handles the response to the MergeCertificate request. The method always
// closes the http.Response Body.
func (client ManagementClient) MergeCertificateResponder(resp *http.Response) (result CertificateBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusCreated),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// PurgeDeletedCertificate the PurgeDeletedCertificate operation performs an irreversible deletion of the specified
// certificate, without possibility for recovery. The operation is not available if the recovery level does not specify
// 'Purgeable'. Requires the explicit granting of the 'purge' permission.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate
func (client ManagementClient) PurgeDeletedCertificate(vaultBaseURL string, certificateName string) (result autorest.Response, err error) {
req, err := client.PurgeDeletedCertificatePreparer(vaultBaseURL, certificateName)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "PurgeDeletedCertificate", nil, "Failure preparing request")
return
}
resp, err := client.PurgeDeletedCertificateSender(req)
if err != nil {
result.Response = resp
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "PurgeDeletedCertificate", resp, "Failure sending request")
return
}
result, err = client.PurgeDeletedCertificateResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "PurgeDeletedCertificate", resp, "Failure responding to request")
}
return
}
// PurgeDeletedCertificatePreparer prepares the PurgeDeletedCertificate request.
func (client ManagementClient) PurgeDeletedCertificatePreparer(vaultBaseURL string, certificateName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/deletedcertificates/{certificate-name}", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// PurgeDeletedCertificateSender sends the PurgeDeletedCertificate request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) PurgeDeletedCertificateSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// PurgeDeletedCertificateResponder handles the response to the PurgeDeletedCertificate request. The method always
// closes the http.Response Body.
func (client ManagementClient) PurgeDeletedCertificateResponder(resp *http.Response) (result autorest.Response, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),
autorest.ByClosing())
result.Response = resp
2017-08-05 18:30:20 +00:00
return
}
// PurgeDeletedKey permanently deletes the specified key. aka purges the key. Authorization: Requires the keys/purge
// permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key
func (client ManagementClient) PurgeDeletedKey(vaultBaseURL string, keyName string) (result autorest.Response, err error) {
req, err := client.PurgeDeletedKeyPreparer(vaultBaseURL, keyName)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "PurgeDeletedKey", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.PurgeDeletedKeySender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = resp
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "PurgeDeletedKey", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.PurgeDeletedKeyResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "PurgeDeletedKey", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// PurgeDeletedKeyPreparer prepares the PurgeDeletedKey request.
func (client ManagementClient) PurgeDeletedKeyPreparer(vaultBaseURL string, keyName string) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
2017-08-05 18:30:20 +00:00
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
2017-08-05 18:30:20 +00:00
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/deletedkeys/{key-name}", pathParameters),
2017-08-05 18:30:20 +00:00
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// PurgeDeletedKeySender sends the PurgeDeletedKey request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) PurgeDeletedKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// PurgeDeletedKeyResponder handles the response to the PurgeDeletedKey request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) PurgeDeletedKeyResponder(resp *http.Response) (result autorest.Response, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),
2017-08-05 18:30:20 +00:00
autorest.ByClosing())
result.Response = resp
2017-08-05 18:30:20 +00:00
return
}
// PurgeDeletedSecret permanently deletes the specified secret. aka purges the secret. Authorization: requires the
// secrets/purge permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. secretName is the name of the secret
func (client ManagementClient) PurgeDeletedSecret(vaultBaseURL string, secretName string) (result autorest.Response, err error) {
req, err := client.PurgeDeletedSecretPreparer(vaultBaseURL, secretName)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "PurgeDeletedSecret", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.PurgeDeletedSecretSender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = resp
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "PurgeDeletedSecret", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.PurgeDeletedSecretResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "PurgeDeletedSecret", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// PurgeDeletedSecretPreparer prepares the PurgeDeletedSecret request.
func (client ManagementClient) PurgeDeletedSecretPreparer(vaultBaseURL string, secretName string) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"secret-name": autorest.Encode("path", secretName),
}
2017-08-05 18:30:20 +00:00
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsDelete(),
2017-08-05 18:30:20 +00:00
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/deletedsecrets/{secret-name}", pathParameters),
2017-08-05 18:30:20 +00:00
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// PurgeDeletedSecretSender sends the PurgeDeletedSecret request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) PurgeDeletedSecretSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// PurgeDeletedSecretResponder handles the response to the PurgeDeletedSecret request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) PurgeDeletedSecretResponder(resp *http.Response) (result autorest.Response, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),
2017-08-05 18:30:20 +00:00
autorest.ByClosing())
result.Response = resp
2017-08-05 18:30:20 +00:00
return
}
// RecoverDeletedCertificate the RecoverDeletedCertificate operation performs the reversal of the Delete operation. The
// operation is applicable in vaults enabled for soft-delete, and must be issued during the retention interval
// (available in the deleted certificate's attributes).
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// deleted certificate
func (client ManagementClient) RecoverDeletedCertificate(vaultBaseURL string, certificateName string) (result CertificateBundle, err error) {
req, err := client.RecoverDeletedCertificatePreparer(vaultBaseURL, certificateName)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RecoverDeletedCertificate", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.RecoverDeletedCertificateSender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RecoverDeletedCertificate", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.RecoverDeletedCertificateResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RecoverDeletedCertificate", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// RecoverDeletedCertificatePreparer prepares the RecoverDeletedCertificate request.
func (client ManagementClient) RecoverDeletedCertificatePreparer(vaultBaseURL string, certificateName string) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
2017-08-05 18:30:20 +00:00
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsPost(),
2017-08-05 18:30:20 +00:00
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/deletedcertificates/{certificate-name}/recover", pathParameters),
2017-08-05 18:30:20 +00:00
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// RecoverDeletedCertificateSender sends the RecoverDeletedCertificate request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) RecoverDeletedCertificateSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// RecoverDeletedCertificateResponder handles the response to the RecoverDeletedCertificate request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) RecoverDeletedCertificateResponder(resp *http.Response) (result CertificateBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// RecoverDeletedKey recovers the deleted key back to its current version under /keys. Authorization: Requires the
// keys/recover permission.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the deleted key
func (client ManagementClient) RecoverDeletedKey(vaultBaseURL string, keyName string) (result KeyBundle, err error) {
req, err := client.RecoverDeletedKeyPreparer(vaultBaseURL, keyName)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RecoverDeletedKey", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.RecoverDeletedKeySender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RecoverDeletedKey", resp, "Failure sending request")
return
2017-08-05 18:30:20 +00:00
}
result, err = client.RecoverDeletedKeyResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RecoverDeletedKey", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// RecoverDeletedKeyPreparer prepares the RecoverDeletedKey request.
func (client ManagementClient) RecoverDeletedKeyPreparer(vaultBaseURL string, keyName string) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
2017-08-05 18:30:20 +00:00
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/deletedkeys/{key-name}/recover", pathParameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// RecoverDeletedKeySender sends the RecoverDeletedKey request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) RecoverDeletedKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// RecoverDeletedKeyResponder handles the response to the RecoverDeletedKey request. The method always
// closes the http.Response Body.
func (client ManagementClient) RecoverDeletedKeyResponder(resp *http.Response) (result KeyBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// RecoverDeletedSecret recovers the deleted secret back to its current version under /secrets. Authorization: requires
// the secrets/recover permission.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. secretName is the name of the deleted
// secret
func (client ManagementClient) RecoverDeletedSecret(vaultBaseURL string, secretName string) (result SecretBundle, err error) {
req, err := client.RecoverDeletedSecretPreparer(vaultBaseURL, secretName)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RecoverDeletedSecret", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.RecoverDeletedSecretSender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RecoverDeletedSecret", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.RecoverDeletedSecretResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RecoverDeletedSecret", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// RecoverDeletedSecretPreparer prepares the RecoverDeletedSecret request.
func (client ManagementClient) RecoverDeletedSecretPreparer(vaultBaseURL string, secretName string) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"secret-name": autorest.Encode("path", secretName),
2017-08-05 18:30:20 +00:00
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/deletedsecrets/{secret-name}/recover", pathParameters),
2017-08-05 18:30:20 +00:00
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// RecoverDeletedSecretSender sends the RecoverDeletedSecret request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) RecoverDeletedSecretSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// RecoverDeletedSecretResponder handles the response to the RecoverDeletedSecret request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) RecoverDeletedSecretResponder(resp *http.Response) (result SecretBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// RegenerateStorageAccountKey regenerates the specified key value for the given storage account.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account. parameters is the parameters to regenerate storage account key.
func (client ManagementClient) RegenerateStorageAccountKey(vaultBaseURL string, storageAccountName string, parameters StorageAccountRegenerteKeyParameters) (result StorageBundle, err error) {
2017-08-05 18:30:20 +00:00
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}},
2017-08-05 18:30:20 +00:00
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.KeyName", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "RegenerateStorageAccountKey")
2017-08-05 18:30:20 +00:00
}
req, err := client.RegenerateStorageAccountKeyPreparer(vaultBaseURL, storageAccountName, parameters)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RegenerateStorageAccountKey", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.RegenerateStorageAccountKeySender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RegenerateStorageAccountKey", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.RegenerateStorageAccountKeyResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RegenerateStorageAccountKey", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// RegenerateStorageAccountKeyPreparer prepares the RegenerateStorageAccountKey request.
func (client ManagementClient) RegenerateStorageAccountKeyPreparer(vaultBaseURL string, storageAccountName string, parameters StorageAccountRegenerteKeyParameters) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"storage-account-name": autorest.Encode("path", storageAccountName),
2017-08-05 18:30:20 +00:00
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
2017-08-05 18:30:20 +00:00
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}/regeneratekey", pathParameters),
2017-08-05 18:30:20 +00:00
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// RegenerateStorageAccountKeySender sends the RegenerateStorageAccountKey request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) RegenerateStorageAccountKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// RegenerateStorageAccountKeyResponder handles the response to the RegenerateStorageAccountKey request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) RegenerateStorageAccountKeyResponder(resp *http.Response) (result StorageBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// RestoreKey imports a previously backed up key into Azure Key Vault, restoring the key, its key identifier,
// attributes and access control policies. The RESTORE operation may be used to import a previously backed up key.
// Individual versions of a key cannot be restored. The key is restored in its entirety with the same key name as it
// had when it was backed up. If the key name is not available in the target Key Vault, the RESTORE operation will be
// rejected. While the key name is retained during restore, the final key identifier will change if the key is restored
// to a different vault. Restore will restore all versions and preserve version identifiers. The RESTORE operation is
// subject to security constraints: The target Key Vault must be owned by the same Microsoft Azure Subscription as the
// source Key Vault The user must have RESTORE permission in the target Key Vault.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. parameters is the parameters to restore
// the key.
func (client ManagementClient) RestoreKey(vaultBaseURL string, parameters KeyRestoreParameters) (result KeyBundle, err error) {
2017-08-05 18:30:20 +00:00
if err := validation.Validate([]validation.Validation{
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.KeyBundleBackup", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "RestoreKey")
2017-08-05 18:30:20 +00:00
}
req, err := client.RestoreKeyPreparer(vaultBaseURL, parameters)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RestoreKey", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.RestoreKeySender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RestoreKey", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.RestoreKeyResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RestoreKey", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// RestoreKeyPreparer prepares the RestoreKey request.
func (client ManagementClient) RestoreKeyPreparer(vaultBaseURL string, parameters KeyRestoreParameters) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/keys/restore"),
2017-08-05 18:30:20 +00:00
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// RestoreKeySender sends the RestoreKey request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) RestoreKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// RestoreKeyResponder handles the response to the RestoreKey request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) RestoreKeyResponder(resp *http.Response) (result KeyBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
2017-08-05 18:30:20 +00:00
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// RestoreSecret restores a backed up secret to a vault. Authorization: requires the secrets/restore permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. parameters is the parameters to restore
// the secret.
func (client ManagementClient) RestoreSecret(vaultBaseURL string, parameters SecretRestoreParameters) (result SecretBundle, err error) {
2017-08-05 18:30:20 +00:00
if err := validation.Validate([]validation.Validation{
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.SecretBundleBackup", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "RestoreSecret")
2017-08-05 18:30:20 +00:00
}
req, err := client.RestoreSecretPreparer(vaultBaseURL, parameters)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RestoreSecret", nil, "Failure preparing request")
2017-08-05 18:30:20 +00:00
return
}
resp, err := client.RestoreSecretSender(req)
2017-08-05 18:30:20 +00:00
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RestoreSecret", resp, "Failure sending request")
2017-08-05 18:30:20 +00:00
return
}
result, err = client.RestoreSecretResponder(resp)
2017-08-05 18:30:20 +00:00
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "RestoreSecret", resp, "Failure responding to request")
2017-08-05 18:30:20 +00:00
}
return
}
// RestoreSecretPreparer prepares the RestoreSecret request.
func (client ManagementClient) RestoreSecretPreparer(vaultBaseURL string, parameters SecretRestoreParameters) (*http.Request, error) {
2017-08-05 18:30:20 +00:00
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/secrets/restore"),
2017-08-05 18:30:20 +00:00
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// RestoreSecretSender sends the RestoreSecret request. The method will close the
2017-08-05 18:30:20 +00:00
// http.Response Body if it receives an error.
func (client ManagementClient) RestoreSecretSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// RestoreSecretResponder handles the response to the RestoreSecret request. The method always
2017-08-05 18:30:20 +00:00
// closes the http.Response Body.
func (client ManagementClient) RestoreSecretResponder(resp *http.Response) (result SecretBundle, err error) {
2017-08-05 18:30:20 +00:00
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// SetCertificateContacts sets the certificate contacts for the specified key vault. Authorization: requires the
// certificates/managecontacts permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. contacts is the contacts for the key
// vault certificate.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) SetCertificateContacts(vaultBaseURL string, contacts Contacts) (result Contacts, err error) {
req, err := client.SetCertificateContactsPreparer(vaultBaseURL, contacts)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetCertificateContacts", nil, "Failure preparing request")
return
}
resp, err := client.SetCertificateContactsSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetCertificateContacts", resp, "Failure sending request")
return
}
result, err = client.SetCertificateContactsResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetCertificateContacts", resp, "Failure responding to request")
}
return
}
// SetCertificateContactsPreparer prepares the SetCertificateContacts request.
func (client ManagementClient) SetCertificateContactsPreparer(vaultBaseURL string, contacts Contacts) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPut(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPath("/certificates/contacts"),
autorest.WithJSON(contacts),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// SetCertificateContactsSender sends the SetCertificateContacts request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) SetCertificateContactsSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// SetCertificateContactsResponder handles the response to the SetCertificateContacts request. The method always
// closes the http.Response Body.
func (client ManagementClient) SetCertificateContactsResponder(resp *http.Response) (result Contacts, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// SetCertificateIssuer the SetCertificateIssuer operation adds or updates the specified certificate issuer.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. issuerName is the name of the issuer.
// parameter is certificate issuer set parameter.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) SetCertificateIssuer(vaultBaseURL string, issuerName string, parameter CertificateIssuerSetParameters) (result IssuerBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: parameter,
Constraints: []validation.Constraint{{Target: "parameter.Provider", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "SetCertificateIssuer")
}
req, err := client.SetCertificateIssuerPreparer(vaultBaseURL, issuerName, parameter)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetCertificateIssuer", nil, "Failure preparing request")
return
}
resp, err := client.SetCertificateIssuerSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetCertificateIssuer", resp, "Failure sending request")
return
}
result, err = client.SetCertificateIssuerResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetCertificateIssuer", resp, "Failure responding to request")
}
return
}
// SetCertificateIssuerPreparer prepares the SetCertificateIssuer request.
func (client ManagementClient) SetCertificateIssuerPreparer(vaultBaseURL string, issuerName string, parameter CertificateIssuerSetParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"issuer-name": autorest.Encode("path", issuerName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPut(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/issuers/{issuer-name}", pathParameters),
autorest.WithJSON(parameter),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// SetCertificateIssuerSender sends the SetCertificateIssuer request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) SetCertificateIssuerSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// SetCertificateIssuerResponder handles the response to the SetCertificateIssuer request. The method always
// closes the http.Response Body.
func (client ManagementClient) SetCertificateIssuerResponder(resp *http.Response) (result IssuerBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// SetSasDefinition creates or updates a new SAS definition for the specified storage account.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account. sasDefinitionName is the name of the SAS definition. parameters is the parameters to create a SAS
// definition.
func (client ManagementClient) SetSasDefinition(vaultBaseURL string, storageAccountName string, sasDefinitionName string, parameters SasDefinitionCreateParameters) (result SasDefinitionBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}},
{TargetValue: sasDefinitionName,
Constraints: []validation.Constraint{{Target: "sasDefinitionName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}},
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Parameters", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "SetSasDefinition")
}
req, err := client.SetSasDefinitionPreparer(vaultBaseURL, storageAccountName, sasDefinitionName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetSasDefinition", nil, "Failure preparing request")
return
}
resp, err := client.SetSasDefinitionSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetSasDefinition", resp, "Failure sending request")
return
}
result, err = client.SetSasDefinitionResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetSasDefinition", resp, "Failure responding to request")
}
return
}
// SetSasDefinitionPreparer prepares the SetSasDefinition request.
func (client ManagementClient) SetSasDefinitionPreparer(vaultBaseURL string, storageAccountName string, sasDefinitionName string, parameters SasDefinitionCreateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"sas-definition-name": autorest.Encode("path", sasDefinitionName),
"storage-account-name": autorest.Encode("path", storageAccountName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPut(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}/sas/{sas-definition-name}", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// SetSasDefinitionSender sends the SetSasDefinition request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) SetSasDefinitionSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// SetSasDefinitionResponder handles the response to the SetSasDefinition request. The method always
// closes the http.Response Body.
func (client ManagementClient) SetSasDefinitionResponder(resp *http.Response) (result SasDefinitionBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// SetSecret the SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure Key
// Vault creates a new version of that secret.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. secretName is the name of the secret.
// parameters is the parameters for setting the secret.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) SetSecret(vaultBaseURL string, secretName string, parameters SecretSetParameters) (result SecretBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: secretName,
Constraints: []validation.Constraint{{Target: "secretName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z-]+$`, Chain: nil}}},
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Value", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "SetSecret")
}
req, err := client.SetSecretPreparer(vaultBaseURL, secretName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetSecret", nil, "Failure preparing request")
return
}
resp, err := client.SetSecretSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetSecret", resp, "Failure sending request")
return
}
result, err = client.SetSecretResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetSecret", resp, "Failure responding to request")
}
return
}
// SetSecretPreparer prepares the SetSecret request.
func (client ManagementClient) SetSecretPreparer(vaultBaseURL string, secretName string, parameters SecretSetParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"secret-name": autorest.Encode("path", secretName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPut(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/secrets/{secret-name}", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// SetSecretSender sends the SetSecret request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) SetSecretSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// SetSecretResponder handles the response to the SetSecret request. The method always
// closes the http.Response Body.
func (client ManagementClient) SetSecretResponder(resp *http.Response) (result SecretBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// SetStorageAccount creates or updates a new storage account.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account. parameters is the parameters to create a storage account.
func (client ManagementClient) SetStorageAccount(vaultBaseURL string, storageAccountName string, parameters StorageAccountCreateParameters) (result StorageBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}},
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.ResourceID", Name: validation.Null, Rule: true, Chain: nil},
{Target: "parameters.ActiveKeyName", Name: validation.Null, Rule: true, Chain: nil},
{Target: "parameters.AutoRegenerateKey", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "SetStorageAccount")
}
req, err := client.SetStorageAccountPreparer(vaultBaseURL, storageAccountName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetStorageAccount", nil, "Failure preparing request")
return
}
resp, err := client.SetStorageAccountSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetStorageAccount", resp, "Failure sending request")
return
}
result, err = client.SetStorageAccountResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "SetStorageAccount", resp, "Failure responding to request")
}
return
}
// SetStorageAccountPreparer prepares the SetStorageAccount request.
func (client ManagementClient) SetStorageAccountPreparer(vaultBaseURL string, storageAccountName string, parameters StorageAccountCreateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"storage-account-name": autorest.Encode("path", storageAccountName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPut(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// SetStorageAccountSender sends the SetStorageAccount request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) SetStorageAccountSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// SetStorageAccountResponder handles the response to the SetStorageAccount request. The method always
// closes the http.Response Body.
func (client ManagementClient) SetStorageAccountResponder(resp *http.Response) (result StorageBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// Sign the SIGN operation is applicable to asymmetric and symmetric keys stored in Azure Key Vault since this
// operation uses the private portion of the key.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key.
// keyVersion is the version of the key. parameters is the parameters for the signing operation.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) Sign(vaultBaseURL string, keyName string, keyVersion string, parameters KeySignParameters) (result KeyOperationResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Value", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "Sign")
}
req, err := client.SignPreparer(vaultBaseURL, keyName, keyVersion, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Sign", nil, "Failure preparing request")
return
}
resp, err := client.SignSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Sign", resp, "Failure sending request")
return
}
result, err = client.SignResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Sign", resp, "Failure responding to request")
}
return
}
// SignPreparer prepares the Sign request.
func (client ManagementClient) SignPreparer(vaultBaseURL string, keyName string, keyVersion string, parameters KeySignParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
"key-version": autorest.Encode("path", keyVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/{key-version}/sign", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// SignSender sends the Sign request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) SignSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// SignResponder handles the response to the Sign request. The method always
// closes the http.Response Body.
func (client ManagementClient) SignResponder(resp *http.Response) (result KeyOperationResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// UnwrapKey the UNWRAP operation supports decryption of a symmetric key using the target key encryption key. This
// operation is the reverse of the WRAP operation. The UNWRAP operation applies to asymmetric and symmetric keys stored
// in Azure Key Vault since it uses the private portion of the key.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key.
// keyVersion is the version of the key. parameters is the parameters for the key operation.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) UnwrapKey(vaultBaseURL string, keyName string, keyVersion string, parameters KeyOperationsParameters) (result KeyOperationResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Value", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "UnwrapKey")
}
req, err := client.UnwrapKeyPreparer(vaultBaseURL, keyName, keyVersion, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UnwrapKey", nil, "Failure preparing request")
return
}
resp, err := client.UnwrapKeySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UnwrapKey", resp, "Failure sending request")
return
}
result, err = client.UnwrapKeyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UnwrapKey", resp, "Failure responding to request")
}
return
}
// UnwrapKeyPreparer prepares the UnwrapKey request.
func (client ManagementClient) UnwrapKeyPreparer(vaultBaseURL string, keyName string, keyVersion string, parameters KeyOperationsParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
"key-version": autorest.Encode("path", keyVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/{key-version}/unwrapkey", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// UnwrapKeySender sends the UnwrapKey request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) UnwrapKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// UnwrapKeyResponder handles the response to the UnwrapKey request. The method always
// closes the http.Response Body.
func (client ManagementClient) UnwrapKeyResponder(resp *http.Response) (result KeyOperationResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// UpdateCertificate the UpdateCertificate operation applies the specified update on the given certificate; note the
// only elements being updated are the certificate's attributes.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate in the given key vault. certificateVersion is the version of the certificate. parameters is the
2017-08-05 18:30:20 +00:00
// parameters for certificate update.
func (client ManagementClient) UpdateCertificate(vaultBaseURL string, certificateName string, certificateVersion string, parameters CertificateUpdateParameters) (result CertificateBundle, err error) {
req, err := client.UpdateCertificatePreparer(vaultBaseURL, certificateName, certificateVersion, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificate", nil, "Failure preparing request")
return
}
resp, err := client.UpdateCertificateSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificate", resp, "Failure sending request")
return
}
result, err = client.UpdateCertificateResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificate", resp, "Failure responding to request")
}
return
}
// UpdateCertificatePreparer prepares the UpdateCertificate request.
func (client ManagementClient) UpdateCertificatePreparer(vaultBaseURL string, certificateName string, certificateVersion string, parameters CertificateUpdateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
"certificate-version": autorest.Encode("path", certificateVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPatch(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/{certificate-version}", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// UpdateCertificateSender sends the UpdateCertificate request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) UpdateCertificateSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// UpdateCertificateResponder handles the response to the UpdateCertificate request. The method always
// closes the http.Response Body.
func (client ManagementClient) UpdateCertificateResponder(resp *http.Response) (result CertificateBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// UpdateCertificateIssuer the UpdateCertificateIssuer operation performs an update on the specified certificate issuer
// entity.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. issuerName is the name of the issuer.
// parameter is certificate issuer update parameter.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) UpdateCertificateIssuer(vaultBaseURL string, issuerName string, parameter CertificateIssuerUpdateParameters) (result IssuerBundle, err error) {
req, err := client.UpdateCertificateIssuerPreparer(vaultBaseURL, issuerName, parameter)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificateIssuer", nil, "Failure preparing request")
return
}
resp, err := client.UpdateCertificateIssuerSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificateIssuer", resp, "Failure sending request")
return
}
result, err = client.UpdateCertificateIssuerResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificateIssuer", resp, "Failure responding to request")
}
return
}
// UpdateCertificateIssuerPreparer prepares the UpdateCertificateIssuer request.
func (client ManagementClient) UpdateCertificateIssuerPreparer(vaultBaseURL string, issuerName string, parameter CertificateIssuerUpdateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"issuer-name": autorest.Encode("path", issuerName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPatch(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/issuers/{issuer-name}", pathParameters),
autorest.WithJSON(parameter),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// UpdateCertificateIssuerSender sends the UpdateCertificateIssuer request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) UpdateCertificateIssuerSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// UpdateCertificateIssuerResponder handles the response to the UpdateCertificateIssuer request. The method always
// closes the http.Response Body.
func (client ManagementClient) UpdateCertificateIssuerResponder(resp *http.Response) (result IssuerBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// UpdateCertificateOperation updates a certificate operation. Authorization: requires the certificates/update
// permission.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate. certificateOperation is the certificate operation response.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) UpdateCertificateOperation(vaultBaseURL string, certificateName string, certificateOperation CertificateOperationUpdateParameter) (result CertificateOperation, err error) {
req, err := client.UpdateCertificateOperationPreparer(vaultBaseURL, certificateName, certificateOperation)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificateOperation", nil, "Failure preparing request")
return
}
resp, err := client.UpdateCertificateOperationSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificateOperation", resp, "Failure sending request")
return
}
result, err = client.UpdateCertificateOperationResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificateOperation", resp, "Failure responding to request")
}
return
}
// UpdateCertificateOperationPreparer prepares the UpdateCertificateOperation request.
func (client ManagementClient) UpdateCertificateOperationPreparer(vaultBaseURL string, certificateName string, certificateOperation CertificateOperationUpdateParameter) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPatch(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/pending", pathParameters),
autorest.WithJSON(certificateOperation),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// UpdateCertificateOperationSender sends the UpdateCertificateOperation request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) UpdateCertificateOperationSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// UpdateCertificateOperationResponder handles the response to the UpdateCertificateOperation request. The method always
// closes the http.Response Body.
func (client ManagementClient) UpdateCertificateOperationResponder(resp *http.Response) (result CertificateOperation, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// UpdateCertificatePolicy set specified members in the certificate policy. Leave others as null.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. certificateName is the name of the
// certificate in the given vault. certificatePolicy is the policy for the certificate.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) UpdateCertificatePolicy(vaultBaseURL string, certificateName string, certificatePolicy CertificatePolicy) (result CertificatePolicy, err error) {
req, err := client.UpdateCertificatePolicyPreparer(vaultBaseURL, certificateName, certificatePolicy)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificatePolicy", nil, "Failure preparing request")
return
}
resp, err := client.UpdateCertificatePolicySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificatePolicy", resp, "Failure sending request")
return
}
result, err = client.UpdateCertificatePolicyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateCertificatePolicy", resp, "Failure responding to request")
}
return
}
// UpdateCertificatePolicyPreparer prepares the UpdateCertificatePolicy request.
func (client ManagementClient) UpdateCertificatePolicyPreparer(vaultBaseURL string, certificateName string, certificatePolicy CertificatePolicy) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"certificate-name": autorest.Encode("path", certificateName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPatch(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/certificates/{certificate-name}/policy", pathParameters),
autorest.WithJSON(certificatePolicy),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// UpdateCertificatePolicySender sends the UpdateCertificatePolicy request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) UpdateCertificatePolicySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// UpdateCertificatePolicyResponder handles the response to the UpdateCertificatePolicy request. The method always
// closes the http.Response Body.
func (client ManagementClient) UpdateCertificatePolicyResponder(resp *http.Response) (result CertificatePolicy, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// UpdateKey in order to perform this operation, the key must already exist in the Key Vault. Note: The cryptographic
// material of a key itself cannot be changed.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of key to update.
// keyVersion is the version of the key to update. parameters is the parameters of the key to update.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) UpdateKey(vaultBaseURL string, keyName string, keyVersion string, parameters KeyUpdateParameters) (result KeyBundle, err error) {
req, err := client.UpdateKeyPreparer(vaultBaseURL, keyName, keyVersion, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateKey", nil, "Failure preparing request")
return
}
resp, err := client.UpdateKeySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateKey", resp, "Failure sending request")
return
}
result, err = client.UpdateKeyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateKey", resp, "Failure responding to request")
}
return
}
// UpdateKeyPreparer prepares the UpdateKey request.
func (client ManagementClient) UpdateKeyPreparer(vaultBaseURL string, keyName string, keyVersion string, parameters KeyUpdateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
"key-version": autorest.Encode("path", keyVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPatch(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/{key-version}", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// UpdateKeySender sends the UpdateKey request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) UpdateKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// UpdateKeyResponder handles the response to the UpdateKey request. The method always
// closes the http.Response Body.
func (client ManagementClient) UpdateKeyResponder(resp *http.Response) (result KeyBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// UpdateSasDefinition updates the specified attributes associated with the given SAS definition.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account. sasDefinitionName is the name of the SAS definition. parameters is the parameters to update a SAS
// definition.
func (client ManagementClient) UpdateSasDefinition(vaultBaseURL string, storageAccountName string, sasDefinitionName string, parameters SasDefinitionUpdateParameters) (result SasDefinitionBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}},
{TargetValue: sasDefinitionName,
Constraints: []validation.Constraint{{Target: "sasDefinitionName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "UpdateSasDefinition")
}
req, err := client.UpdateSasDefinitionPreparer(vaultBaseURL, storageAccountName, sasDefinitionName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateSasDefinition", nil, "Failure preparing request")
return
}
resp, err := client.UpdateSasDefinitionSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateSasDefinition", resp, "Failure sending request")
return
}
result, err = client.UpdateSasDefinitionResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateSasDefinition", resp, "Failure responding to request")
}
return
}
// UpdateSasDefinitionPreparer prepares the UpdateSasDefinition request.
func (client ManagementClient) UpdateSasDefinitionPreparer(vaultBaseURL string, storageAccountName string, sasDefinitionName string, parameters SasDefinitionUpdateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"sas-definition-name": autorest.Encode("path", sasDefinitionName),
"storage-account-name": autorest.Encode("path", storageAccountName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPatch(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}/sas/{sas-definition-name}", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// UpdateSasDefinitionSender sends the UpdateSasDefinition request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) UpdateSasDefinitionSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// UpdateSasDefinitionResponder handles the response to the UpdateSasDefinition request. The method always
// closes the http.Response Body.
func (client ManagementClient) UpdateSasDefinitionResponder(resp *http.Response) (result SasDefinitionBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// UpdateSecret the UPDATE operation changes specified attributes of an existing stored secret. Attributes that are not
// specified in the request are left unchanged. The value of a secret itself cannot be changed.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. secretName is the name of the secret.
// secretVersion is the version of the secret. parameters is the parameters for update secret operation.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) UpdateSecret(vaultBaseURL string, secretName string, secretVersion string, parameters SecretUpdateParameters) (result SecretBundle, err error) {
req, err := client.UpdateSecretPreparer(vaultBaseURL, secretName, secretVersion, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateSecret", nil, "Failure preparing request")
return
}
resp, err := client.UpdateSecretSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateSecret", resp, "Failure sending request")
return
}
result, err = client.UpdateSecretResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateSecret", resp, "Failure responding to request")
}
return
}
// UpdateSecretPreparer prepares the UpdateSecret request.
func (client ManagementClient) UpdateSecretPreparer(vaultBaseURL string, secretName string, secretVersion string, parameters SecretUpdateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"secret-name": autorest.Encode("path", secretName),
"secret-version": autorest.Encode("path", secretVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPatch(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/secrets/{secret-name}/{secret-version}", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// UpdateSecretSender sends the UpdateSecret request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) UpdateSecretSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// UpdateSecretResponder handles the response to the UpdateSecret request. The method always
// closes the http.Response Body.
func (client ManagementClient) UpdateSecretResponder(resp *http.Response) (result SecretBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// UpdateStorageAccount updates the specified attributes associated with the given storage account.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. storageAccountName is the name of the
// storage account. parameters is the parameters to update a storage account.
func (client ManagementClient) UpdateStorageAccount(vaultBaseURL string, storageAccountName string, parameters StorageAccountUpdateParameters) (result StorageBundle, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: storageAccountName,
Constraints: []validation.Constraint{{Target: "storageAccountName", Name: validation.Pattern, Rule: `^[0-9a-zA-Z]+$`, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "UpdateStorageAccount")
}
req, err := client.UpdateStorageAccountPreparer(vaultBaseURL, storageAccountName, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateStorageAccount", nil, "Failure preparing request")
return
}
resp, err := client.UpdateStorageAccountSender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateStorageAccount", resp, "Failure sending request")
return
}
result, err = client.UpdateStorageAccountResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "UpdateStorageAccount", resp, "Failure responding to request")
}
return
}
// UpdateStorageAccountPreparer prepares the UpdateStorageAccount request.
func (client ManagementClient) UpdateStorageAccountPreparer(vaultBaseURL string, storageAccountName string, parameters StorageAccountUpdateParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"storage-account-name": autorest.Encode("path", storageAccountName),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPatch(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/storage/{storage-account-name}", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// UpdateStorageAccountSender sends the UpdateStorageAccount request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) UpdateStorageAccountSender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
}
// UpdateStorageAccountResponder handles the response to the UpdateStorageAccount request. The method always
// closes the http.Response Body.
func (client ManagementClient) UpdateStorageAccountResponder(resp *http.Response) (result StorageBundle, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// Verify the VERIFY operation is applicable to symmetric keys stored in Azure Key Vault. VERIFY is not strictly
// necessary for asymmetric keys stored in Azure Key Vault since signature verification can be performed using the
// public portion of the key but this operation is supported as a convenience for callers that only have a
// key-reference and not the public portion of the key.
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key.
// keyVersion is the version of the key. parameters is the parameters for verify operations.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) Verify(vaultBaseURL string, keyName string, keyVersion string, parameters KeyVerifyParameters) (result KeyVerifyResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Digest", Name: validation.Null, Rule: true, Chain: nil},
{Target: "parameters.Signature", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "Verify")
}
req, err := client.VerifyPreparer(vaultBaseURL, keyName, keyVersion, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Verify", nil, "Failure preparing request")
return
}
resp, err := client.VerifySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Verify", resp, "Failure sending request")
return
}
result, err = client.VerifyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "Verify", resp, "Failure responding to request")
}
return
}
// VerifyPreparer prepares the Verify request.
func (client ManagementClient) VerifyPreparer(vaultBaseURL string, keyName string, keyVersion string, parameters KeyVerifyParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
"key-version": autorest.Encode("path", keyVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/{key-version}/verify", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// VerifySender sends the Verify request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) VerifySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// VerifyResponder handles the response to the Verify request. The method always
// closes the http.Response Body.
func (client ManagementClient) VerifyResponder(resp *http.Response) (result KeyVerifyResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}
// WrapKey the WRAP operation supports encryption of a symmetric key using a key encryption key that has previously
// been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys stored in Azure
// Key Vault since protection with an asymmetric key can be performed using the public portion of the key. This
// operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have
// access to the public key material.
2017-08-05 18:30:20 +00:00
//
// vaultBaseURL is the vault name, for example https://myvault.vault.azure.net. keyName is the name of the key.
// keyVersion is the version of the key. parameters is the parameters for wrap operation.
2017-08-05 18:30:20 +00:00
func (client ManagementClient) WrapKey(vaultBaseURL string, keyName string, keyVersion string, parameters KeyOperationsParameters) (result KeyOperationResult, err error) {
if err := validation.Validate([]validation.Validation{
{TargetValue: parameters,
Constraints: []validation.Constraint{{Target: "parameters.Value", Name: validation.Null, Rule: true, Chain: nil}}}}); err != nil {
return result, validation.NewErrorWithValidationError(err, "keyvault.ManagementClient", "WrapKey")
}
req, err := client.WrapKeyPreparer(vaultBaseURL, keyName, keyVersion, parameters)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "WrapKey", nil, "Failure preparing request")
return
}
resp, err := client.WrapKeySender(req)
if err != nil {
result.Response = autorest.Response{Response: resp}
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "WrapKey", resp, "Failure sending request")
return
}
result, err = client.WrapKeyResponder(resp)
if err != nil {
err = autorest.NewErrorWithError(err, "keyvault.ManagementClient", "WrapKey", resp, "Failure responding to request")
}
return
}
// WrapKeyPreparer prepares the WrapKey request.
func (client ManagementClient) WrapKeyPreparer(vaultBaseURL string, keyName string, keyVersion string, parameters KeyOperationsParameters) (*http.Request, error) {
urlParameters := map[string]interface{}{
"vaultBaseUrl": vaultBaseURL,
}
pathParameters := map[string]interface{}{
"key-name": autorest.Encode("path", keyName),
"key-version": autorest.Encode("path", keyVersion),
}
const APIVersion = "2016-10-01"
queryParameters := map[string]interface{}{
"api-version": APIVersion,
}
preparer := autorest.CreatePreparer(
autorest.AsJSON(),
autorest.AsPost(),
autorest.WithCustomBaseURL("{vaultBaseUrl}", urlParameters),
autorest.WithPathParameters("/keys/{key-name}/{key-version}/wrapkey", pathParameters),
autorest.WithJSON(parameters),
autorest.WithQueryParameters(queryParameters))
return preparer.Prepare(&http.Request{})
}
// WrapKeySender sends the WrapKey request. The method will close the
// http.Response Body if it receives an error.
func (client ManagementClient) WrapKeySender(req *http.Request) (*http.Response, error) {
return autorest.SendWithSender(client,
req,
autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))
2017-08-05 18:30:20 +00:00
}
// WrapKeyResponder handles the response to the WrapKey request. The method always
// closes the http.Response Body.
func (client ManagementClient) WrapKeyResponder(resp *http.Response) (result KeyOperationResult, err error) {
err = autorest.Respond(
resp,
client.ByInspecting(),
azure.WithErrorUnlessStatusCode(http.StatusOK),
autorest.ByUnmarshallingJSON(&result),
autorest.ByClosing())
result.Response = autorest.Response{Response: resp}
return
}