Skip to content

Commit

Permalink
[Hub Generated] Review request for Microsoft.KeyVault to add version …
Browse files Browse the repository at this point in the history
…stable/2019-09-01 (#8458)

* Added SoftDeleteRetentionInDays, CustomizedRecoverable and recoverableDays (#8457)

Co-authored-by: gdlxm <[email protected]>
Co-authored-by: iscai-msft <[email protected]>

* Added `enableRbacAuthorization` property to Key Vault management plane (#8468)

* Add default=90 to softDeleteRetentionInDays (#8476)

* Add default=90 to softDeleteRetentionInDays

Add default=90  to softDeleteRetentionInDays

* Remove default softDeleteRetentionInDays  when patching

Remove default softDeleteRetentionInDays  when patching.

Co-authored-by: gdlxm <[email protected]>
Co-authored-by: iscai-msft <[email protected]>
Co-authored-by: Fernando Colombo <[email protected]>
  • Loading branch information
4 people authored Feb 22, 2020
1 parent 44e1888 commit d02e9b5
Show file tree
Hide file tree
Showing 5 changed files with 34 additions and 11 deletions.
2 changes: 1 addition & 1 deletion CODEOWNERS
Validating CODEOWNERS rules …
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@
/specification/insights/ @gucalder
/specification/intune/ @vrmurthy01
/specification/iothub/ @rkmanda
/specification/keyvault/ @schaabs
/specification/keyvault/ @schaabs @heaths
/specification/logic/ @pankajsn @tonytang-microsoft-com
/specification/machinelearning/ @nonstatic2014
/specification/machinelearningcompute/ @shutchings
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,10 @@
},
"responses": {
"200": {
"headers": {},
"body": ""
"headers": {}
},
"204": {
"headers": {}
}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,11 +6,7 @@
"api-version": "2018-02-14-preview"
},
"responses": {
"200": {
"body": ""
},
"202": {
"body": ""
}
"200": {},
"202": {}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -174,6 +174,9 @@
"responses": {
"200": {
"description": "OK Response."
},
"204": {
"description": "No Content."
}
},
"x-ms-examples": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1122,7 +1122,19 @@
},
"enableSoftDelete": {
"type": "boolean",
"description": "Property to specify whether the 'soft delete' functionality is enabled for this key vault. If omitted, assume true as default value. Once set to true, cannot be reverted to false."
"default": true,
"description": "Property to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once it's been set to true value, it can NOT be reverted to false."
},
"softDeleteRetentionInDays": {
"type": "integer",
"format": "int32",
"default": 90,
"description": "softDelete data retention days. It accepts >=7 and <=90."
},
"enableRbacAuthorization": {
"type": "boolean",
"default": false,
"description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC."
},
"createMode": {
"type": "string",
Expand Down Expand Up @@ -1191,7 +1203,17 @@
},
"enableSoftDelete": {
"type": "boolean",
"description": "Property to specify whether the 'soft delete' functionality is enabled for this key vault. If omitted, assume true as default value. Once set to true, cannot be reverted to false."
"default": false,
"description": "Property to specify whether the 'soft delete' functionality is enabled for this key vault. If omitted, assume false as default value when patching an existing vault. Once set to true, cannot be reverted to false."
},
"softDeleteRetentionInDays": {
"type": "integer",
"format": "int32",
"description": "softDelete data retention days. It accepts >=7 and <=90."
},
"enableRbacAuthorization": {
"type": "boolean",
"description": "Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the value of this property will not change."
},
"createMode": {
"type": "string",
Expand Down

0 comments on commit d02e9b5

Please sign in to comment.