Hello community,

here is the log from the commit of package azure-cli-keyvault for 
openSUSE:Factory checked in at 2018-05-13 16:02:36
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/azure-cli-keyvault (Old)
 and      /work/SRC/openSUSE:Factory/.azure-cli-keyvault.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "azure-cli-keyvault"

Sun May 13 16:02:36 2018 rev:3 rq:600056 version:2.0.21

Changes:
--------
--- /work/SRC/openSUSE:Factory/azure-cli-keyvault/azure-cli-keyvault.changes    
2018-02-14 09:31:24.275952698 +0100
+++ 
/work/SRC/openSUSE:Factory/.azure-cli-keyvault.new/azure-cli-keyvault.changes   
    2018-05-13 16:02:39.207610829 +0200
@@ -1,0 +2,8 @@
+Thu Apr 19 09:37:05 UTC 2018 - adrian.glaub...@suse.com
+
+- New upstream release
+  + Version 2.0.21
+- Move LICENSE.txt from %doc to %license section
+- Update Requires from setup.py
+
+-------------------------------------------------------------------

Old:
----
  azure-cli-keyvault-2.0.17.tar.gz

New:
----
  azure-cli-keyvault-2.0.21.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ azure-cli-keyvault.spec ++++++
--- /var/tmp/diff_new_pack.7fyJE0/_old  2018-05-13 16:02:40.051580037 +0200
+++ /var/tmp/diff_new_pack.7fyJE0/_new  2018-05-13 16:02:40.051580037 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           azure-cli-keyvault
-Version:        2.0.17
+Version:        2.0.21
 Release:        0
 Summary:        Microsoft Azure CLI 'keyvault' Command Module
 License:        MIT
@@ -37,6 +37,7 @@
 Requires:       python3-azure-keyvault >= 0.3.7
 Requires:       python3-azure-mgmt-keyvault >= 0.40.0
 Requires:       python3-azure-nspkg
+Requires:       python3-pyOpenSSL
 Conflicts:      azure-cli < 2.0.0
 
 BuildArch:      noarch
@@ -65,7 +66,8 @@
 
 %files
 %defattr(-,root,root,-)
-%doc HISTORY.rst LICENSE.txt README.rst
+%doc HISTORY.rst README.rst
+%license LICENSE.txt
 %{python3_sitelib}/azure/cli/command_modules/keyvault
 %{python3_sitelib}/azure_cli_keyvault-*.egg-info
 

++++++ azure-cli-keyvault-2.0.17.tar.gz -> azure-cli-keyvault-2.0.21.tar.gz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/HISTORY.rst 
new/azure-cli-keyvault-2.0.21/HISTORY.rst
--- old/azure-cli-keyvault-2.0.17/HISTORY.rst   2018-01-26 17:12:24.000000000 
+0100
+++ new/azure-cli-keyvault-2.0.21/HISTORY.rst   2018-04-06 19:33:13.000000000 
+0200
@@ -2,6 +2,22 @@
 
 Release History
 ===============
+2.0.21
+++++++
+* Minor fixes.
+* `sdist` is now compatible with wheel 0.31.0
+
+2.0.20
+++++++
+* Support Autorest 3.0 based SDKs
+
+2.0.19
+++++++
+* Minor fixes.
+
+2.0.18
+++++++
+* Minor fixes.
 
 2.0.17
 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/PKG-INFO 
new/azure-cli-keyvault-2.0.21/PKG-INFO
--- old/azure-cli-keyvault-2.0.17/PKG-INFO      2018-01-26 17:12:44.000000000 
+0100
+++ new/azure-cli-keyvault-2.0.21/PKG-INFO      2018-04-06 19:33:46.000000000 
+0200
@@ -1,11 +1,12 @@
 Metadata-Version: 1.1
 Name: azure-cli-keyvault
-Version: 2.0.17
+Version: 2.0.21
 Summary: Microsoft Azure Command-Line Tools Keyvault Command Module
 Home-page: https://github.com/Azure/azure-cli
 Author: Microsoft Corporation
 Author-email: azpy...@microsoft.com
 License: MIT
+Description-Content-Type: UNKNOWN
 Description: Microsoft Azure CLI 'keyvault' Command Module
         =============================================
         
@@ -19,6 +20,22 @@
         
         Release History
         ===============
+        2.0.21
+        ++++++
+        * Minor fixes.
+        * `sdist` is now compatible with wheel 0.31.0
+        
+        2.0.20
+        ++++++
+        * Support Autorest 3.0 based SDKs
+        
+        2.0.19
+        ++++++
+        * Minor fixes.
+        
+        2.0.18
+        ++++++
+        * Minor fixes.
         
         2.0.17
         ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_command_type.py
 
new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_command_type.py
--- 
old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_command_type.py
   2018-01-26 17:12:24.000000000 +0100
+++ 
new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_command_type.py
   2018-04-06 19:33:13.000000000 +0200
@@ -78,8 +78,9 @@
 
         def keyvault_command_handler(command_args):
             from azure.cli.core.util import get_arg_list
+            from azure.cli.core.commands.client_factory import 
resolve_client_arg_name
             from msrest.paging import Paged
-            from msrestazure.azure_operation import AzureOperationPoller
+            from azure.cli.core.util import poller_classes
 
             op = get_op_handler()
             op_args = get_arg_list(op)
@@ -87,7 +88,7 @@
             client_factory = command_type.settings.get('client_factory', None) 
if command_type \
                 else merged_kwargs.get('client_factory', None)
 
-            client_arg_name = 'client' if 
operations_tmpl.startswith(('azure.cli', 'azext')) else 'self'
+            client_arg_name = 
resolve_client_arg_name(operations_tmpl.format(method_name), kwargs)
             if client_arg_name in op_args:
                 client = client_factory(self.command_loader.cli_ctx, 
command_args)
                 command_args[client_arg_name] = client
@@ -99,7 +100,7 @@
                     return _encode_hex(transform_result(result))
 
                 # otherwise handle based on return type of results
-                if isinstance(result, AzureOperationPoller):
+                if isinstance(result, poller_classes()):
                     return _encode_hex(
                         LongRunningOperation(self.command_loader.cli_ctx, 
'Starting {}'.format(name))(result))
                 elif isinstance(result, Paged):
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_help.py 
new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_help.py
--- old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_help.py   
2018-01-26 17:12:24.000000000 +0100
+++ new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_help.py   
2018-04-06 19:33:13.000000000 +0200
@@ -101,7 +101,7 @@
             secrets=$(az keyvault secret list-versions --vault-name vaultname 
\\
               -n cert1 --query "[?attributes.enabled].id" -o tsv)
 
-            vm_secrets=$(az vm format-secret -s "$secrets") \n
+            vm_secrets=$(az vm secret format -s "$secrets") \n
 
             az vm create -g group-name -n vm-name --admin-username deploy  \\
               --image debian --secrets "$vm_secrets"
@@ -125,7 +125,7 @@
             secrets=$(az keyvault secret list-versions --vault-name vaultname 
\\
               -n cert1 --query "[?attributes.enabled].id" -o tsv)
 
-            vm_secrets=$(az vm format-secret -s "$secrets") \n
+            vm_secrets=$(az vm secret format -s "$secrets") \n
 
             az vm create -g group-name -n vm-name --admin-username deploy  \\
               --image debian --secrets "$vm_secrets"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_params.py 
new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_params.py
--- old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_params.py 
2018-01-26 17:12:24.000000000 +0100
+++ new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_params.py 
2018-04-06 19:33:13.000000000 +0200
@@ -70,9 +70,9 @@
         c.argument('object_id', validator=validate_principal)
 
     with self.argument_context('keyvault set-policy', arg_group='Permission') 
as c:
-        c.argument('key_permissions', arg_type=get_enum_type(KeyPermissions), 
metavar='PERM', nargs='*', help='Space separated list of key permissions to 
assign.', validator=validate_policy_permissions)
-        c.argument('secret_permissions', 
arg_type=get_enum_type(SecretPermissions), metavar='PERM', nargs='*', 
help='Space separated list of secret permissions to assign.')
-        c.argument('certificate_permissions', 
arg_type=get_enum_type(CertificatePermissions), metavar='PERM', nargs='*', 
help='Space separated list of certificate permissions to assign.')
+        c.argument('key_permissions', arg_type=get_enum_type(KeyPermissions), 
metavar='PERM', nargs='*', help='Space-separated list of key permissions to 
assign.', validator=validate_policy_permissions)
+        c.argument('secret_permissions', 
arg_type=get_enum_type(SecretPermissions), metavar='PERM', nargs='*', 
help='Space-separated list of secret permissions to assign.')
+        c.argument('certificate_permissions', 
arg_type=get_enum_type(CertificatePermissions), metavar='PERM', nargs='*', 
help='Space-separated list of certificate permissions to assign.')
     # endregion
 
     # region Shared
@@ -84,7 +84,7 @@
 
     # region keys
     with self.argument_context('keyvault key') as c:
-        c.argument('key_ops', arg_type=get_enum_type(JsonWebKeyOperation), 
options_list=['--ops'], nargs='*', help='Space separated list of permitted JSON 
web key operations.')
+        c.argument('key_ops', arg_type=get_enum_type(JsonWebKeyOperation), 
options_list=['--ops'], nargs='*', help='Space-separated list of permitted JSON 
web key operations.')
         c.argument('key_version', options_list=['--version', '-v'], help='The 
key version. If omitted, uses the latest version.', default='', required=False, 
completer=get_keyvault_version_completion_list('key'))
 
     for scope in ['keyvault key create', 'keyvault key import']:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.0.17/azure_cli_keyvault.egg-info/PKG-INFO 
new/azure-cli-keyvault-2.0.21/azure_cli_keyvault.egg-info/PKG-INFO
--- old/azure-cli-keyvault-2.0.17/azure_cli_keyvault.egg-info/PKG-INFO  
2018-01-26 17:12:44.000000000 +0100
+++ new/azure-cli-keyvault-2.0.21/azure_cli_keyvault.egg-info/PKG-INFO  
2018-04-06 19:33:46.000000000 +0200
@@ -1,11 +1,12 @@
 Metadata-Version: 1.1
 Name: azure-cli-keyvault
-Version: 2.0.17
+Version: 2.0.21
 Summary: Microsoft Azure Command-Line Tools Keyvault Command Module
 Home-page: https://github.com/Azure/azure-cli
 Author: Microsoft Corporation
 Author-email: azpy...@microsoft.com
 License: MIT
+Description-Content-Type: UNKNOWN
 Description: Microsoft Azure CLI 'keyvault' Command Module
         =============================================
         
@@ -19,6 +20,22 @@
         
         Release History
         ===============
+        2.0.21
+        ++++++
+        * Minor fixes.
+        * `sdist` is now compatible with wheel 0.31.0
+        
+        2.0.20
+        ++++++
+        * Support Autorest 3.0 based SDKs
+        
+        2.0.19
+        ++++++
+        * Minor fixes.
+        
+        2.0.18
+        ++++++
+        * Minor fixes.
         
         2.0.17
         ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/setup.py 
new/azure-cli-keyvault-2.0.21/setup.py
--- old/azure-cli-keyvault-2.0.17/setup.py      2018-01-26 17:12:24.000000000 
+0100
+++ new/azure-cli-keyvault-2.0.21/setup.py      2018-04-06 19:33:13.000000000 
+0200
@@ -15,7 +15,7 @@
     logger.warn("Wheel is not available, disabling bdist_wheel hook")
     cmdclass = {}
 
-VERSION = "2.0.17"
+VERSION = "2.0.21"
 
 # The full list of classifiers is available at
 # https://pypi.python.org/pypi?%3Aaction=list_classifiers


Reply via email to