Hello community, here is the log from the commit of package azure-cli-keyvault for openSUSE:Factory checked in at 2018-05-13 16:02:36 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/azure-cli-keyvault (Old) and /work/SRC/openSUSE:Factory/.azure-cli-keyvault.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "azure-cli-keyvault" Sun May 13 16:02:36 2018 rev:3 rq:600056 version:2.0.21 Changes: -------- --- /work/SRC/openSUSE:Factory/azure-cli-keyvault/azure-cli-keyvault.changes 2018-02-14 09:31:24.275952698 +0100 +++ /work/SRC/openSUSE:Factory/.azure-cli-keyvault.new/azure-cli-keyvault.changes 2018-05-13 16:02:39.207610829 +0200 @@ -1,0 +2,8 @@ +Thu Apr 19 09:37:05 UTC 2018 - adrian.glaub...@suse.com + +- New upstream release + + Version 2.0.21 +- Move LICENSE.txt from %doc to %license section +- Update Requires from setup.py + +------------------------------------------------------------------- Old: ---- azure-cli-keyvault-2.0.17.tar.gz New: ---- azure-cli-keyvault-2.0.21.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ azure-cli-keyvault.spec ++++++ --- /var/tmp/diff_new_pack.7fyJE0/_old 2018-05-13 16:02:40.051580037 +0200 +++ /var/tmp/diff_new_pack.7fyJE0/_new 2018-05-13 16:02:40.051580037 +0200 @@ -17,7 +17,7 @@ Name: azure-cli-keyvault -Version: 2.0.17 +Version: 2.0.21 Release: 0 Summary: Microsoft Azure CLI 'keyvault' Command Module License: MIT @@ -37,6 +37,7 @@ Requires: python3-azure-keyvault >= 0.3.7 Requires: python3-azure-mgmt-keyvault >= 0.40.0 Requires: python3-azure-nspkg +Requires: python3-pyOpenSSL Conflicts: azure-cli < 2.0.0 BuildArch: noarch @@ -65,7 +66,8 @@ %files %defattr(-,root,root,-) -%doc HISTORY.rst LICENSE.txt README.rst +%doc HISTORY.rst README.rst +%license LICENSE.txt %{python3_sitelib}/azure/cli/command_modules/keyvault %{python3_sitelib}/azure_cli_keyvault-*.egg-info ++++++ azure-cli-keyvault-2.0.17.tar.gz -> azure-cli-keyvault-2.0.21.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/HISTORY.rst new/azure-cli-keyvault-2.0.21/HISTORY.rst --- old/azure-cli-keyvault-2.0.17/HISTORY.rst 2018-01-26 17:12:24.000000000 +0100 +++ new/azure-cli-keyvault-2.0.21/HISTORY.rst 2018-04-06 19:33:13.000000000 +0200 @@ -2,6 +2,22 @@ Release History =============== +2.0.21 +++++++ +* Minor fixes. +* `sdist` is now compatible with wheel 0.31.0 + +2.0.20 +++++++ +* Support Autorest 3.0 based SDKs + +2.0.19 +++++++ +* Minor fixes. + +2.0.18 +++++++ +* Minor fixes. 2.0.17 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/PKG-INFO new/azure-cli-keyvault-2.0.21/PKG-INFO --- old/azure-cli-keyvault-2.0.17/PKG-INFO 2018-01-26 17:12:44.000000000 +0100 +++ new/azure-cli-keyvault-2.0.21/PKG-INFO 2018-04-06 19:33:46.000000000 +0200 @@ -1,11 +1,12 @@ Metadata-Version: 1.1 Name: azure-cli-keyvault -Version: 2.0.17 +Version: 2.0.21 Summary: Microsoft Azure Command-Line Tools Keyvault Command Module Home-page: https://github.com/Azure/azure-cli Author: Microsoft Corporation Author-email: azpy...@microsoft.com License: MIT +Description-Content-Type: UNKNOWN Description: Microsoft Azure CLI 'keyvault' Command Module ============================================= @@ -19,6 +20,22 @@ Release History =============== + 2.0.21 + ++++++ + * Minor fixes. + * `sdist` is now compatible with wheel 0.31.0 + + 2.0.20 + ++++++ + * Support Autorest 3.0 based SDKs + + 2.0.19 + ++++++ + * Minor fixes. + + 2.0.18 + ++++++ + * Minor fixes. 2.0.17 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_command_type.py new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_command_type.py --- old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_command_type.py 2018-01-26 17:12:24.000000000 +0100 +++ new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_command_type.py 2018-04-06 19:33:13.000000000 +0200 @@ -78,8 +78,9 @@ def keyvault_command_handler(command_args): from azure.cli.core.util import get_arg_list + from azure.cli.core.commands.client_factory import resolve_client_arg_name from msrest.paging import Paged - from msrestazure.azure_operation import AzureOperationPoller + from azure.cli.core.util import poller_classes op = get_op_handler() op_args = get_arg_list(op) @@ -87,7 +88,7 @@ client_factory = command_type.settings.get('client_factory', None) if command_type \ else merged_kwargs.get('client_factory', None) - client_arg_name = 'client' if operations_tmpl.startswith(('azure.cli', 'azext')) else 'self' + client_arg_name = resolve_client_arg_name(operations_tmpl.format(method_name), kwargs) if client_arg_name in op_args: client = client_factory(self.command_loader.cli_ctx, command_args) command_args[client_arg_name] = client @@ -99,7 +100,7 @@ return _encode_hex(transform_result(result)) # otherwise handle based on return type of results - if isinstance(result, AzureOperationPoller): + if isinstance(result, poller_classes()): return _encode_hex( LongRunningOperation(self.command_loader.cli_ctx, 'Starting {}'.format(name))(result)) elif isinstance(result, Paged): diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_help.py new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_help.py --- old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_help.py 2018-01-26 17:12:24.000000000 +0100 +++ new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_help.py 2018-04-06 19:33:13.000000000 +0200 @@ -101,7 +101,7 @@ secrets=$(az keyvault secret list-versions --vault-name vaultname \\ -n cert1 --query "[?attributes.enabled].id" -o tsv) - vm_secrets=$(az vm format-secret -s "$secrets") \n + vm_secrets=$(az vm secret format -s "$secrets") \n az vm create -g group-name -n vm-name --admin-username deploy \\ --image debian --secrets "$vm_secrets" @@ -125,7 +125,7 @@ secrets=$(az keyvault secret list-versions --vault-name vaultname \\ -n cert1 --query "[?attributes.enabled].id" -o tsv) - vm_secrets=$(az vm format-secret -s "$secrets") \n + vm_secrets=$(az vm secret format -s "$secrets") \n az vm create -g group-name -n vm-name --admin-username deploy \\ --image debian --secrets "$vm_secrets" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_params.py new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_params.py --- old/azure-cli-keyvault-2.0.17/azure/cli/command_modules/keyvault/_params.py 2018-01-26 17:12:24.000000000 +0100 +++ new/azure-cli-keyvault-2.0.21/azure/cli/command_modules/keyvault/_params.py 2018-04-06 19:33:13.000000000 +0200 @@ -70,9 +70,9 @@ c.argument('object_id', validator=validate_principal) with self.argument_context('keyvault set-policy', arg_group='Permission') as c: - c.argument('key_permissions', arg_type=get_enum_type(KeyPermissions), metavar='PERM', nargs='*', help='Space separated list of key permissions to assign.', validator=validate_policy_permissions) - c.argument('secret_permissions', arg_type=get_enum_type(SecretPermissions), metavar='PERM', nargs='*', help='Space separated list of secret permissions to assign.') - c.argument('certificate_permissions', arg_type=get_enum_type(CertificatePermissions), metavar='PERM', nargs='*', help='Space separated list of certificate permissions to assign.') + c.argument('key_permissions', arg_type=get_enum_type(KeyPermissions), metavar='PERM', nargs='*', help='Space-separated list of key permissions to assign.', validator=validate_policy_permissions) + c.argument('secret_permissions', arg_type=get_enum_type(SecretPermissions), metavar='PERM', nargs='*', help='Space-separated list of secret permissions to assign.') + c.argument('certificate_permissions', arg_type=get_enum_type(CertificatePermissions), metavar='PERM', nargs='*', help='Space-separated list of certificate permissions to assign.') # endregion # region Shared @@ -84,7 +84,7 @@ # region keys with self.argument_context('keyvault key') as c: - c.argument('key_ops', arg_type=get_enum_type(JsonWebKeyOperation), options_list=['--ops'], nargs='*', help='Space separated list of permitted JSON web key operations.') + c.argument('key_ops', arg_type=get_enum_type(JsonWebKeyOperation), options_list=['--ops'], nargs='*', help='Space-separated list of permitted JSON web key operations.') c.argument('key_version', options_list=['--version', '-v'], help='The key version. If omitted, uses the latest version.', default='', required=False, completer=get_keyvault_version_completion_list('key')) for scope in ['keyvault key create', 'keyvault key import']: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/azure_cli_keyvault.egg-info/PKG-INFO new/azure-cli-keyvault-2.0.21/azure_cli_keyvault.egg-info/PKG-INFO --- old/azure-cli-keyvault-2.0.17/azure_cli_keyvault.egg-info/PKG-INFO 2018-01-26 17:12:44.000000000 +0100 +++ new/azure-cli-keyvault-2.0.21/azure_cli_keyvault.egg-info/PKG-INFO 2018-04-06 19:33:46.000000000 +0200 @@ -1,11 +1,12 @@ Metadata-Version: 1.1 Name: azure-cli-keyvault -Version: 2.0.17 +Version: 2.0.21 Summary: Microsoft Azure Command-Line Tools Keyvault Command Module Home-page: https://github.com/Azure/azure-cli Author: Microsoft Corporation Author-email: azpy...@microsoft.com License: MIT +Description-Content-Type: UNKNOWN Description: Microsoft Azure CLI 'keyvault' Command Module ============================================= @@ -19,6 +20,22 @@ Release History =============== + 2.0.21 + ++++++ + * Minor fixes. + * `sdist` is now compatible with wheel 0.31.0 + + 2.0.20 + ++++++ + * Support Autorest 3.0 based SDKs + + 2.0.19 + ++++++ + * Minor fixes. + + 2.0.18 + ++++++ + * Minor fixes. 2.0.17 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/azure-cli-keyvault-2.0.17/setup.py new/azure-cli-keyvault-2.0.21/setup.py --- old/azure-cli-keyvault-2.0.17/setup.py 2018-01-26 17:12:24.000000000 +0100 +++ new/azure-cli-keyvault-2.0.21/setup.py 2018-04-06 19:33:13.000000000 +0200 @@ -15,7 +15,7 @@ logger.warn("Wheel is not available, disabling bdist_wheel hook") cmdclass = {} -VERSION = "2.0.17" +VERSION = "2.0.21" # The full list of classifiers is available at # https://pypi.python.org/pypi?%3Aaction=list_classifiers