Hello community,

here is the log from the commit of package azure-cli-keyvault for 
openSUSE:Factory checked in at 2019-05-22 11:00:35
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/azure-cli-keyvault (Old)
 and      /work/SRC/openSUSE:Factory/.azure-cli-keyvault.new.5148 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "azure-cli-keyvault"

Wed May 22 11:00:35 2019 rev:5 rq:696843 version:2.2.11

Changes:
--------
--- /work/SRC/openSUSE:Factory/azure-cli-keyvault/azure-cli-keyvault.changes    
2018-10-15 10:45:30.151258022 +0200
+++ 
/work/SRC/openSUSE:Factory/.azure-cli-keyvault.new.5148/azure-cli-keyvault.changes
  2019-05-22 11:00:37.274722886 +0200
@@ -1,0 +2,16 @@
+Tue Apr 16 15:05:33 UTC 2019 - John Paul Adrian Glaubitz 
<[email protected]>
+
+- New upstream release
+  + Version 2.2.11
+  + For detailed information about changes see the
+    HISTORY.txt file provided with this package
+- Bump minimum version for Python Azure SDK namespace
+  packages to 3.0.0 in BuildRequires and Requires
+- Remove python3-devel package from BuildRequires
+- Remove unzip package from BuildRequires
+- Run fdupes to hardlink duplicate files
+  + Add fdupes to BuildRequires
+  + Add %fdupes invocation to %install
+- Update Requires from setup.py
+
+-------------------------------------------------------------------

Old:
----
  azure-cli-keyvault-2.2.2.tar.gz

New:
----
  azure-cli-keyvault-2.2.11.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ azure-cli-keyvault.spec ++++++
--- /var/tmp/diff_new_pack.h1D9gW/_old  2019-05-22 11:00:38.118722151 +0200
+++ /var/tmp/diff_new_pack.h1D9gW/_new  2019-05-22 11:00:38.118722151 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package azure-cli-keyvault
 #
-# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
 
 
 Name:           azure-cli-keyvault
-Version:        2.2.2
+Version:        2.2.11
 Release:        0
 Summary:        Microsoft Azure CLI 'keyvault' Command Module
 License:        MIT
@@ -27,17 +27,16 @@
 Source1:        LICENSE.txt
 BuildRequires:  azure-cli-command-modules-nspkg
 BuildRequires:  azure-cli-nspkg
-BuildRequires:  python3-azure-nspkg
-BuildRequires:  python3-devel
+BuildRequires:  fdupes
+BuildRequires:  python3-azure-nspkg >= 3.0.0
 BuildRequires:  python3-setuptools
-BuildRequires:  unzip
 Requires:       azure-cli-command-modules-nspkg
 Requires:       azure-cli-core
 Requires:       azure-cli-nspkg
-Requires:       python3-azure-graphrbac >= 0.40.0
+Requires:       python3-azure-graphrbac >= 0.53.0
 Requires:       python3-azure-keyvault >= 1.1.0
 Requires:       python3-azure-mgmt-keyvault >= 1.1.0
-Requires:       python3-azure-nspkg
+Requires:       python3-azure-nspkg >= 3.0.0
 Requires:       python3-pyOpenSSL
 Conflicts:      azure-cli < 2.0.0
 
@@ -58,6 +57,7 @@
 
 %install
 python3 setup.py install --root=%{buildroot} --prefix=%{_prefix} 
--install-lib=%{python3_sitelib}
+%python_expand %fdupes %{buildroot}%{$python_sitelib}
 rm -rf %{buildroot}%{python3_sitelib}/azure/cli/command_modules/__init__.*
 rm -rf %{buildroot}%{python3_sitelib}/azure/cli/command_modules/__pycache__
 rm -rf %{buildroot}%{python3_sitelib}/azure/cli/__init__.*

++++++ azure-cli-keyvault-2.2.2.tar.gz -> azure-cli-keyvault-2.2.11.tar.gz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/azure-cli-keyvault-2.2.2/HISTORY.rst 
new/azure-cli-keyvault-2.2.11/HISTORY.rst
--- old/azure-cli-keyvault-2.2.2/HISTORY.rst    2018-08-09 08:34:43.000000000 
+0200
+++ new/azure-cli-keyvault-2.2.11/HISTORY.rst   2019-02-12 03:05:13.000000000 
+0100
@@ -2,6 +2,41 @@
 
 Release History
 ===============
+2.2.11
+++++++
+* keyvault secret backup: Fixes issue where some users received an 
'unexpected_keyword' error when using --id.
+
+2.2.10
+++++++
+* Minor fixes
+
+2.2.9
++++++
+* Minor fixes
+
+2.2.8
++++++
+* Minor fixes
+
+2.2.7
++++++
+* bug fix: do not drop legit exceptions 
+
+2.2.6
++++++
+* Minor changes
+
+2.2.5
++++++
+* Minor changes
+
+2.2.4
++++++
+* Restrict keyvault storage commmands to the latest API profile
+
+2.2.3
++++++
+* Fixed Key Vault key import for RSA keys
 
 2.2.2
 +++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/azure-cli-keyvault-2.2.2/PKG-INFO 
new/azure-cli-keyvault-2.2.11/PKG-INFO
--- old/azure-cli-keyvault-2.2.2/PKG-INFO       2018-08-09 08:36:46.000000000 
+0200
+++ new/azure-cli-keyvault-2.2.11/PKG-INFO      2019-02-12 03:05:39.000000000 
+0100
@@ -1,6 +1,6 @@
 Metadata-Version: 1.1
 Name: azure-cli-keyvault
-Version: 2.2.2
+Version: 2.2.11
 Summary: Microsoft Azure Command-Line Tools Keyvault Command Module
 Home-page: https://github.com/Azure/azure-cli
 Author: Microsoft Corporation
@@ -19,6 +19,41 @@
         
         Release History
         ===============
+        2.2.11
+        ++++++
+        * keyvault secret backup: Fixes issue where some users received an 
'unexpected_keyword' error when using --id.
+        
+        2.2.10
+        ++++++
+        * Minor fixes
+        
+        2.2.9
+        +++++
+        * Minor fixes
+        
+        2.2.8
+        +++++
+        * Minor fixes
+        
+        2.2.7
+        +++++
+        * bug fix: do not drop legit exceptions 
+        
+        2.2.6
+        +++++
+        * Minor changes
+        
+        2.2.5
+        +++++
+        * Minor changes
+        
+        2.2.4
+        +++++
+        * Restrict keyvault storage commmands to the latest API profile
+        
+        2.2.3
+        +++++
+        * Fixed Key Vault key import for RSA keys
         
         2.2.2
         +++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/_command_type.py
 
new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_command_type.py
--- 
old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/_command_type.py
    2018-08-09 08:34:43.000000000 +0200
+++ 
new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_command_type.py
   2019-02-12 03:05:13.000000000 +0100
@@ -44,6 +44,8 @@
                            'The vault may not exist or you may need to flush 
your DNS cache '
                            'and try again later.')
         raise CLIError(ex)
+    else:
+        raise CLIError(ex)
 
 
 class KeyVaultCommandGroup(AzCommandGroup):
@@ -93,6 +95,8 @@
             if client_arg_name in op_args:
                 client = client_factory(self.command_loader.cli_ctx, 
command_args)
                 command_args[client_arg_name] = client
+            if 'cmd' not in op_args:
+                command_args.pop('cmd')
             try:
                 result = op(**command_args)
                 # apply results transform if specified
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/_help.py 
new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_help.py
--- old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/_help.py    
2018-08-09 08:34:43.000000000 +0200
+++ new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_help.py   
2019-02-12 03:05:13.000000000 +0100
@@ -5,204 +5,210 @@
 # 
--------------------------------------------------------------------------------------------
 
 from knack.help_files import helps
-
+# pylint: disable=line-too-long, too-many-lines
 
 helps['keyvault'] = """
-    type: group
-    short-summary: Manage KeyVault keys, secrets, and certificates.
+type: group
+short-summary: Manage KeyVault keys, secrets, and certificates.
 """
 
-helps['keyvault create'] = """
-    type: command
-    short-summary: Create a key vault.
-    long-summary: Default permissions are created for the current user or 
service principal unless the `--no-self-perms` flag is specified.
+helps['keyvault certificate'] = """
+type: group
+short-summary: Manage certificates.
 """
 
-helps['keyvault delete'] = """
-    type: command
-    short-summary: Delete a key vault.
+helps['keyvault certificate contact'] = """
+type: group
+short-summary: Manage contacts for certificate management.
 """
 
-helps['keyvault list'] = """
-    type: command
-    short-summary: List key vaults.
-"""
+helps['keyvault certificate create'] = """
+type: command
+short-summary: Create a Key Vault certificate.
+long-summary: Certificates can be used as a secrets for provisioned virtual 
machines.
+examples:
+  - name: Create a self-signed certificate with the default policy and add it 
to a virtual machine.
+    text: |
+        az keyvault certificate create --vault-name vaultname -n cert1 \\
+          -p "$(az keyvault certificate get-default-policy)"
 
-helps['keyvault show'] = """
-    type: command
-    short-summary: Show details of a key vault.
-"""
+        secrets=$(az keyvault secret list-versions --vault-name vaultname \\
+          -n cert1 --query "[?attributes.enabled].id" -o tsv)
 
-helps['keyvault update'] = """
-    type: command
-    short-summary: Update the properties of a key vault.
-"""
+        vm_secrets=$(az vm secret format -s "$secrets")
 
-helps['keyvault recover'] = """
-    type: command
-    short-summary: Recover a key vault.
-    long-summary: Recovers a previously deleted key vault for which soft 
delete was enabled.
+        az vm create -g group-name -n vm-name --admin-username deploy  \\
+          --image debian --secrets "$vm_secrets"
 """
 
-helps['keyvault key'] = """
-    type: group
-    short-summary: Manage keys.
+helps['keyvault certificate download'] = """
+type: command
+short-summary: Download the public portion of a Key Vault certificate.
+long-summary: The certificate formatted as either PEM or DER. PEM is the 
default.
+examples:
+  - name: Download a certificate as PEM and check its fingerprint in openssl.
+    text: |
+        az keyvault certificate download --vault-name vault -n cert-name -f 
cert.pem && \\
+        openssl x509 -in cert.pem -inform PEM  -noout -sha1 -fingerprint
+  - name: Download a certificate as DER and check its fingerprint in openssl.
+    text: |
+        az keyvault certificate download --vault-name vault -n cert-name -f 
cert.crt -e DER && \\
+        openssl x509 -in cert.crt -inform DER  -noout -sha1 -fingerprint
 """
 
-helps['keyvault secret'] = """
-    type: group
-    short-summary: Manage secrets.
+helps['keyvault certificate get-default-policy'] = """
+type: command
+short-summary: Get the default policy for self-signed certificates.
+long-summary: |
+    This default policy can be used in conjunction with `az keyvault create` 
to create a self-signed certificate.
+    The default policy can also be used as a starting point to create 
derivative policies.
+
+    For more details, see: 
https://docs.microsoft.com/en-us/rest/api/keyvault/certificates-and-policies
+examples:
+  - name: Create a self-signed certificate with the default policy
+    text: |
+        az keyvault certificate create --vault-name vaultname -n cert1 \\
+          -p "$(az keyvault certificate get-default-policy)"
 """
 
-helps['keyvault certificate'] = """
-    type: group
-    short-summary: Manage certificates.
-"""
+helps['keyvault certificate import'] = """
+type: command
+short-summary: Import a certificate into KeyVault.
+long-summary: Certificates can also be used as a secrets in provisioned 
virtual machines.
+examples:
+  - name: Create a service principal with a certificate, add the certificate 
to Key Vault and provision a VM with that certificate.
+    text: |
+        service_principal=$(az ad sp create-for-rbac --create-cert)
 
-helps['keyvault storage'] = """
-    type: group
-    short-summary: Manage storage accounts.
-"""
+        cert_file=$(echo $service_principal | jq .fileWithCertAndPrivateKey -r)
 
-helps['keyvault storage add'] = """
-    type: command
-    examples:
-        - name: Create a storage account and setup a vault to manage its keys
-          text: |
-            $id = az storage account create -g resourcegroup -n storageacct 
--query id
-
-            # assign the Azure Key Vault service the "Storage Account Key 
Operator Service Role" role.
-            az role assignment create --role "Storage Account Key Operator 
Service Role" --scope $id \\
-            --assignee cfa8b339-82a2-471a-a3c9-0fc0be7a4093
+        az keyvault create -g my-group -n vaultname
 
-            az keyvault storage add --vault-name vault -n storageacct 
--active-key-name key1    \\
-            --auto-regenerate-key --regeneration-period P90D  --resource-id $id
-"""
+        az keyvault certificate import --vault-name vaultname -n cert_name -f 
cert_file
 
-helps['keyvault storage sas-definition'] = """
-    type: group
-    short-summary: Manage storage account SAS definitions.
-"""
+        secrets=$(az keyvault secret list-versions --vault-name vaultname \\
+          -n cert1 --query "[?attributes.enabled].id" -o tsv)
 
-helps['keyvault storage sas-definition create'] = """
-    type: command
-    examples:
-        - name: Add a sas-definition for an account sas-token
-          text: |
+        vm_secrets=$(az vm secret format -s "$secrets")
 
-            $sastoken = az storage account generate-sas --expiry 2020-01-01 
--permissions rw \\
-            --resource-types sco --services bfqt --https-only --account-name 
storageacct     \\
-            --account-key 00000000
+        az vm create -g group-name -n vm-name --admin-username deploy  \\
+          --image debian --secrets "$vm_secrets"
+"""
 
-            az keyvault storage sas-definition create --vault-name vault 
--account-name storageacct   \\
-            -n rwallserviceaccess --validity-period P2D --sas-type account 
--template-uri $sastoken
-        - name: Add a sas-definition for a blob sas-token
-          text: >
+helps['keyvault certificate issuer'] = """
+type: group
+short-summary: Manage certificate issuer information.
+"""
 
-            $sastoken = az storage blob generate-sas --account-name 
storageacct --account-key 00000000 \\
-            -c container1 -n blob1 --https-only --permissions rw
+helps['keyvault certificate issuer admin'] = """
+type: group
+short-summary: Manage admin information for certificate issuers.
+"""
 
-            $url = az storage blob url --account-name storageacct -c 
container1 -n blob1
+helps['keyvault certificate pending'] = """
+type: group
+short-summary: Manage pending certificate creation operations.
+"""
 
+helps['keyvault create'] = """
+type: command
+short-summary: Create a key vault.
+long-summary: Default permissions are created for the current user or service 
principal unless the `--no-self-perms` flag is specified.
+examples:
+  - name: Create a key vault. (autogenerated)
+    text: az keyvault create --name MyKeyVault --resource-group MyResourceGroup
+    crafted: true
+"""
 
-            az keyvault storage sas-definition create --vault-name vault 
--account-name storageacct   \\
-            -n rwblobaccess --validity-period P2D --sas-type service 
--template-uri $url?$sastoken
+helps['keyvault delete'] = """
+type: command
+short-summary: Delete a key vault.
 """
 
-helps['keyvault network-rule'] = """
-    type: group
-    short-summary: Manage vault network ACLs.
+helps['keyvault key'] = """
+type: group
+short-summary: Manage keys.
 """
 
-helps['keyvault certificate download'] = """
-    type: command
-    short-summary: Download the public portion of a Key Vault certificate.
-    long-summary: The certificate formatted as either PEM or DER. PEM is the 
default.
-    examples:
-        - name: Download a certificate as PEM and check its fingerprint in 
openssl.
-          text: |
-            az keyvault certificate download --vault-name vault -n cert-name 
-f cert.pem && \\
-            openssl x509 -in cert.pem -inform PEM  -noout -sha1 -fingerprint
-        - name: Download a certificate as DER and check its fingerprint in 
openssl.
-          text: |
-            az keyvault certificate download --vault-name vault -n cert-name 
-f cert.crt -e DER && \\
-            openssl x509 -in cert.crt -inform DER  -noout -sha1 -fingerprint
+helps['keyvault list'] = """
+type: command
+short-summary: List key vaults.
 """
 
-helps['keyvault certificate get-default-policy'] = """
-    type: command
-    short-summary: Get the default policy for self-signed certificates.
-    long-summary: |
-        This default policy can be used in conjunction with `az keyvault 
create` to create a self-signed certificate.
-        The default policy can also be used as a starting point to create 
derivative policies.
-
-        For more details, see: 
https://docs.microsoft.com/en-us/rest/api/keyvault/certificates-and-policies
-    examples:
-        - name: Create a self-signed certificate with the default policy
-          text: |
-            az keyvault certificate create --vault-name vaultname -n cert1 \\
-              -p "$(az keyvault certificate get-default-policy)"
+helps['keyvault network-rule'] = """
+type: group
+short-summary: Manage vault network ACLs.
 """
 
-helps['keyvault certificate create'] = """
-    type: command
-    short-summary: Create a Key Vault certificate.
-    long-summary: Certificates can be used as a secrets for provisioned 
virtual machines.
-    examples:
-        - name: Create a self-signed certificate with the default policy and 
add it to a virtual machine.
-          text: |
-            az keyvault certificate create --vault-name vaultname -n cert1 \\
-              -p "$(az keyvault certificate get-default-policy)"
+helps['keyvault recover'] = """
+type: command
+short-summary: Recover a key vault.
+long-summary: Recovers a previously deleted key vault for which soft delete 
was enabled.
+"""
 
-            secrets=$(az keyvault secret list-versions --vault-name vaultname 
\\
-              -n cert1 --query "[?attributes.enabled].id" -o tsv)
+helps['keyvault secret'] = """
+type: group
+short-summary: Manage secrets.
+"""
 
-            vm_secrets=$(az vm secret format -s "$secrets")
+helps['keyvault show'] = """
+type: command
+short-summary: Show details of a key vault.
+examples:
+  - name: Show details of a key vault. (autogenerated)
+    text: az keyvault show --name MyKeyVault
+    crafted: true
+"""
 
-            az vm create -g group-name -n vm-name --admin-username deploy  \\
-              --image debian --secrets "$vm_secrets"
+helps['keyvault storage'] = """
+type: group
+short-summary: Manage storage accounts.
 """
 
-helps['keyvault certificate import'] = """
-    type: command
-    short-summary: Import a certificate into KeyVault.
-    long-summary: Certificates can also be used as a secrets in provisioned 
virtual machines.
-    examples:
-        - name: Create a service principal with a certificate, add the 
certificate to Key Vault and provision a VM with that certificate.
-          text: |
-            service_principal=$(az ad sp create-for-rbac --create-cert)
+helps['keyvault storage add'] = """
+type: command
+examples:
+  - name: Create a storage account and setup a vault to manage its keys
+    text: |
+        $id = az storage account create -g resourcegroup -n storageacct 
--query id
+
+        # assign the Azure Key Vault service the "Storage Account Key Operator 
Service Role" role.
+        az role assignment create --role "Storage Account Key Operator Service 
Role" --scope $id \\
+        --assignee cfa8b339-82a2-471a-a3c9-0fc0be7a4093
 
-            cert_file=$(echo $service_principal | jq 
.fileWithCertAndPrivateKey -r)
+        az keyvault storage add --vault-name vault -n storageacct 
--active-key-name key1    \\
+        --auto-regenerate-key --regeneration-period P90D  --resource-id $id
+"""
 
-            az keyvault create -g my-group -n vaultname
+helps['keyvault storage sas-definition'] = """
+type: group
+short-summary: Manage storage account SAS definitions.
+"""
 
-            az keyvault certificate import --vault-name vaultname -n cert_file
+helps['keyvault storage sas-definition create'] = """
+type: command
+examples:
+  - name: Add a sas-definition for an account sas-token
+    text: |4
 
-            secrets=$(az keyvault secret list-versions --vault-name vaultname 
\\
-              -n cert1 --query "[?attributes.enabled].id" -o tsv)
+        $sastoken = az storage account generate-sas --expiry 2020-01-01 
--permissions rw \\
+        --resource-types sco --services bfqt --https-only --account-name 
storageacct     \\
+        --account-key 00000000
 
-            vm_secrets=$(az vm secret format -s "$secrets")
+        az keyvault storage sas-definition create --vault-name vault 
--account-name storageacct   \\
+        -n rwallserviceaccess --validity-period P2D --sas-type account 
--template-uri $sastoken
+  - name: Add a sas-definition for a blob sas-token
+    text: >4
 
-            az vm create -g group-name -n vm-name --admin-username deploy  \\
-              --image debian --secrets "$vm_secrets"
-"""
+        $sastoken = az storage blob generate-sas --account-name storageacct 
--account-key 00000000 \\ -c container1 -n blob1 --https-only --permissions rw
 
-helps['keyvault certificate pending'] = """
-    type: group
-    short-summary: Manage pending certificate creation operations.
-"""
+        $url = az storage blob url --account-name storageacct -c container1 -n 
blob1
 
-helps['keyvault certificate contact'] = """
-    type: group
-    short-summary: Manage contacts for certificate management.
-"""
 
-helps['keyvault certificate issuer'] = """
-    type: group
-    short-summary: Manage certificate issuer information.
+        az keyvault storage sas-definition create --vault-name vault 
--account-name storageacct   \\ -n rwblobaccess --validity-period P2D 
--sas-type service --template-uri $url?$sastoken
 """
 
-helps['keyvault certificate issuer admin'] = """
-    type: group
-    short-summary: Manage admin information for certificate issuers.
+helps['keyvault update'] = """
+type: command
+short-summary: Update the properties of a key vault.
 """
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/_params.py 
new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_params.py
--- old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/_params.py  
2018-08-09 08:34:43.000000000 +0200
+++ new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_params.py 
2019-02-12 03:05:13.000000000 +0100
@@ -13,7 +13,7 @@
     get_resource_name_completion_list, resource_group_name_type, tags_type, 
file_type, get_three_state_flag,
     get_enum_type)
 from azure.cli.core.util import get_json_object
-from azure.cli.core.profiles import ResourceType, get_sdk
+from azure.cli.core.profiles import ResourceType
 
 from ._completers import (
     get_keyvault_name_completion_list, get_keyvault_version_completion_list)
@@ -34,22 +34,17 @@
 
 # pylint: disable=too-many-locals, too-many-branches, too-many-statements, 
line-too-long
 def load_arguments(self, _):
-    JsonWebKeyOperation = get_sdk(self.cli_ctx, ResourceType.DATA_KEYVAULT, 
'models.key_vault_client_enums#JsonWebKeyOperation')
-    KeyAttributes = get_sdk(self.cli_ctx, ResourceType.DATA_KEYVAULT, 
'models.key_attributes#KeyAttributes')
-    JsonWebKeyType = get_sdk(self.cli_ctx, ResourceType.DATA_KEYVAULT, 
'models.key_vault_client_enums#JsonWebKeyType')
-    JsonWebKeyCurveName = get_sdk(self.cli_ctx, ResourceType.DATA_KEYVAULT, 
'models.key_vault_client_enums#JsonWebKeyCurveName')
-    SasTokenType = get_sdk(self.cli_ctx, ResourceType.DATA_KEYVAULT, 
'models.key_vault_client_enums#SasTokenType')
-    SasDefinitionAttributes = get_sdk(self.cli_ctx, 
ResourceType.DATA_KEYVAULT, 
'models.sas_definition_attributes#SasDefinitionAttributes')
-    SecretAttributes = get_sdk(self.cli_ctx, ResourceType.DATA_KEYVAULT, 
'models.secret_attributes#SecretAttributes')
-    CertificateAttributes = get_sdk(self.cli_ctx, ResourceType.DATA_KEYVAULT, 
'models.certificate_attributes#CertificateAttributes')
-    StorageAccountAttributes = get_sdk(self.cli_ctx, 
ResourceType.DATA_KEYVAULT, 
'models.storage_account_attributes#StorageAccountAttributes')
-    SkuName = get_sdk(self.cli_ctx, ResourceType.MGMT_KEYVAULT, 
'models.key_vault_management_client_enums#SkuName')
-    KeyPermissions = get_sdk(self.cli_ctx, ResourceType.MGMT_KEYVAULT, 
'models.key_vault_management_client_enums#KeyPermissions')
-    SecretPermissions = get_sdk(self.cli_ctx, ResourceType.MGMT_KEYVAULT, 
'models.key_vault_management_client_enums#SecretPermissions')
-    CertificatePermissions = get_sdk(self.cli_ctx, ResourceType.MGMT_KEYVAULT, 
'models.key_vault_management_client_enums#CertificatePermissions')
-    StoragePermissions = get_sdk(self.cli_ctx, ResourceType.MGMT_KEYVAULT, 
'models.key_vault_management_client_enums#StoragePermissions')
-    NetworkRuleBypassOptions = get_sdk(self.cli_ctx, 
ResourceType.MGMT_KEYVAULT, 
'models.key_vault_management_client_enums#NetworkRuleBypassOptions')
-    NetworkRuleAction = get_sdk(self.cli_ctx, ResourceType.MGMT_KEYVAULT, 
'models.key_vault_management_client_enums#NetworkRuleAction')
+    (JsonWebKeyOperation, KeyAttributes, JsonWebKeyType, JsonWebKeyCurveName, 
SasTokenType,
+     SasDefinitionAttributes, SecretAttributes, CertificateAttributes, 
StorageAccountAttributes) = self.get_models(
+         'JsonWebKeyOperation', 'KeyAttributes', 'JsonWebKeyType', 
'JsonWebKeyCurveName', 'SasTokenType',
+         'SasDefinitionAttributes', 'SecretAttributes', 
'CertificateAttributes', 'StorageAccountAttributes',
+         resource_type=ResourceType.DATA_KEYVAULT)
+
+    (SkuName, KeyPermissions, SecretPermissions, CertificatePermissions, 
StoragePermissions,
+     NetworkRuleBypassOptions, NetworkRuleAction) = self.get_models(
+         'SkuName', 'KeyPermissions', 'SecretPermissions', 
'CertificatePermissions', 'StoragePermissions',
+         'NetworkRuleBypassOptions', 'NetworkRuleAction')
+
     # ARGUMENT DEFINITIONS
     vault_name_type = CLIArgumentType(
         help='Name of the key vault.', options_list=['--vault-name'], 
metavar='NAME', id_part=None,
@@ -107,7 +102,10 @@
 
         for cmd in ['backup', 'delete', 'download', 'set-attributes', 'show']:
             with self.argument_context('keyvault {} {}'.format(item, cmd), 
arg_group='Id') as c:
-                c.extra('identifier', options_list=['--id'], help='Id of the 
{}.  If specified all other \'Id\' arguments should be omitted.'.format(item), 
validator=validate_vault_id(item))
+                try:
+                    c.extra('identifier', options_list=['--id'], help='Id of 
the {}.  If specified all other \'Id\' arguments should be 
omitted.'.format(item), validator=validate_vault_id(item))
+                except ValueError:
+                    pass
                 c.argument(item + '_name', help='Name of the {}. Required if 
--id is not specified.'.format(item), required=False)
                 c.argument('vault_base_url', help='Name of the key vault. 
Required if --id is not specified.', required=False)
                 c.argument(item + '_version', required=False)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/_validators.py 
new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_validators.py
--- 
old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/_validators.py  
    2018-08-09 08:34:43.000000000 +0200
+++ 
new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/_validators.py 
    2019-02-12 03:05:13.000000000 +0100
@@ -257,7 +257,8 @@
             ident = KeyVaultIdentifier(uri=identifier, collection=entity_type 
+ 's')
             setattr(ns, entity_type + '_name', ident.name)
             setattr(ns, 'vault_base_url', ident.vault)
-            setattr(ns, entity_type + '_version', ident.version)
+            if hasattr(ns, entity_type + '_version'):
+                setattr(ns, entity_type + '_version', ident.version)
         elif not (name and vault):
             raise CLIError('incorrect usage: --id ID | --vault-name VAULT 
--name NAME [--version VERSION]')
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/commands.py 
new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/commands.py
--- old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/commands.py 
2018-08-09 08:34:43.000000000 +0200
+++ 
new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/commands.py    
    2019-02-12 03:05:13.000000000 +0100
@@ -134,14 +134,14 @@
         g.keyvault_custom('add', 'add_certificate_issuer_admin')
         g.keyvault_custom('delete', 'delete_certificate_issuer_admin')
 
-    with self.command_group('keyvault storage', kv_data_sdk) as g:
-        g.keyvault_command('add', 'set_storage_account')
-        g.keyvault_command('list', 'get_storage_accounts')
-        g.keyvault_command('show', 'get_storage_account')
-        g.keyvault_command('update', 'update_storage_account')
-        g.keyvault_command('remove', 'delete_storage_account')
-        g.keyvault_command('regenerate-key', 'regenerate_storage_account_key')
-        if data_api_version != '2016_10_01':
+    if data_api_version != '2016_10_01':
+        with self.command_group('keyvault storage', kv_data_sdk) as g:
+            g.keyvault_command('add', 'set_storage_account')
+            g.keyvault_command('list', 'get_storage_accounts')
+            g.keyvault_command('show', 'get_storage_account')
+            g.keyvault_command('update', 'update_storage_account')
+            g.keyvault_command('remove', 'delete_storage_account')
+            g.keyvault_command('regenerate-key', 
'regenerate_storage_account_key')
             g.keyvault_command('list-deleted', 'get_deleted_storage_accounts')
             g.keyvault_command('show-deleted', 'get_deleted_storage_account')
             g.keyvault_command('purge', 'purge_deleted_storage_account')
@@ -153,17 +153,17 @@
                               'restore_storage_account',
                               
doc_string_source=data_doc_string.format('restore_storage_account'))
 
-    with self.command_group('keyvault storage sas-definition', kv_data_sdk) as 
g:
-        g.keyvault_command('create',
-                           'set_sas_definition',
-                           
doc_string_source=data_doc_string.format('set_sas_definition'))
-        g.keyvault_command('list', 'get_sas_definitions')
-        g.keyvault_command('show', 'get_sas_definition')
-        g.keyvault_command('update',
-                           'update_sas_definition',
-                           
doc_string_source=data_doc_string.format('update_sas_definition'))
-        g.keyvault_command('delete', 'delete_sas_definition')
-        if data_api_version != '2016_10_01':
+    if data_api_version != '2016_10_01':
+        with self.command_group('keyvault storage sas-definition', 
kv_data_sdk) as g:
+            g.keyvault_command('create',
+                               'set_sas_definition',
+                               
doc_string_source=data_doc_string.format('set_sas_definition'))
+            g.keyvault_command('list', 'get_sas_definitions')
+            g.keyvault_command('show', 'get_sas_definition')
+            g.keyvault_command('update',
+                               'update_sas_definition',
+                               
doc_string_source=data_doc_string.format('update_sas_definition'))
+            g.keyvault_command('delete', 'delete_sas_definition')
             g.keyvault_command('list-deleted', 'get_deleted_sas_definitions')
             g.keyvault_command('show-deleted', 'get_deleted_sas_definition')
             g.keyvault_command('recover', 'recover_deleted_sas_definition')
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/custom.py 
new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/custom.py
--- old/azure-cli-keyvault-2.2.2/azure/cli/command_modules/keyvault/custom.py   
2018-08-09 08:34:43.000000000 +0200
+++ new/azure-cli-keyvault-2.2.11/azure/cli/command_modules/keyvault/custom.py  
2019-02-12 03:05:13.000000000 +0100
@@ -161,7 +161,7 @@
 def _get_current_user_object_id(graph_client):
     from msrestazure.azure_exceptions import CloudError
     try:
-        current_user = graph_client.objects.get_current_user()
+        current_user = graph_client.signed_in_user.get()
         if current_user and current_user.object_id:  # pylint:disable=no-member
             return current_user.object_id  # pylint:disable=no-member
     except CloudError:
@@ -621,14 +621,15 @@
         return codecs.decode(h, 'hex')
 
     def _private_rsa_key_to_jwk(rsa_key, jwk):
-        jwk.n = _int_to_bytes(rsa_key.private_numbers().public_numbers.n)
-        jwk.e = _int_to_bytes(rsa_key.private_numbers().public_numbers.e)
-        jwk.q = _int_to_bytes(rsa_key.private_numbers().q)
-        jwk.p = _int_to_bytes(rsa_key.private_numbers().p)
-        jwk.d = _int_to_bytes(rsa_key.private_numbers().d)
-        jwk.dq = _int_to_bytes(rsa_key.private_numbers().dmql)
-        jwk.dp = _int_to_bytes(rsa_key.private_numbers().dmpl)
-        jwk.qi = _int_to_bytes(rsa_key.private_numbers().iqmp)
+        priv = rsa_key.private_numbers()
+        jwk.n = _int_to_bytes(priv.public_numbers.n)
+        jwk.e = _int_to_bytes(priv.public_numbers.e)
+        jwk.q = _int_to_bytes(priv.q)
+        jwk.p = _int_to_bytes(priv.p)
+        jwk.d = _int_to_bytes(priv.d)
+        jwk.dq = _int_to_bytes(priv.dmq1)
+        jwk.dp = _int_to_bytes(priv.dmp1)
+        jwk.qi = _int_to_bytes(priv.iqmp)
 
     def _private_ec_key_to_jwk(ec_key, jwk):
         supported_curves = {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.2.2/azure_cli_keyvault.egg-info/PKG-INFO 
new/azure-cli-keyvault-2.2.11/azure_cli_keyvault.egg-info/PKG-INFO
--- old/azure-cli-keyvault-2.2.2/azure_cli_keyvault.egg-info/PKG-INFO   
2018-08-09 08:36:46.000000000 +0200
+++ new/azure-cli-keyvault-2.2.11/azure_cli_keyvault.egg-info/PKG-INFO  
2019-02-12 03:05:39.000000000 +0100
@@ -1,6 +1,6 @@
 Metadata-Version: 1.1
 Name: azure-cli-keyvault
-Version: 2.2.2
+Version: 2.2.11
 Summary: Microsoft Azure Command-Line Tools Keyvault Command Module
 Home-page: https://github.com/Azure/azure-cli
 Author: Microsoft Corporation
@@ -19,6 +19,41 @@
         
         Release History
         ===============
+        2.2.11
+        ++++++
+        * keyvault secret backup: Fixes issue where some users received an 
'unexpected_keyword' error when using --id.
+        
+        2.2.10
+        ++++++
+        * Minor fixes
+        
+        2.2.9
+        +++++
+        * Minor fixes
+        
+        2.2.8
+        +++++
+        * Minor fixes
+        
+        2.2.7
+        +++++
+        * bug fix: do not drop legit exceptions 
+        
+        2.2.6
+        +++++
+        * Minor changes
+        
+        2.2.5
+        +++++
+        * Minor changes
+        
+        2.2.4
+        +++++
+        * Restrict keyvault storage commmands to the latest API profile
+        
+        2.2.3
+        +++++
+        * Fixed Key Vault key import for RSA keys
         
         2.2.2
         +++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/azure-cli-keyvault-2.2.2/azure_cli_keyvault.egg-info/requires.txt 
new/azure-cli-keyvault-2.2.11/azure_cli_keyvault.egg-info/requires.txt
--- old/azure-cli-keyvault-2.2.2/azure_cli_keyvault.egg-info/requires.txt       
2018-08-09 08:36:46.000000000 +0200
+++ new/azure-cli-keyvault-2.2.11/azure_cli_keyvault.egg-info/requires.txt      
2019-02-12 03:05:39.000000000 +0100
@@ -1,5 +1,5 @@
 azure-mgmt-keyvault==1.1.0
 azure-keyvault==1.1.0
-azure-graphrbac==0.40.0
+azure-graphrbac==0.53.0
 azure-cli-core
 pyOpenSSL
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/azure-cli-keyvault-2.2.2/setup.py 
new/azure-cli-keyvault-2.2.11/setup.py
--- old/azure-cli-keyvault-2.2.2/setup.py       2018-08-09 08:34:43.000000000 
+0200
+++ new/azure-cli-keyvault-2.2.11/setup.py      2019-02-12 03:05:13.000000000 
+0100
@@ -15,7 +15,7 @@
     logger.warn("Wheel is not available, disabling bdist_wheel hook")
     cmdclass = {}
 
-VERSION = "2.2.2"
+VERSION = "2.2.11"
 
 # The full list of classifiers is available at
 # https://pypi.python.org/pypi?%3Aaction=list_classifiers
@@ -36,7 +36,7 @@
 DEPENDENCIES = [
     'azure-mgmt-keyvault==1.1.0',
     'azure-keyvault==1.1.0',
-    'azure-graphrbac==0.40.0',
+    'azure-graphrbac==0.53.0',
     'azure-cli-core',
     'pyOpenSSL'
 ]


Reply via email to