From b0f96187f65b455bc514a11acf70bbd2e120d574 Mon Sep 17 00:00:00 2001 From: Mariana Rios Flores Date: Mon, 15 Jul 2019 09:30:29 -0700 Subject: [PATCH] key docs update' --- sdk/keyvault/Azure.Security.KeyVault.Keys/Readme.md | 6 +++--- .../tests/SecretClientLiveTests.cs | 2 ++ 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/sdk/keyvault/Azure.Security.KeyVault.Keys/Readme.md b/sdk/keyvault/Azure.Security.KeyVault.Keys/Readme.md index 0ab9f0b27a44f..b593da18a5e94 100644 --- a/sdk/keyvault/Azure.Security.KeyVault.Keys/Readme.md +++ b/sdk/keyvault/Azure.Security.KeyVault.Keys/Readme.md @@ -55,10 +55,10 @@ $Env:AZURE_TENANT_ID="tenant-ID" * Grant the above mentioned application authorization to perform key operations on the key vault: ```PowerShell - az keyvault set-policy --name --spn $AZURE_CLIENT_ID --key-permissions backup delete get list set + az keyvault set-policy --name --spn $AZURE_CLIENT_ID --key-permissions backup delete get list create ``` > --key-permissions: - > Accepted values: backup, delete, get, list, purge, recover, restore, set + > Accepted values: backup, create, decrypt, delete, encrypt, get, import, list, purge, recover, restore, sign, unwrapKey, update, verify, wrapKey * Use the above mentioned Key Vault name to retrieve details of your Vault which also contains your Key Vault URL: ```PowerShell @@ -148,7 +148,7 @@ Key key = client.CreateKey("key-name", KeyType.EllipticCurve); // You can specify additional application-specific metadata in the form of tags. key.Tags["foo"] = "updated tag"; -KeyBase updatedKey = client.UpdateKey(key); +KeyBase updatedKey = client.UpdateKey(key, key.KeyMaterial.KeyOps); Console.WriteLine(updatedKey.Name); Console.WriteLine(updatedKey.Version); diff --git a/sdk/keyvault/Azure.Security.KeyVault.Secrets/tests/SecretClientLiveTests.cs b/sdk/keyvault/Azure.Security.KeyVault.Secrets/tests/SecretClientLiveTests.cs index 9f11523442359..3a8948aee2fe7 100644 --- a/sdk/keyvault/Azure.Security.KeyVault.Secrets/tests/SecretClientLiveTests.cs +++ b/sdk/keyvault/Azure.Security.KeyVault.Secrets/tests/SecretClientLiveTests.cs @@ -230,6 +230,8 @@ public async Task DeleteSecret() DeletedSecret deletedSecret = await Client.DeleteAsync(secretName); AssertSecretsEqual(secret, deletedSecret); + Assert.NotNull(deletedSecret.DeletedDate); + Assert.NotNull(deletedSecret.ScheduledPurgeDate); Assert.ThrowsAsync(() => Client.GetAsync(secretName)); }