Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump azure-security-keyvault-secrets from 4.2.8 to 4.3.0 #21

Merged

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 21, 2021

Bumps azure-security-keyvault-secrets from 4.2.8 to 4.3.0.

Release notes

Sourced from azure-security-keyvault-secrets's releases.

azure-security-keyvault-secrets_4.3.0

4.3.0 (2021-06-17)

Features Added

  • Changed default service version to 7.2.
  • Added KeyVaultSecretIdentifier to parse secret URLs.

Changes since 4.3.0-beta.6

Bug Fixes

  • Ensured that RetryPolicy and HttpLogOptions use a default implementation when creating Key Vault clients if not set or set to null.

Breaking Changes

  • Removed service method overloads that take a pollingInterval, since PollerFlux and SyncPoller objects allow for setting this value directly on them.

Non-Breaking Changes

  • Renamed secretId to sourceId in KeyVaultSecretIdentifier.
  • KeyVaultSecretIdentifier can now be used to parse any Key Vault identifier.
  • Added the @ServiceMethod annotation to all public methods that call the Key Vault service in SecretClient and SecretAsyncClient.

azure-security-keyvault-keys_4.3.0

4.3.0 (2021-06-17)

Features Added

  • Changed default service version to 7.2.
  • Added KeyVaultKeyIdentifier to parse key URLs.
  • Added local-only support for CryptographyClient and CryptographyAsyncClient by providing a JsonWebKey during client creation.
  • Added KeyType.OCT-HSM to support oct-HSM key operations to support Managed HSM.
  • Added the CreateOctKeyOptions class and associated createOctKey() methods.
  • Added AES-GCM and AES-CBC support for encrypting and decrypting, including new Encrypt and Decrypt overloads.
  • Added the ability to set a public exponent on RSA keys during creation.
  • Made all getters for properties of a JsonWebKey public.

Changes since 4.3.0-beta.8

Bug Fixes

  • Ensured that RetryPolicy and HttpLogOptions use a default implementation when creating Key Vault clients if not set or set to null.

New Features

  • Added createOctKey() and createOctKeyWithResponse() to KeyClient and KeyAsyncClient.
  • Added factory methods for RSA algorithms in DecryptParameters and EncryptParameters:
    • createRsa15Parameters()
    • createRsaOaepParameters()
    • createRsaOaep256Parameters()

Breaking Changes

  • Removed EXPORT from the KeyOperation enum.
  • Re-ordered parameters in the EncryptResult constructor to show authenticationTag before additionalAuthenticatedData to align with classes like DecryptParameters.
  • Removed service method overloads that take a pollingInterval, since PollerFlux and SyncPoller objects allow for setting this value directly on them.
  • Moved EncryptParameters and DecryptParameters from the cryptography package to the cryptography.models package and made them both final.

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [azure-security-keyvault-secrets](https://github.com/Azure/azure-sdk-for-java) from 4.2.8 to 4.3.0.
- [Release notes](https://github.com/Azure/azure-sdk-for-java/releases)
- [Commits](Azure/azure-sdk-for-java@azure-security-keyvault-keys_4.2.8...azure-cosmos_4.3.0)

---
updated-dependencies:
- dependency-name: com.azure:azure-security-keyvault-secrets
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot requested a review from a team as a code owner June 21, 2021 09:04
@dependabot dependabot bot added dependencies A PR that updates dependencies - used by Release Drafter java Pull requests that update Java code labels Jun 21, 2021
@timja timja merged commit 71e3838 into master Jun 21, 2021
@timja timja deleted the dependabot/maven/com.azure-azure-security-keyvault-secrets-4.3.0 branch June 21, 2021 09:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies A PR that updates dependencies - used by Release Drafter java Pull requests that update Java code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant