Skip to content

[AutoPR azure-security-keyvault-secrets]-generated-from-SDK Generation - Java-6031743#48467

Open
azure-sdk wants to merge 8 commits intomainfrom
sdkauto/azure-security-keyvault-secrets-6031743
Open

[AutoPR azure-security-keyvault-secrets]-generated-from-SDK Generation - Java-6031743#48467
azure-sdk wants to merge 8 commits intomainfrom
sdkauto/azure-security-keyvault-secrets-6031743

Conversation

@azure-sdk
Copy link
Collaborator

Configurations: 'specification/keyvault/data-plane/Secrets/tspconfig.yaml', API Version: 2025-07-01, SDK Release Type: stable, and CommitSHA: 'f6bd06be22baf3a18504ffef0f590230850953e5' in SpecRepo: 'https://github.com/Azure/azure-rest-api-specs' Pipeline run: https://dev.azure.com/azure-sdk/internal/_build/results?buildId=6031743 Refer to https://eng.ms/docs/products/azure-developer-experience/develop/sdk-release/sdk-release-prerequisites to prepare for SDK release.

… version, fix tsp-location.yaml

- Restore NullPointerException bug fix dropped by auto-generation in CHANGELOG
- Document new features: previousVersion field, outContentType parameter
- Add V2025_06_01_PREVIEW and V2025_07_01 to SecretServiceVersion enum
- Update getLatest() to return V2025_07_01
- Remove trailing whitespace from additionalDirectories in tsp-location.yaml
@github-actions
Copy link
Contributor

github-actions bot commented Mar 19, 2026

API Change Check

APIView identified API level changes in this PR and created the following API reviews

com.azure:azure-security-keyvault-secrets

The PR's TypeSpec-generated code correctly removes the Accept header from
purgeDeletedSecret (void/204 operation), but existing test recordings
include Accept in purge requests. Adding Accept to the excluded headers
list allows playback tests to work with both old recordings (that have
Accept) and new code (that doesn't send it).
@rohitsinghal4u rohitsinghal4u marked this pull request as ready for review March 19, 2026 23:41
@rohitsinghal4u rohitsinghal4u requested review from a team as code owners March 19, 2026 23:41
Copilot AI review requested due to automatic review settings March 19, 2026 23:41
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates azure-security-keyvault-secrets based on TypeSpec SDK generation for Key Vault Secrets (API version 2025-07-01), aligning repo configuration and generated models/client surfaces with the latest spec.

Changes:

  • Update TypeSpec source location (tsp-location.yaml) to the new specification/keyvault/data-plane/Secrets directory and spec commit.
  • Add previousVersion to generated secret response models and reflect it in the generated implementation client schema docs.
  • Update test proxy matcher exclusions and refresh CHANGELOG.md entries for the new generated changes.

Reviewed changes

Copilot reviewed 7 out of 7 changed files in this pull request and generated 4 comments.

Show a summary per file
File Description
sdk/keyvault/azure-security-keyvault-secrets/tsp-location.yaml Points generation to new spec path/commit and updates additional directories.
sdk/keyvault/azure-security-keyvault-secrets/src/test/java/com/azure/security/keyvault/secrets/SecretClientTestBase.java Adjusts playback-mode request matching by excluding the Accept header.
sdk/keyvault/azure-security-keyvault-secrets/src/main/java/com/azure/security/keyvault/secrets/implementation/models/SecretBundle.java Adds previousVersion field, getter, and JSON (de)serialization.
sdk/keyvault/azure-security-keyvault-secrets/src/main/java/com/azure/security/keyvault/secrets/implementation/models/DeletedSecretBundle.java Adds previousVersion field, getter, and JSON (de)serialization for deleted-secret model.
sdk/keyvault/azure-security-keyvault-secrets/src/main/java/com/azure/security/keyvault/secrets/implementation/models/ContentType.java Introduces a generated MIME-type enum for supported content types.
sdk/keyvault/azure-security-keyvault-secrets/CHANGELOG.md Adds feature notes for previousVersion and outContentType, and updates the top entry header.

Comment on lines +66 to +67
* The version of the previous certificate, if applicable. Applies only to certificates created after June 1, 2025.
* Certificates created before this date are not retroactively updated.
Copy link

Copilot AI Mar 19, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The new previousVersion documentation here refers to the "previous certificate", but the same feature is described in this PR's CHANGELOG as the "previous secret". Please verify the intended meaning from the service spec and make the wording consistent across docs (model field + getter + CHANGELOG), e.g., clarify whether this applies only to certificate-backed secrets or all secrets.

Suggested change
* The version of the previous certificate, if applicable. Applies only to certificates created after June 1, 2025.
* Certificates created before this date are not retroactively updated.
* The version identifier of the previous secret, if applicable. Applies only to secrets created after June 1, 2025.
* Secrets created before this date are not retroactively updated.

Copilot uses AI. Check for mistakes.
Comment on lines +70 to +75
* The version of the previous certificate, if applicable. Applies only to certificates created after June 1, 2025.
* Certificates created before this date are not retroactively updated.
*/
@Generated
private String previousVersion;

Copy link

Copilot AI Mar 19, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The new previousVersion documentation here refers to the "previous certificate", but the same feature is described in this PR's CHANGELOG as the "previous secret". Please verify the intended meaning from the service spec and make the wording consistent across docs (model field + getter + CHANGELOG), e.g., clarify whether this applies only to certificate-backed secrets or all secrets.

Copilot uses AI. Check for mistakes.
Comment on lines +1 to +5
directory: specification/keyvault/data-plane/Secrets
commit: f6bd06be22baf3a18504ffef0f590230850953e5
repo: Azure/azure-rest-api-specs
cleanup: true
additionalDirectories:
- specification/keyvault/Security.KeyVault.Common/
- specification/keyvault/data-plane/Secrets/common
Copy link

Copilot AI Mar 19, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

tsp-location.yaml diverges from the other Key Vault modules: it drops cleanup: true and the additionalDirectories entry no longer ends with a trailing /. Other Key Vault libraries keep cleanup: true and use trailing slashes for additionalDirectories paths (for example azure-security-keyvault-keys/tsp-location.yaml). Consider restoring cleanup: true and using specification/keyvault/data-plane/Secrets/common/ for consistency and to avoid tooling differences when resolving directory paths.

Copilot uses AI. Check for mistakes.
Comment on lines +3 to +8
## 4.11.0-beta.1 (2026-03-19)

### Features Added

### Breaking Changes
- Added `previousVersion` property to `KeyVaultSecret` and related response models, which returns the version of the previous secret, if applicable. This field is only populated for secrets created after June 1, 2025.
- Added `outContentType` query parameter support to `getSecret` operations, enabling PFX to PEM format conversion for certificate-backed secrets. Available in service version `2025-07-01` and later.
Copy link

Copilot AI Mar 19, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The top CHANGELOG entry was changed from "(Unreleased)" to a specific date. In this repo, Key Vault packages keep the next version marked as "Unreleased" until the release is finalized (see azure-security-keyvault-keys/CHANGELOG.md). Also, this section removed the standard empty subsections (Breaking Changes/Other Changes). Consider reverting to the standard format and keeping the entry as Unreleased.

Copilot uses AI. Check for mistakes.
@rohitsinghal4u
Copy link
Contributor

The failing check (ubuntu2404_125_FromSource_SkipRebuild_Verify) is caused by a test recording mismatch in the azure-compute-batch module, not by any changes in this PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

Status: Untriaged

Development

Successfully merging this pull request may close these issues.

4 participants