10
10
from azure .core .tracing .decorator import distributed_trace
11
11
12
12
from ._enums import KeyVaultRoleScope
13
+ from ._generated .models import (
14
+ Permission ,
15
+ RoleAssignmentCreateParameters ,
16
+ RoleAssignmentProperties ,
17
+ RoleDefinitionCreateParameters ,
18
+ RoleDefinitionProperties ,
19
+ )
13
20
from ._models import KeyVaultPermission , KeyVaultRoleAssignment , KeyVaultRoleDefinition
14
21
from ._internal import KeyVaultClientBase
15
22
@@ -59,13 +66,12 @@ def create_role_assignment(
59
66
"""
60
67
assignment_name = name or uuid4 ()
61
68
62
- create_parameters = self . _client . role_assignments . models . RoleAssignmentCreateParameters (
63
- properties = self . _client . role_assignments . models . RoleAssignmentProperties (
69
+ create_parameters = RoleAssignmentCreateParameters (
70
+ properties = RoleAssignmentProperties (
64
71
principal_id = principal_id , role_definition_id = str (definition_id )
65
72
)
66
73
)
67
74
assignment = self ._client .role_assignments .create (
68
- vault_base_url = self ._vault_url ,
69
75
scope = scope ,
70
76
role_assignment_name = str (assignment_name ),
71
77
parameters = create_parameters ,
@@ -90,7 +96,7 @@ def delete_role_assignment(
90
96
"""
91
97
try :
92
98
self ._client .role_assignments .delete (
93
- vault_base_url = self . _vault_url , scope = scope , role_assignment_name = str (name ), ** kwargs
99
+ scope = scope , role_assignment_name = str (name ), ** kwargs
94
100
)
95
101
except ResourceNotFoundError :
96
102
pass
@@ -111,7 +117,7 @@ def get_role_assignment(
111
117
:rtype: ~azure.keyvault.administration.KeyVaultRoleAssignment
112
118
"""
113
119
assignment = self ._client .role_assignments .get (
114
- vault_base_url = self . _vault_url , scope = scope , role_assignment_name = str (name ), ** kwargs
120
+ scope = scope , role_assignment_name = str (name ), ** kwargs
115
121
)
116
122
return KeyVaultRoleAssignment ._from_generated (assignment )
117
123
@@ -129,7 +135,6 @@ def list_role_assignments(
129
135
:rtype: ~azure.core.paging.ItemPaged[~azure.keyvault.administration.KeyVaultRoleAssignment]
130
136
"""
131
137
return self ._client .role_assignments .list_for_scope (
132
- vault_base_url = self ._vault_url ,
133
138
scope = scope ,
134
139
cls = lambda result : [KeyVaultRoleAssignment ._from_generated (a ) for a in result ],
135
140
** kwargs
@@ -144,7 +149,7 @@ def set_role_definition(
144
149
role_name : Optional [str ] = None ,
145
150
description : Optional [str ] = None ,
146
151
permissions : Optional [List [KeyVaultPermission ]] = None ,
147
- assignable_scopes : Optional [Union [ List [str ], List [ KeyVaultRoleScope ]]] = None ,
152
+ assignable_scopes : Optional [List [Union [ str , KeyVaultRoleScope ]]] = None ,
148
153
** kwargs : Any ,
149
154
) -> KeyVaultRoleDefinition :
150
155
"""Creates or updates a custom role definition.
@@ -175,7 +180,7 @@ def set_role_definition(
175
180
:rtype: ~azure.keyvault.administration.KeyVaultRoleDefinition
176
181
"""
177
182
role_permissions = [
178
- self . _client . role_definitions . models . Permission (
183
+ Permission (
179
184
actions = p .actions ,
180
185
not_actions = p .not_actions ,
181
186
data_actions = p .data_actions ,
@@ -184,16 +189,15 @@ def set_role_definition(
184
189
for p in permissions or []
185
190
]
186
191
187
- properties = self . _client . role_definitions . models . RoleDefinitionProperties (
192
+ properties = RoleDefinitionProperties (
188
193
role_name = role_name ,
189
194
description = description ,
190
195
permissions = role_permissions ,
191
196
assignable_scopes = assignable_scopes ,
192
197
)
193
- parameters = self . _client . role_definitions . models . RoleDefinitionCreateParameters (properties = properties )
198
+ parameters = RoleDefinitionCreateParameters (properties = properties )
194
199
195
200
definition = self ._client .role_definitions .create_or_update (
196
- vault_base_url = self ._vault_url ,
197
201
scope = scope ,
198
202
role_definition_name = str (name or uuid4 ()),
199
203
parameters = parameters ,
@@ -217,7 +221,7 @@ def get_role_definition(
217
221
:rtype: ~azure.keyvault.administration.KeyVaultRoleDefinition
218
222
"""
219
223
definition = self ._client .role_definitions .get (
220
- vault_base_url = self . _vault_url , scope = scope , role_definition_name = str (name ), ** kwargs
224
+ scope = scope , role_definition_name = str (name ), ** kwargs
221
225
)
222
226
return KeyVaultRoleDefinition ._from_generated (definition )
223
227
@@ -238,7 +242,7 @@ def delete_role_definition(
238
242
"""
239
243
try :
240
244
self ._client .role_definitions .delete (
241
- vault_base_url = self . _vault_url , scope = scope , role_definition_name = str (name ), ** kwargs
245
+ scope = scope , role_definition_name = str (name ), ** kwargs
242
246
)
243
247
except ResourceNotFoundError :
244
248
pass
@@ -257,7 +261,6 @@ def list_role_definitions(
257
261
:rtype: ~azure.core.paging.ItemPaged[~azure.keyvault.administration.KeyVaultRoleDefinition]
258
262
"""
259
263
return self ._client .role_definitions .list (
260
- vault_base_url = self ._vault_url ,
261
264
scope = scope ,
262
265
cls = lambda result : [KeyVaultRoleDefinition ._from_generated (d ) for d in result ],
263
266
** kwargs
0 commit comments