Skip to content

Commit 27d2ce6

Browse files
authored
Merge pull request Azure#11 from SaidBySolo/style/keyvault-keys-client
[keyvault] Migrate type comment to type annotation
2 parents da7312f + 3131b59 commit 27d2ce6

File tree

1 file changed

+24
-50
lines changed
  • sdk/keyvault/azure-keyvault-keys/azure/keyvault/keys

1 file changed

+24
-50
lines changed

sdk/keyvault/azure-keyvault-keys/azure/keyvault/keys/_client.py

+24-50
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
# Copyright (c) Microsoft Corporation.
33
# Licensed under the MIT License.
44
# ------------------------------------
5+
from typing import Any, Optional, Union, TYPE_CHECKING
56
from functools import partial
67
from azure.core.tracing.decorator import distributed_trace
78

@@ -11,14 +12,9 @@
1112
from ._shared._polling import DeleteRecoverPollingMethod, KeyVaultOperationPoller
1213
from ._models import DeletedKey, KeyVaultKey, KeyProperties, KeyRotationPolicy, ReleaseKeyResult
1314

14-
try:
15-
from typing import TYPE_CHECKING
16-
except ImportError:
17-
TYPE_CHECKING = False
1815

1916
if TYPE_CHECKING:
2017
# pylint:disable=unused-import
21-
from typing import Any, List, Optional, Union
2218
from azure.core.paging import ItemPaged
2319
from azure.core.polling import LROPoller
2420
from ._models import JsonWebKey
@@ -61,8 +57,7 @@ def _get_attributes(self, enabled, not_before, expires_on, exportable=None):
6157
)
6258
return None
6359

64-
def get_cryptography_client(self, key_name, **kwargs):
65-
# type: (str, **Any) -> CryptographyClient
60+
def get_cryptography_client(self, key_name: str, **kwargs: Any) -> CryptographyClient:
6661
"""Gets a :class:`~azure.keyvault.keys.crypto.CryptographyClient` for the given key.
6762
6863
:param str key_name: The name of the key used to perform cryptographic operations.
@@ -77,12 +72,11 @@ def get_cryptography_client(self, key_name, **kwargs):
7772

7873
# We provide a fake credential because the generated client already has the KeyClient's real credential
7974
return CryptographyClient(
80-
key_id, object(), generated_client=self._client, generated_models=self._models # type: ignore
75+
key_id, object(), generated_client=self._client, generated_models=self._models # type: ignore
8176
)
8277

8378
@distributed_trace
84-
def create_key(self, name, key_type, **kwargs):
85-
# type: (str, Union[str, KeyType], **Any) -> KeyVaultKey
79+
def create_key(self, name: str, key_type: Union[str, "KeyType"], **kwargs: Any) -> KeyVaultKey:
8680
"""Create a key or, if ``name`` is already in use, create a new version of the key.
8781
8882
Requires keys/create permission.
@@ -150,8 +144,7 @@ def create_key(self, name, key_type, **kwargs):
150144
return KeyVaultKey._from_key_bundle(bundle)
151145

152146
@distributed_trace
153-
def create_rsa_key(self, name, **kwargs):
154-
# type: (str, **Any) -> KeyVaultKey
147+
def create_rsa_key(self, name: str, **kwargs: Any) -> KeyVaultKey:
155148
"""Create a new RSA key or, if ``name`` is already in use, create a new version of the key
156149
157150
Requires the keys/create permission.
@@ -189,8 +182,7 @@ def create_rsa_key(self, name, **kwargs):
189182
return self.create_key(name, key_type="RSA-HSM" if hsm else "RSA", **kwargs)
190183

191184
@distributed_trace
192-
def create_ec_key(self, name, **kwargs):
193-
# type: (str, **Any) -> KeyVaultKey
185+
def create_ec_key(self, name: str, **kwargs: Any) -> KeyVaultKey:
194186
"""Create a new elliptic curve key or, if ``name`` is already in use, create a new version of the key.
195187
196188
Requires the keys/create permission.
@@ -228,8 +220,7 @@ def create_ec_key(self, name, **kwargs):
228220
return self.create_key(name, key_type="EC-HSM" if hsm else "EC", **kwargs)
229221

230222
@distributed_trace
231-
def create_oct_key(self, name, **kwargs):
232-
# type: (str, **Any) -> KeyVaultKey
223+
def create_oct_key(self, name: str, **kwargs: Any) -> KeyVaultKey:
233224
"""Create a new octet sequence (symmetric) key or, if ``name`` is in use, create a new version of the key.
234225
235226
Requires the keys/create permission.
@@ -266,8 +257,7 @@ def create_oct_key(self, name, **kwargs):
266257
return self.create_key(name, key_type="oct-HSM" if hsm else "oct", **kwargs)
267258

268259
@distributed_trace
269-
def begin_delete_key(self, name, **kwargs):
270-
# type: (str, **Any) -> LROPoller
260+
def begin_delete_key(self, name:str, **kwargs: Any) -> "LROPoller":
271261
"""Delete all versions of a key and its cryptographic material.
272262
273263
Requires keys/delete permission. When this method returns Key Vault has begun deleting the key. Deletion may
@@ -312,8 +302,7 @@ def begin_delete_key(self, name, **kwargs):
312302
return KeyVaultOperationPoller(polling_method)
313303

314304
@distributed_trace
315-
def get_key(self, name, version=None, **kwargs):
316-
# type: (str, Optional[str], **Any) -> KeyVaultKey
305+
def get_key(self, name:str, version:Optional[str]=None, **kwargs: Any) -> KeyVaultKey:
317306
"""Get a key's attributes and, if it's an asymmetric key, its public material.
318307
319308
Requires keys/get permission.
@@ -339,8 +328,7 @@ def get_key(self, name, version=None, **kwargs):
339328
return KeyVaultKey._from_key_bundle(bundle)
340329

341330
@distributed_trace
342-
def get_deleted_key(self, name, **kwargs):
343-
# type: (str, **Any) -> DeletedKey
331+
def get_deleted_key(self, name:str, **kwargs:Any):
344332
"""Get a deleted key. Possible only in a vault with soft-delete enabled.
345333
346334
Requires keys/get permission.
@@ -365,8 +353,7 @@ def get_deleted_key(self, name, **kwargs):
365353
return DeletedKey._from_deleted_key_bundle(bundle)
366354

367355
@distributed_trace
368-
def list_deleted_keys(self, **kwargs):
369-
# type: (**Any) -> ItemPaged[DeletedKey]
356+
def list_deleted_keys(self, **kwargs: Any) -> "ItemPaged[DeletedKey]":
370357
"""List all deleted keys, including the public part of each. Possible only in a vault with soft-delete enabled.
371358
372359
Requires keys/list permission.
@@ -391,8 +378,7 @@ def list_deleted_keys(self, **kwargs):
391378
)
392379

393380
@distributed_trace
394-
def list_properties_of_keys(self, **kwargs):
395-
# type: (**Any) -> ItemPaged[KeyProperties]
381+
def list_properties_of_keys(self, **kwargs: Any) -> "ItemPaged[KeyProperties]":
396382
"""List identifiers and properties of all keys in the vault.
397383
398384
Requires keys/list permission.
@@ -417,8 +403,7 @@ def list_properties_of_keys(self, **kwargs):
417403
)
418404

419405
@distributed_trace
420-
def list_properties_of_key_versions(self, name, **kwargs):
421-
# type: (str, **Any) -> ItemPaged[KeyProperties]
406+
def list_properties_of_key_versions(self, name: str, **kwargs: Any) -> "ItemPaged[KeyProperties]":
422407
"""List the identifiers and properties of a key's versions.
423408
424409
Requires keys/list permission.
@@ -446,8 +431,7 @@ def list_properties_of_key_versions(self, name, **kwargs):
446431
)
447432

448433
@distributed_trace
449-
def purge_deleted_key(self, name, **kwargs):
450-
# type: (str, **Any) -> None
434+
def purge_deleted_key(self, name:str, **kwargs: Any) -> None:
451435
"""Permanently deletes a deleted key. Only possible in a vault with soft-delete enabled.
452436
453437
Performs an irreversible deletion of the specified key, without
@@ -474,8 +458,7 @@ def purge_deleted_key(self, name, **kwargs):
474458
self._client.purge_deleted_key(vault_base_url=self.vault_url, key_name=name, error_map=_error_map, **kwargs)
475459

476460
@distributed_trace
477-
def begin_recover_deleted_key(self, name, **kwargs):
478-
# type: (str, **Any) -> LROPoller
461+
def begin_recover_deleted_key(self, name: str, **kwargs: Any) -> "LROPoller":
479462
"""Recover a deleted key to its latest version. Possible only in a vault with soft-delete enabled.
480463
481464
Requires keys/recover permission.
@@ -520,8 +503,7 @@ def begin_recover_deleted_key(self, name, **kwargs):
520503
return KeyVaultOperationPoller(polling_method)
521504

522505
@distributed_trace
523-
def update_key_properties(self, name, version=None, **kwargs):
524-
# type: (str, Optional[str], **Any) -> KeyVaultKey
506+
def update_key_properties(self, name:str, version:Optional[str]=None, **kwargs: Any) -> KeyVaultKey:
525507
"""Change a key's properties (not its cryptographic material).
526508
527509
Requires keys/update permission.
@@ -576,8 +558,7 @@ def update_key_properties(self, name, version=None, **kwargs):
576558
return KeyVaultKey._from_key_bundle(bundle)
577559

578560
@distributed_trace
579-
def backup_key(self, name, **kwargs):
580-
# type: (str, **Any) -> bytes
561+
def backup_key(self, name: str, **kwargs: Any) -> bytes:
581562
"""Back up a key in a protected form useable only by Azure Key Vault.
582563
583564
Requires keys/backup permission.
@@ -605,8 +586,7 @@ def backup_key(self, name, **kwargs):
605586
return backup_result.value
606587

607588
@distributed_trace
608-
def restore_key_backup(self, backup, **kwargs):
609-
# type: (bytes, **Any) -> KeyVaultKey
589+
def restore_key_backup(self, backup: bytes, **kwargs: Any) -> KeyVaultKey:
610590
"""Restore a key backup to the vault.
611591
612592
Requires keys/restore permission.
@@ -640,8 +620,7 @@ def restore_key_backup(self, backup, **kwargs):
640620
return KeyVaultKey._from_key_bundle(bundle)
641621

642622
@distributed_trace
643-
def import_key(self, name, key, **kwargs):
644-
# type: (str, JsonWebKey, **Any) -> KeyVaultKey
623+
def import_key(self, name:str, key: "JsonWebKey", **kwargs: Any) -> KeyVaultKey:
645624
"""Import a key created externally.
646625
647626
Requires keys/import permission. If ``name`` is already in use, the key will be imported as a new version.
@@ -689,8 +668,7 @@ def import_key(self, name, key, **kwargs):
689668
return KeyVaultKey._from_key_bundle(bundle)
690669

691670
@distributed_trace
692-
def release_key(self, name, target_attestation_token, **kwargs):
693-
# type: (str, str, **Any) -> ReleaseKeyResult
671+
def release_key(self, name:str, target_attestation_token:str, **kwargs: Any) -> ReleaseKeyResult:
694672
"""Releases a key.
695673
696674
The release key operation is applicable to all key types. The target key must be marked
@@ -723,8 +701,7 @@ def release_key(self, name, target_attestation_token, **kwargs):
723701
return ReleaseKeyResult(result.value)
724702

725703
@distributed_trace
726-
def get_random_bytes(self, count, **kwargs):
727-
# type: (int, **Any) -> bytes
704+
def get_random_bytes(self, count: int, **kwargs: Any) -> bytes:
728705
"""Get the requested number of random bytes from a managed HSM.
729706
730707
:param int count: The requested number of random bytes.
@@ -750,8 +727,7 @@ def get_random_bytes(self, count, **kwargs):
750727
return result.value
751728

752729
@distributed_trace
753-
def get_key_rotation_policy(self, key_name, **kwargs):
754-
# type: (str, **Any) -> KeyRotationPolicy
730+
def get_key_rotation_policy(self, key_name: str, **kwargs: Any) -> KeyRotationPolicy:
755731
"""Get the rotation policy of a Key Vault key.
756732
757733
:param str key_name: The name of the key.
@@ -764,8 +740,7 @@ def get_key_rotation_policy(self, key_name, **kwargs):
764740
return KeyRotationPolicy._from_generated(policy)
765741

766742
@distributed_trace
767-
def rotate_key(self, name, **kwargs):
768-
# type: (str, **Any) -> KeyVaultKey
743+
def rotate_key(self, name: str, **kwargs: Any) -> KeyVaultKey:
769744
"""Rotate the key based on the key policy by generating a new version of the key.
770745
771746
This operation requires the keys/rotate permission.
@@ -780,8 +755,7 @@ def rotate_key(self, name, **kwargs):
780755
return KeyVaultKey._from_key_bundle(bundle)
781756

782757
@distributed_trace
783-
def update_key_rotation_policy(self, key_name, policy, **kwargs):
784-
# type: (str, KeyRotationPolicy, **Any) -> KeyRotationPolicy
758+
def update_key_rotation_policy(self, key_name:str, policy: KeyRotationPolicy, **kwargs: Any) -> KeyRotationPolicy:
785759
"""Updates the rotation policy of a Key Vault key.
786760
787761
This operation requires the keys/update permission.

0 commit comments

Comments
 (0)