-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Key Vault] Full LRO refactoring #12630
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems like a clean refactoring to me! Good work on this.
if (endTime) { | ||
state.isCompleted = true; | ||
} | ||
if (error && error.message) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what happens if error
has an empty message
? Does it never finish? Do we ignore it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think the error is only valid if it has a message. I'll ask the team!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I made an issue! #12693 I'll follow up before the next Key Vault release.
} | ||
if (error && error.message) { | ||
state.isCompleted = true; | ||
state.error = new Error(error.message); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Curious why we recreate the error
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The error we receive is of the type ErrorModel
, which is some sort of error tree:
/**
* The key vault server error.
*/
export interface ErrorModel {
/**
* The error code.
*/
readonly code?: string;
/**
* The error message.
*/
readonly message?: string;
/**
* The key vault server error.
*/
readonly innerError?: ErrorModel;
}
I'll leave this as creating a new error for now.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I made an issue! #12693 I'll follow up before the next Key Vault release.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey this is pretty great! Quite a satisfying diff to read through 😁
@bterlson wow! thank you for that review 🙏🙌❤ |
add vmss capabilities to force delete (Azure#12630)
add vmss capabilities to force delete (Azure#12630)
add vmss capabilities to force delete (Azure#12630)
add vmss capabilities to force delete (Azure#12630)
add vmss capabilities to force delete (Azure#12630)
add vmss capabilities to force delete (Azure#12630)
Following the Key Vault Keys LRO refactoring PR (link), this PR refactors all of the LROs in the other Key Vault clients. It also cleans up the initial refactor of the Key Vault Keys LROs.
There are some small changes in the public API, but they're only renames.
I'll leave in draft for a while since we're not releasing Key Vault so soon.