Skip to content

[AutoPR azure-security-keyvault-certificates]-generated-from-SDK Generation - Java-5984840#48346

Open
azure-sdk wants to merge 3 commits intoAzure:mainfrom
azure-sdk:sdkauto/azure-security-keyvault-certificates-5984840
Open

[AutoPR azure-security-keyvault-certificates]-generated-from-SDK Generation - Java-5984840#48346
azure-sdk wants to merge 3 commits intoAzure:mainfrom
azure-sdk:sdkauto/azure-security-keyvault-certificates-5984840

Conversation

@azure-sdk
Copy link
Collaborator

Configurations: 'specification/keyvault/Security.KeyVault.Certificates/tspconfig.yaml', API Version: 2025-07-01, SDK Release Type: stable, and CommitSHA: '35275d315efee7fa79b6661c29cb3f1c05e86b76' in SpecRepo: 'https://github.com/Azure/azure-rest-api-specs' Pipeline run: https://dev.azure.com/azure-sdk/internal/_build/results?buildId=5984840 Refer to https://eng.ms/docs/products/azure-developer-experience/develop/sdk-release/sdk-release-prerequisites to prepare for SDK release.

…s/tspconfig.yaml', API Version: 2025-07-01, SDK Release Type: stable, and CommitSHA: '35275d315efee7fa79b6661c29cb3f1c05e86b76' in SpecRepo: 'https://github.com/Azure/azure-rest-api-specs' Pipeline run: https://dev.azure.com/azure-sdk/internal/_build/results?buildId=5984840 Refer to https://eng.ms/docs/products/azure-developer-experience/develop/sdk-release/sdk-release-prerequisites to prepare for SDK release.
@rohitsinghal4u rohitsinghal4u marked this pull request as ready for review March 10, 2026 06:10
@rohitsinghal4u rohitsinghal4u requested a review from a team as a code owner March 10, 2026 06:10
Copilot AI review requested due to automatic review settings March 10, 2026 06:10
@rohitsinghal4u rohitsinghal4u requested a review from a team as a code owner March 10, 2026 06:10
@rohitsinghal4u
Copy link
Contributor

Hi @azure-java-sdk /@azure-sdk-write-keyvault

This PR was auto-generated from spec PR Azure/azure-rest-api-specs#41061 which added uris (URI SAN) and ipAddresses (IP address SAN) fields to the SubjectAlternativeNames model.

These fields were added in API version 2025-06-01-preview and are available in 2025-07-01 (stable).

The code generation succeeded, but tests are failing because the test recordings don't include these API versions. Could you help re-record the tests against a live Key Vault instance?

Thanks!

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This is an auto-generated SDK update for azure-security-keyvault-certificates, regenerated from the Key Vault API spec at commit 35275d315efee7fa79b6661c29cb3f1c05e86b76 (API version 2025-07-01 stable). The primary functional addition is support for two new SAN (Subject Alternative Names) fields: uniformResourceIdentifiers (URIs) and ipAddresses.

Changes:

  • Added uniformResourceIdentifiers and ipAddresses fields (with getters, setters, and JSON serialization/deserialization) to SubjectAlternativeNames
  • Updated Javadoc across CertificateClientImpl to document the new SAN fields; also removed the unnecessary Accept header from the purgeDeletedCertificate operation (which returns 204 No Content)
  • Updated tsp-location.yaml to the new commit SHA and CHANGELOG.md to reflect the new features

Reviewed changes

Copilot reviewed 4 out of 4 changed files in this pull request and generated 3 comments.

File Description
tsp-location.yaml Updated commit SHA; removed cleanup: true and trailing slash from additionalDirectories — inconsistent with other Key Vault packages
SubjectAlternativeNames.java Added uniformResourceIdentifiers and ipAddresses fields with getters, setters, and JSON serialization/deserialization
CertificateClientImpl.java Updated Javadoc for new SAN fields; removed Accept header from the 204 purgeDeletedCertificate operation
CHANGELOG.md Added 4.9.0-beta.1 release date and new feature entries; removed existing bug fix entry for issue #47801

* `setIpAddresses(java.util.List)` was added
* `getUniformResourceIdentifiers()` was added
* `getIpAddresses()` was added

Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The original 4.9.0-beta.1 unreleased section contained a "Bugs Fixed" entry for HttpResponseException.getResponse() calls potentially causing a NullPointerException (referenced as issue #47801). This entry has been removed from the CHANGELOG in this PR, and there is no indication that the fix was moved to a different release entry or that it was determined to be incorrect/duplicate. If the bug fix was previously included in 4.9.0-beta.1, it should remain in the changelog for that version to properly track changes for users upgrading.

Suggested change
### Bugs Fixed
- Fixed a potential `NullPointerException` when calling `HttpResponseException.getResponse()` in certain failure scenarios. (#47801)

Copilot uses AI. Check for mistakes.
directory: specification/keyvault/Security.KeyVault.Certificates
commit: 396ab529763b7195ab089f58e2eefb011e1b290d
commit: 35275d315efee7fa79b6661c29cb3f1c05e86b76
repo: Azure/azure-rest-api-specs
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The cleanup: true field has been removed from this file. All other Key Vault packages (azure-security-keyvault-keys, azure-security-keyvault-secrets, and azure-security-keyvault-administration) include cleanup: true in their tsp-location.yaml. Removing this flag may affect the codegen behavior for this package inconsistently with its sibling packages.

For example, sdk/keyvault/azure-security-keyvault-keys/tsp-location.yaml line 4 has cleanup: true, and so does sdk/keyvault/azure-security-keyvault-secrets/tsp-location.yaml line 4.

If this removal is intentional due to a change in the new API version's codegen requirements, it should be explicitly documented.

Suggested change
repo: Azure/azure-rest-api-specs
repo: Azure/azure-rest-api-specs
cleanup: true

Copilot uses AI. Check for mistakes.
additionalDirectories:
- specification/keyvault/Security.KeyVault.Common/
additionalDirectories:
- specification/keyvault/Security.KeyVault.Common
Copy link

Copilot AI Mar 10, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The path for Security.KeyVault.Common is missing the trailing slash. All other Key Vault packages use specification/keyvault/Security.KeyVault.Common/ (with trailing slash) in their additionalDirectories. For example, sdk/keyvault/azure-security-keyvault-keys/tsp-location.yaml uses - specification/keyvault/Security.KeyVault.Common/. This inconsistency may affect how the TypeSpec emitter resolves the directory during code generation.

Suggested change
- specification/keyvault/Security.KeyVault.Common
- specification/keyvault/Security.KeyVault.Common/

Copilot uses AI. Check for mistakes.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

Status: Untriaged

Development

Successfully merging this pull request may close these issues.

3 participants