@@ -138,7 +138,7 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
138
138
///
139
139
/// Runtime::new().unwrap().block_on(example());
140
140
/// ```
141
- pub async fn get_secret ( & mut self , secret_name : & ' a str ) -> Result < KeyVaultSecret , Error > {
141
+ pub async fn get_secret ( & mut self , secret_name : & str ) -> Result < KeyVaultSecret , Error > {
142
142
Ok ( self . get_secret_with_version ( secret_name, "" ) . await ?)
143
143
}
144
144
@@ -166,8 +166,8 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
166
166
/// ```
167
167
pub async fn get_secret_with_version (
168
168
& mut self ,
169
- secret_name : & ' a str ,
170
- secret_version_name : & ' a str ,
169
+ secret_name : & str ,
170
+ secret_version_name : & str ,
171
171
) -> Result < KeyVaultSecret , Error > {
172
172
let mut uri = self . vault_url . clone ( ) ;
173
173
uri. set_path ( & format ! ( "secrets/{}/{}" , secret_name, secret_version_name) ) ;
@@ -268,7 +268,7 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
268
268
/// ```
269
269
pub async fn get_secret_versions (
270
270
& mut self ,
271
- secret_name : & ' a str ,
271
+ secret_name : & str ,
272
272
) -> Result < Vec < KeyVaultSecretBaseIdentifier > , Error > {
273
273
let mut secret_versions = Vec :: < KeyVaultSecretBaseIdentifier > :: new ( ) ;
274
274
@@ -332,8 +332,8 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
332
332
/// ```
333
333
pub async fn set_secret (
334
334
& mut self ,
335
- secret_name : & ' a str ,
336
- new_secret_value : & ' a str ,
335
+ secret_name : & str ,
336
+ new_secret_value : & str ,
337
337
) -> Result < ( ) , Error > {
338
338
let mut uri = self . vault_url . clone ( ) ;
339
339
uri. set_path ( & format ! ( "secrets/{}" , secret_name) ) ;
@@ -379,8 +379,8 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
379
379
/// ```
380
380
pub async fn update_secret_enabled (
381
381
& mut self ,
382
- secret_name : & ' a str ,
383
- secret_version : & ' a str ,
382
+ secret_name : & str ,
383
+ secret_version : & str ,
384
384
enabled : bool ,
385
385
) -> Result < ( ) , Error > {
386
386
let mut attributes = Map :: new ( ) ;
@@ -420,8 +420,8 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
420
420
/// ```
421
421
pub async fn update_secret_recovery_level (
422
422
& mut self ,
423
- secret_name : & ' a str ,
424
- secret_version : & ' a str ,
423
+ secret_name : & str ,
424
+ secret_version : & str ,
425
425
recovery_level : RecoveryLevel ,
426
426
) -> Result < ( ) , Error > {
427
427
let mut attributes = Map :: new ( ) ;
@@ -465,8 +465,8 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
465
465
/// ```
466
466
pub async fn update_secret_expiration_time (
467
467
& mut self ,
468
- secret_name : & ' a str ,
469
- secret_version : & ' a str ,
468
+ secret_name : & str ,
469
+ secret_version : & str ,
470
470
expiration_time : DateTime < Utc > ,
471
471
) -> Result < ( ) , Error > {
472
472
let mut attributes = Map :: new ( ) ;
@@ -483,8 +483,8 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
483
483
484
484
async fn update_secret (
485
485
& mut self ,
486
- secret_name : & ' a str ,
487
- secret_version : & ' a str ,
486
+ secret_name : & str ,
487
+ secret_version : & str ,
488
488
attributes : Map < String , Value > ,
489
489
) -> Result < ( ) , Error > {
490
490
let mut uri = self . vault_url . clone ( ) ;
@@ -521,7 +521,7 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
521
521
///
522
522
/// Runtime::new().unwrap().block_on(example());
523
523
/// ```
524
- pub async fn restore_secret ( & mut self , backup_blob : & ' a str ) -> Result < ( ) , Error > {
524
+ pub async fn restore_secret ( & mut self , backup_blob : & str ) -> Result < ( ) , Error > {
525
525
let mut uri = self . vault_url . clone ( ) ;
526
526
uri. set_path ( "secrets/restore" ) ;
527
527
uri. set_query ( Some ( API_VERSION_PARAM ) ) ;
@@ -561,7 +561,7 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
561
561
/// ```
562
562
pub async fn backup_secret (
563
563
& mut self ,
564
- secret_name : & ' a str ,
564
+ secret_name : & str ,
565
565
) -> Result < KeyVaultSecretBackupBlob , Error > {
566
566
let mut uri = self . vault_url . clone ( ) ;
567
567
uri. set_path ( & format ! ( "secrets/{}/backup" , secret_name) ) ;
@@ -604,7 +604,7 @@ impl<'a, T: TokenCredential> KeyClient<'a, T> {
604
604
///
605
605
/// Runtime::new().unwrap().block_on(example());
606
606
/// ```
607
- pub async fn delete_secret ( & mut self , secret_name : & ' a str ) -> Result < ( ) , Error > {
607
+ pub async fn delete_secret ( & mut self , secret_name : & str ) -> Result < ( ) , Error > {
608
608
let mut uri = self . vault_url . clone ( ) ;
609
609
uri. set_path ( & format ! ( "secrets/{}" , secret_name) ) ;
610
610
uri. set_query ( Some ( API_VERSION_PARAM ) ) ;
0 commit comments