diff --git a/specification/cognitiveservices/data-plane/Language/stable/2024-05-01/analyzeconversations.json b/specification/cognitiveservices/data-plane/Language/stable/2024-05-01/analyzeconversations.json index fa2c4709ea2a..fce5d66c9858 100644 --- a/specification/cognitiveservices/data-plane/Language/stable/2024-05-01/analyzeconversations.json +++ b/specification/cognitiveservices/data-plane/Language/stable/2024-05-01/analyzeconversations.json @@ -3,7 +3,7 @@ "info": { "title": "Microsoft Cognitive Language Service - Analyze Conversations", "version": "2024-05-01", - "description": "The language service conversations API is a suite of natural language processing (NLP) skills that can be used to analyze structured conversations (textual or spoken). The synchronous API in this suite accepts a request and mediates among multiple language projects, such as LUIS Generally Available, Question Answering, Conversational Language Understanding, and then calls the best candidate service to handle the request. At last, it returns a response with the candidate service's response as a payload.\\n\\n In some cases, this API needs to forward requests and responses between the caller and an upstream service. The asynchronous APIs in this suite enable tasks like Conversation Summarization and Conversational PII detection.", + "description": "test The language service conversations API is a suite of natural language processing (NLP) skills that can be used to analyze structured conversations (textual or spoken). The synchronous API in this suite accepts a request and mediates among multiple language projects, such as LUIS Generally Available, Question Answering, Conversational Language Understanding, and then calls the best candidate service to handle the request. At last, it returns a response with the candidate service's response as a payload.\\n\\n In some cases, this API needs to forward requests and responses between the caller and an upstream service. The asynchronous APIs in this suite enable tasks like Conversation Summarization and Conversational PII detection.", "x-typespec-generated": [ { "emitter": "@azure-tools/typespec-autorest" diff --git a/specification/keyvault/Security.KeyVault.Keys/examples/7.5/wrapKey-example.json b/specification/keyvault/Security.KeyVault.Keys/examples/7.5/wrapKey-example.json index 04e7fd4ce67e..c10eb950290a 100644 --- a/specification/keyvault/Security.KeyVault.Keys/examples/7.5/wrapKey-example.json +++ b/specification/keyvault/Security.KeyVault.Keys/examples/7.5/wrapKey-example.json @@ -5,7 +5,7 @@ "key-version": "0698c2156c1a4e1da5b6bab6f6422fd6", "api-version": "7.5", "parameters": { - "alg": "RSA1_5", + "alg": "RSA-OAEP-256", "value": "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" } }, @@ -13,7 +13,7 @@ "200": { "body": { "kid": "https://myvault.vault.azure.net/keys/sdktestkey/0698c2156c1a4e1da5b6bab6f6422fd6", - "value": "khwIe26NuAZazS7upywDBpGRmRNMW5-4h_JQKxOdB78nYVxZWnBXwCxOv7a3Sr_mCjiVzKsoQQZwL-CJzhYa0512tfYem56zls5a44y5QsdcfvuSzOvpthVhA9XkEfCJSqSY_sip5d8BelT_w_ikvd_8KqiQ_0H54RqYUN8svCpu28paHgBocHFNXTQ9NtU9ec2qgESXk7Jp4OTy9HJtQJavKDUqTJ3YmtLxUgsgBCe0FNMHUSEYC0Ys6PavYzdTwIzYCq84idmAxJOj-O_6eALJFH2sDTOQYHjzOae2t8eFmw6C-t55qjrCI91a9mUJEGPhYixiG4gR4PaEJ7wGvw" + "value": "jdweWJO8dmKw4feBggZGyiMcgTnxS6QycpTSKEZd9VV9munW+STSr45GimVdOXbBowArlrUDGUhrCa7Z1vv4HgwOPhKomDNSAgqt0t/TgPiIVWSN+cMcARj0Y8/hrZVzlu+IlWBv/MVyPoytASyH8eF1L3UQa4Xh8Ebpjvs9yAZsr9tWG2Q1sn4jKetRBJHz44IV4g2rTgut+rZHK9ubdNB91nzqoRuN162uQkKlC7tBuBASd53gOAeaxedTt1RuW7w56XzSx2k/60ehmBcNuLaYAds7g4e8qec1k+u6rc2scU4n+RHuZTvqXkwpEYUsAqKKn8G7wylSWjHszNUEUw" } } }, diff --git a/specification/keyvault/Security.KeyVault.Keys/examples/7.6-preview.1/wrapKey-example.json b/specification/keyvault/Security.KeyVault.Keys/examples/7.6-preview.1/wrapKey-example.json index aea5a3a92e25..46b4546f66b4 100644 --- a/specification/keyvault/Security.KeyVault.Keys/examples/7.6-preview.1/wrapKey-example.json +++ b/specification/keyvault/Security.KeyVault.Keys/examples/7.6-preview.1/wrapKey-example.json @@ -5,7 +5,7 @@ "key-version": "0698c2156c1a4e1da5b6bab6f6422fd6", "api-version": "7.6-preview.1", "parameters": { - "alg": "RSA1_5", + "alg": "RSA-OAEP-256", "value": "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" } }, @@ -13,7 +13,7 @@ "200": { "body": { "kid": "https://myvault.vault.azure.net/keys/sdktestkey/0698c2156c1a4e1da5b6bab6f6422fd6", - "value": "khwIe26NuAZazS7upywDBpGRmRNMW5-4h_JQKxOdB78nYVxZWnBXwCxOv7a3Sr_mCjiVzKsoQQZwL-CJzhYa0512tfYem56zls5a44y5QsdcfvuSzOvpthVhA9XkEfCJSqSY_sip5d8BelT_w_ikvd_8KqiQ_0H54RqYUN8svCpu28paHgBocHFNXTQ9NtU9ec2qgESXk7Jp4OTy9HJtQJavKDUqTJ3YmtLxUgsgBCe0FNMHUSEYC0Ys6PavYzdTwIzYCq84idmAxJOj-O_6eALJFH2sDTOQYHjzOae2t8eFmw6C-t55qjrCI91a9mUJEGPhYixiG4gR4PaEJ7wGvw" + "value": "jdweWJO8dmKw4feBggZGyiMcgTnxS6QycpTSKEZd9VV9munW+STSr45GimVdOXbBowArlrUDGUhrCa7Z1vv4HgwOPhKomDNSAgqt0t/TgPiIVWSN+cMcARj0Y8/hrZVzlu+IlWBv/MVyPoytASyH8eF1L3UQa4Xh8Ebpjvs9yAZsr9tWG2Q1sn4jKetRBJHz44IV4g2rTgut+rZHK9ubdNB91nzqoRuN162uQkKlC7tBuBASd53gOAeaxedTt1RuW7w56XzSx2k/60ehmBcNuLaYAds7g4e8qec1k+u6rc2scU4n+RHuZTvqXkwpEYUsAqKKn8G7wylSWjHszNUEUw" } } }, diff --git a/specification/keyvault/Security.KeyVault.Keys/models.tsp b/specification/keyvault/Security.KeyVault.Keys/models.tsp index 79adb4ee74f7..1229c5f7012f 100644 --- a/specification/keyvault/Security.KeyVault.Keys/models.tsp +++ b/specification/keyvault/Security.KeyVault.Keys/models.tsp @@ -146,7 +146,7 @@ union JsonWebKeyEncryptionAlgorithm { string, /** - * RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1. + * [Not recommended] RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_OAEP, which is included solely for backwards compatibility. RSA_OAEP utilizes SHA1, which has known collision problems. */ RSA_OAEP: "RSA-OAEP", @@ -155,7 +155,7 @@ union JsonWebKeyEncryptionAlgorithm { */ RSA_OAEP256: "RSA-OAEP-256", - /** RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447. */ + /** [Not recommended] RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_1_5, which is included solely for backwards compatibility. Cryptographic standards no longer consider RSA with the PKCS#1 v1.5 padding scheme secure for encryption. */ RSA1_5: "RSA1_5", /** 128-bit AES-GCM. */ diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/examples/wrapKey-example.json b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/examples/wrapKey-example.json index aea5a3a92e25..46b4546f66b4 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/examples/wrapKey-example.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/examples/wrapKey-example.json @@ -5,7 +5,7 @@ "key-version": "0698c2156c1a4e1da5b6bab6f6422fd6", "api-version": "7.6-preview.1", "parameters": { - "alg": "RSA1_5", + "alg": "RSA-OAEP-256", "value": "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" } }, @@ -13,7 +13,7 @@ "200": { "body": { "kid": "https://myvault.vault.azure.net/keys/sdktestkey/0698c2156c1a4e1da5b6bab6f6422fd6", - "value": "khwIe26NuAZazS7upywDBpGRmRNMW5-4h_JQKxOdB78nYVxZWnBXwCxOv7a3Sr_mCjiVzKsoQQZwL-CJzhYa0512tfYem56zls5a44y5QsdcfvuSzOvpthVhA9XkEfCJSqSY_sip5d8BelT_w_ikvd_8KqiQ_0H54RqYUN8svCpu28paHgBocHFNXTQ9NtU9ec2qgESXk7Jp4OTy9HJtQJavKDUqTJ3YmtLxUgsgBCe0FNMHUSEYC0Ys6PavYzdTwIzYCq84idmAxJOj-O_6eALJFH2sDTOQYHjzOae2t8eFmw6C-t55qjrCI91a9mUJEGPhYixiG4gR4PaEJ7wGvw" + "value": "jdweWJO8dmKw4feBggZGyiMcgTnxS6QycpTSKEZd9VV9munW+STSr45GimVdOXbBowArlrUDGUhrCa7Z1vv4HgwOPhKomDNSAgqt0t/TgPiIVWSN+cMcARj0Y8/hrZVzlu+IlWBv/MVyPoytASyH8eF1L3UQa4Xh8Ebpjvs9yAZsr9tWG2Q1sn4jKetRBJHz44IV4g2rTgut+rZHK9ubdNB91nzqoRuN162uQkKlC7tBuBASd53gOAeaxedTt1RuW7w56XzSx2k/60ehmBcNuLaYAds7g4e8qec1k+u6rc2scU4n+RHuZTvqXkwpEYUsAqKKn8G7wylSWjHszNUEUw" } } }, diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/keys.json b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/keys.json index f861ee5a84be..1c7795a2c6c5 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/keys.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.6-preview.1/keys.json @@ -1577,7 +1577,7 @@ { "name": "RSA_OAEP", "value": "RSA-OAEP", - "description": "RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1." + "description": "[Not recommended] RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_OAEP, which is included solely for backwards compatibility. RSA_OAEP utilizes SHA1, which has known collision problems." }, { "name": "RSA_OAEP256", @@ -1587,7 +1587,7 @@ { "name": "RSA1_5", "value": "RSA1_5", - "description": "RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447." + "description": "[Not recommended] RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_1_5, which is included solely for backwards compatibility. Cryptographic standards no longer consider RSA with the PKCS#1 v1.5 padding scheme secure for encryption." }, { "name": "A128_GCM", diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/examples/wrapKey-example.json b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/examples/wrapKey-example.json index 04e7fd4ce67e..c10eb950290a 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/examples/wrapKey-example.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/examples/wrapKey-example.json @@ -5,7 +5,7 @@ "key-version": "0698c2156c1a4e1da5b6bab6f6422fd6", "api-version": "7.5", "parameters": { - "alg": "RSA1_5", + "alg": "RSA-OAEP-256", "value": "ovQIlbB0DgWhZA7sgkPxbg9H-Ly-VlNGPSgGrrZvlIo" } }, @@ -13,7 +13,7 @@ "200": { "body": { "kid": "https://myvault.vault.azure.net/keys/sdktestkey/0698c2156c1a4e1da5b6bab6f6422fd6", - "value": "khwIe26NuAZazS7upywDBpGRmRNMW5-4h_JQKxOdB78nYVxZWnBXwCxOv7a3Sr_mCjiVzKsoQQZwL-CJzhYa0512tfYem56zls5a44y5QsdcfvuSzOvpthVhA9XkEfCJSqSY_sip5d8BelT_w_ikvd_8KqiQ_0H54RqYUN8svCpu28paHgBocHFNXTQ9NtU9ec2qgESXk7Jp4OTy9HJtQJavKDUqTJ3YmtLxUgsgBCe0FNMHUSEYC0Ys6PavYzdTwIzYCq84idmAxJOj-O_6eALJFH2sDTOQYHjzOae2t8eFmw6C-t55qjrCI91a9mUJEGPhYixiG4gR4PaEJ7wGvw" + "value": "jdweWJO8dmKw4feBggZGyiMcgTnxS6QycpTSKEZd9VV9munW+STSr45GimVdOXbBowArlrUDGUhrCa7Z1vv4HgwOPhKomDNSAgqt0t/TgPiIVWSN+cMcARj0Y8/hrZVzlu+IlWBv/MVyPoytASyH8eF1L3UQa4Xh8Ebpjvs9yAZsr9tWG2Q1sn4jKetRBJHz44IV4g2rTgut+rZHK9ubdNB91nzqoRuN162uQkKlC7tBuBASd53gOAeaxedTt1RuW7w56XzSx2k/60ehmBcNuLaYAds7g4e8qec1k+u6rc2scU4n+RHuZTvqXkwpEYUsAqKKn8G7wylSWjHszNUEUw" } } }, diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/keys.json b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/keys.json index 13aaf35d233d..0b5da112a860 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/keys.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.5/keys.json @@ -1575,7 +1575,7 @@ { "name": "RSA_OAEP", "value": "RSA-OAEP", - "description": "RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1." + "description": "[Not recommended] RSAES using Optimal Asymmetric Encryption Padding (OAEP), as described in https://tools.ietf.org/html/rfc3447, with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_OAEP, which is included solely for backwards compatibility. RSA_OAEP utilizes SHA1, which has known collision problems." }, { "name": "RSA_OAEP256", @@ -1585,7 +1585,7 @@ { "name": "RSA1_5", "value": "RSA1_5", - "description": "RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447." + "description": "[Not recommended] RSAES-PKCS1-V1_5 key encryption, as described in https://tools.ietf.org/html/rfc3447. Microsoft recommends using RSA_OAEP_256 or stronger algorithms for enhanced security. Microsoft does *not* recommend RSA_1_5, which is included solely for backwards compatibility. Cryptographic standards no longer consider RSA with the PKCS#1 v1.5 padding scheme secure for encryption." }, { "name": "A128_GCM", diff --git a/specificationRepositoryConfiguration.json b/specificationRepositoryConfiguration.json index 9c6ad529e741..0b2c1930d549 100644 --- a/specificationRepositoryConfiguration.json +++ b/specificationRepositoryConfiguration.json @@ -17,10 +17,6 @@ "mainRepository": "Azure/azure-sdk-for-js" }, "azure-sdk-for-net": { - "integrationRepository": "azure-sdk/azure-sdk-for-net", - "mainRepository": "Azure/azure-sdk-for-net" - }, - "azure-sdk-for-net-track2": { "integrationRepository": "azure-sdk/azure-sdk-for-net", "mainRepository": "Azure/azure-sdk-for-net", "configFilePath": "eng/swagger_to_sdk_config.json" @@ -52,10 +48,6 @@ "mainRepository": "Azure/azure-sdk-for-js-pr" }, "azure-sdk-for-net": { - "integrationRepository": "azure-sdk/azure-sdk-for-net-pr", - "mainRepository": "Azure/azure-sdk-for-net-pr" - }, - "azure-sdk-for-net-track2": { "integrationRepository": "azure-sdk/azure-sdk-for-net-pr", "mainRepository": "Azure/azure-sdk-for-net-pr", "configFilePath": "eng/swagger_to_sdk_config.json" @@ -74,7 +66,7 @@ "typespecEmitterToSdkRepositoryMapping": { "@azure-tools/typespec-python": "azure-sdk-for-python", "@azure-tools/typespec-java": "azure-sdk-for-java", - "@azure-tools/typespec-csharp": "azure-sdk-for-net-track2", + "@azure-tools/typespec-csharp": "azure-sdk-for-net", "@azure-tools/typespec-ts": "azure-sdk-for-js", "@azure-tools/typespec-go": "azure-sdk-for-go" }