Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ReleasePR azure-mgmt-sql] SQLDB - update LicenseType description #11356

Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions sdk/sql/azure-mgmt-sql/azure/mgmt/sql/models/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -177,6 +177,7 @@
from ._models_py3 import TrackedResource
from ._models_py3 import TransparentDataEncryption
from ._models_py3 import TransparentDataEncryptionActivity
from ._models_py3 import UnlinkParameters
from ._models_py3 import Usage
from ._models_py3 import VirtualCluster
from ._models_py3 import VirtualClusterUpdate
Expand Down Expand Up @@ -354,6 +355,7 @@
from ._models import TrackedResource
from ._models import TransparentDataEncryption
from ._models import TransparentDataEncryptionActivity
from ._models import UnlinkParameters
from ._models import Usage
from ._models import VirtualCluster
from ._models import VirtualClusterUpdate
Expand All @@ -375,6 +377,8 @@
from ._paged_models import ElasticPoolOperationPaged
from ._paged_models import ElasticPoolPaged
from ._paged_models import EncryptionProtectorPaged
from ._paged_models import ExtendedDatabaseBlobAuditingPolicyPaged
from ._paged_models import ExtendedServerBlobAuditingPolicyPaged
from ._paged_models import FailoverGroupPaged
from ._paged_models import FirewallRulePaged
from ._paged_models import GeoBackupPolicyPaged
Expand Down Expand Up @@ -705,6 +709,7 @@
'TrackedResource',
'TransparentDataEncryption',
'TransparentDataEncryptionActivity',
'UnlinkParameters',
'Usage',
'VirtualCluster',
'VirtualClusterUpdate',
Expand Down Expand Up @@ -748,6 +753,8 @@
'SubscriptionUsagePaged',
'VirtualClusterPaged',
'VirtualNetworkRulePaged',
'ExtendedDatabaseBlobAuditingPolicyPaged',
'ExtendedServerBlobAuditingPolicyPaged',
'ServerBlobAuditingPolicyPaged',
'DatabaseBlobAuditingPolicyPaged',
'DatabaseVulnerabilityAssessmentPaged',
Expand Down
81 changes: 69 additions & 12 deletions sdk/sql/azure-mgmt-sql/azure/mgmt/sql/models/_models.py
Original file line number Diff line number Diff line change
Expand Up @@ -597,8 +597,10 @@ class Database(TrackedResource):
which means the replicas of this database will be spread across multiple
availability zones.
:type zone_redundant: bool
:param license_type: The license type to apply for this database. Possible
values include: 'LicenseIncluded', 'BasePrice'
:param license_type: The license type to apply for this database.
`LicenseIncluded` if you need a license, or `BasePrice` if you have a
license and are eligible for the Azure Hybrid Benefit. Possible values
include: 'LicenseIncluded', 'BasePrice'
:type license_type: str or ~azure.mgmt.sql.models.DatabaseLicenseType
:ivar max_log_size_bytes: The max log size for this database.
:vartype max_log_size_bytes: long
Expand Down Expand Up @@ -802,8 +804,17 @@ class DatabaseBlobAuditingPolicy(ProxyResource):
storageEndpoint or isAzureMonitorTargetEnabled is required.
:type storage_endpoint: str
:param storage_account_access_key: Specifies the identifier key of the
auditing storage account. If state is Enabled and storageEndpoint is
specified, storageAccountAccessKey is required.
auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the
storageAccountAccessKey will use SQL server system-assigned managed
identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active
Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding
'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity
authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
:type storage_account_access_key: str
:param retention_days: Specifies the number of days to keep in the audit
logs in the storage account.
Expand Down Expand Up @@ -1233,8 +1244,10 @@ class DatabaseUpdate(Model):
which means the replicas of this database will be spread across multiple
availability zones.
:type zone_redundant: bool
:param license_type: The license type to apply for this database. Possible
values include: 'LicenseIncluded', 'BasePrice'
:param license_type: The license type to apply for this database.
`LicenseIncluded` if you need a license, or `BasePrice` if you have a
license and are eligible for the Azure Hybrid Benefit. Possible values
include: 'LicenseIncluded', 'BasePrice'
:type license_type: str or ~azure.mgmt.sql.models.DatabaseLicenseType
:ivar max_log_size_bytes: The max log size for this database.
:vartype max_log_size_bytes: long
Expand Down Expand Up @@ -2671,8 +2684,17 @@ class ExtendedDatabaseBlobAuditingPolicy(ProxyResource):
storageEndpoint or isAzureMonitorTargetEnabled is required.
:type storage_endpoint: str
:param storage_account_access_key: Specifies the identifier key of the
auditing storage account. If state is Enabled and storageEndpoint is
specified, storageAccountAccessKey is required.
auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the
storageAccountAccessKey will use SQL server system-assigned managed
identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active
Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding
'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity
authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
:type storage_account_access_key: str
:param retention_days: Specifies the number of days to keep in the audit
logs in the storage account.
Expand Down Expand Up @@ -2831,8 +2853,17 @@ class ExtendedServerBlobAuditingPolicy(ProxyResource):
storageEndpoint or isAzureMonitorTargetEnabled is required.
:type storage_endpoint: str
:param storage_account_access_key: Specifies the identifier key of the
auditing storage account. If state is Enabled and storageEndpoint is
specified, storageAccountAccessKey is required.
auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the
storageAccountAccessKey will use SQL server system-assigned managed
identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active
Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding
'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity
authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
:type storage_account_access_key: str
:param retention_days: Specifies the number of days to keep in the audit
logs in the storage account.
Expand Down Expand Up @@ -7778,8 +7809,17 @@ class ServerBlobAuditingPolicy(ProxyResource):
storageEndpoint or isAzureMonitorTargetEnabled is required.
:type storage_endpoint: str
:param storage_account_access_key: Specifies the identifier key of the
auditing storage account. If state is Enabled and storageEndpoint is
specified, storageAccountAccessKey is required.
auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the
storageAccountAccessKey will use SQL server system-assigned managed
identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active
Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding
'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity
authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
:type storage_account_access_key: str
:param retention_days: Specifies the number of days to keep in the audit
logs in the storage account.
Expand Down Expand Up @@ -9609,6 +9649,23 @@ def __init__(self, **kwargs):
self.percent_complete = None


class UnlinkParameters(Model):
"""Represents the parameters for Unlink Replication Link request.

:param forced_termination: Determines whether link will be terminated in a
forced or a friendly way.
:type forced_termination: bool
"""

_attribute_map = {
'forced_termination': {'key': 'forcedTermination', 'type': 'bool'},
}

def __init__(self, **kwargs):
super(UnlinkParameters, self).__init__(**kwargs)
self.forced_termination = kwargs.get('forced_termination', None)


class Usage(Model):
"""ARM usage.

Expand Down
81 changes: 69 additions & 12 deletions sdk/sql/azure-mgmt-sql/azure/mgmt/sql/models/_models_py3.py
Original file line number Diff line number Diff line change
Expand Up @@ -597,8 +597,10 @@ class Database(TrackedResource):
which means the replicas of this database will be spread across multiple
availability zones.
:type zone_redundant: bool
:param license_type: The license type to apply for this database. Possible
values include: 'LicenseIncluded', 'BasePrice'
:param license_type: The license type to apply for this database.
`LicenseIncluded` if you need a license, or `BasePrice` if you have a
license and are eligible for the Azure Hybrid Benefit. Possible values
include: 'LicenseIncluded', 'BasePrice'
:type license_type: str or ~azure.mgmt.sql.models.DatabaseLicenseType
:ivar max_log_size_bytes: The max log size for this database.
:vartype max_log_size_bytes: long
Expand Down Expand Up @@ -802,8 +804,17 @@ class DatabaseBlobAuditingPolicy(ProxyResource):
storageEndpoint or isAzureMonitorTargetEnabled is required.
:type storage_endpoint: str
:param storage_account_access_key: Specifies the identifier key of the
auditing storage account. If state is Enabled and storageEndpoint is
specified, storageAccountAccessKey is required.
auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the
storageAccountAccessKey will use SQL server system-assigned managed
identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active
Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding
'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity
authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
:type storage_account_access_key: str
:param retention_days: Specifies the number of days to keep in the audit
logs in the storage account.
Expand Down Expand Up @@ -1233,8 +1244,10 @@ class DatabaseUpdate(Model):
which means the replicas of this database will be spread across multiple
availability zones.
:type zone_redundant: bool
:param license_type: The license type to apply for this database. Possible
values include: 'LicenseIncluded', 'BasePrice'
:param license_type: The license type to apply for this database.
`LicenseIncluded` if you need a license, or `BasePrice` if you have a
license and are eligible for the Azure Hybrid Benefit. Possible values
include: 'LicenseIncluded', 'BasePrice'
:type license_type: str or ~azure.mgmt.sql.models.DatabaseLicenseType
:ivar max_log_size_bytes: The max log size for this database.
:vartype max_log_size_bytes: long
Expand Down Expand Up @@ -2671,8 +2684,17 @@ class ExtendedDatabaseBlobAuditingPolicy(ProxyResource):
storageEndpoint or isAzureMonitorTargetEnabled is required.
:type storage_endpoint: str
:param storage_account_access_key: Specifies the identifier key of the
auditing storage account. If state is Enabled and storageEndpoint is
specified, storageAccountAccessKey is required.
auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the
storageAccountAccessKey will use SQL server system-assigned managed
identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active
Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding
'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity
authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
:type storage_account_access_key: str
:param retention_days: Specifies the number of days to keep in the audit
logs in the storage account.
Expand Down Expand Up @@ -2831,8 +2853,17 @@ class ExtendedServerBlobAuditingPolicy(ProxyResource):
storageEndpoint or isAzureMonitorTargetEnabled is required.
:type storage_endpoint: str
:param storage_account_access_key: Specifies the identifier key of the
auditing storage account. If state is Enabled and storageEndpoint is
specified, storageAccountAccessKey is required.
auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the
storageAccountAccessKey will use SQL server system-assigned managed
identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active
Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding
'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity
authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
:type storage_account_access_key: str
:param retention_days: Specifies the number of days to keep in the audit
logs in the storage account.
Expand Down Expand Up @@ -7778,8 +7809,17 @@ class ServerBlobAuditingPolicy(ProxyResource):
storageEndpoint or isAzureMonitorTargetEnabled is required.
:type storage_endpoint: str
:param storage_account_access_key: Specifies the identifier key of the
auditing storage account. If state is Enabled and storageEndpoint is
specified, storageAccountAccessKey is required.
auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the
storageAccountAccessKey will use SQL server system-assigned managed
identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active
Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding
'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity
authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
:type storage_account_access_key: str
:param retention_days: Specifies the number of days to keep in the audit
logs in the storage account.
Expand Down Expand Up @@ -9609,6 +9649,23 @@ def __init__(self, **kwargs) -> None:
self.percent_complete = None


class UnlinkParameters(Model):
"""Represents the parameters for Unlink Replication Link request.

:param forced_termination: Determines whether link will be terminated in a
forced or a friendly way.
:type forced_termination: bool
"""

_attribute_map = {
'forced_termination': {'key': 'forcedTermination', 'type': 'bool'},
}

def __init__(self, *, forced_termination: bool=None, **kwargs) -> None:
super(UnlinkParameters, self).__init__(**kwargs)
self.forced_termination = forced_termination


class Usage(Model):
"""ARM usage.

Expand Down
26 changes: 26 additions & 0 deletions sdk/sql/azure-mgmt-sql/azure/mgmt/sql/models/_paged_models.py
Original file line number Diff line number Diff line change
Expand Up @@ -454,6 +454,32 @@ class VirtualNetworkRulePaged(Paged):
def __init__(self, *args, **kwargs):

super(VirtualNetworkRulePaged, self).__init__(*args, **kwargs)
class ExtendedDatabaseBlobAuditingPolicyPaged(Paged):
"""
A paging container for iterating over a list of :class:`ExtendedDatabaseBlobAuditingPolicy <azure.mgmt.sql.models.ExtendedDatabaseBlobAuditingPolicy>` object
"""

_attribute_map = {
'next_link': {'key': 'nextLink', 'type': 'str'},
'current_page': {'key': 'value', 'type': '[ExtendedDatabaseBlobAuditingPolicy]'}
}

def __init__(self, *args, **kwargs):

super(ExtendedDatabaseBlobAuditingPolicyPaged, self).__init__(*args, **kwargs)
class ExtendedServerBlobAuditingPolicyPaged(Paged):
"""
A paging container for iterating over a list of :class:`ExtendedServerBlobAuditingPolicy <azure.mgmt.sql.models.ExtendedServerBlobAuditingPolicy>` object
"""

_attribute_map = {
'next_link': {'key': 'nextLink', 'type': 'str'},
'current_page': {'key': 'value', 'type': '[ExtendedServerBlobAuditingPolicy]'}
}

def __init__(self, *args, **kwargs):

super(ExtendedServerBlobAuditingPolicyPaged, self).__init__(*args, **kwargs)
class ServerBlobAuditingPolicyPaged(Paged):
"""
A paging container for iterating over a list of :class:`ServerBlobAuditingPolicy <azure.mgmt.sql.models.ServerBlobAuditingPolicy>` object
Expand Down
Loading