Skip to content

Enable Azure Key Vault for compute linked services#2405

Merged
jianghaolu merged 1 commit intoAzure:masterfrom
fhljys:fangl/akv-for-compute
Feb 6, 2018
Merged

Enable Azure Key Vault for compute linked services#2405
jianghaolu merged 1 commit intoAzure:masterfrom
fhljys:fangl/akv-for-compute

Conversation

@fhljys
Copy link
Copy Markdown
Member

@fhljys fhljys commented Feb 2, 2018

This checklist is used to make sure that common issues in a pull request are addressed. This will expedite the process of getting your pull request merged and avoid extra work on your part to fix issues discovered during the review process.

PR information

  • [Y] The title of the PR is clear and informative.
  • [Y] There are a small number of commits, each of which have an informative message. This means that previously merged commits do not appear in the history of the PR. For information on cleaning up the commits in your pull request, see this page.
  • [Y] Except for special cases involving multiple contributors, the PR is started from a fork of the main repository, not a branch.
  • [Y] If applicable, the PR references the bug/issue that it fixes.
  • [Y] Swagger files are correctly named (e.g. the api-version in the path should match the api-version in the spec).

Quality of Swagger

@AutorestCI
Copy link
Copy Markdown

This commit was treated and no generation was made for Azure/azure-sdk-for-python

@AutorestCI
Copy link
Copy Markdown

This commit was treated and no generation was made for Azure/azure-sdk-for-go

@azuresdkciprbot
Copy link
Copy Markdown

Hi There,

I am the AutoRest Linter Azure bot. I am here to help. My task is to analyze the situation from the AutoRest linter perspective. Please review the below analysis result:

File: specification/datafactory/resource-manager/readme.md
Before the PR: Warning(s): 0 Error(s): 1
After the PR: Warning(s): 0 Error(s): 1

AutoRest Linter Guidelines | AutoRest Linter Issues | Send feedback

Thanks for your co-operation.

"accessKey": {
"description": "The Azure Batch account access key.",
"$ref": "../datafactory.json#/definitions/SecureString"
"$ref": "../datafactory.json#/definitions/SecretBase"
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cannot resolve reference. "../../datafactory.json#/definitions/SecretBase"?

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In datafactory.json,

Theres is "SecretBase": {
"description": "The base definition of a secret type.",
"discriminator": "type",
"type": "object",
"properties": {
"type": {
"type": "string",
"description": "Type of the secret."
}
},
"required": [
"type"
]
},
Should I add it to somewhere else?

@jianghaolu jianghaolu merged commit eddfd45 into Azure:master Feb 6, 2018
@AutorestCI
Copy link
Copy Markdown

AutorestCI commented Feb 6, 2018

Automation for azure-sdk-for-python

Was unable to create SDK azure-sdk-for-python PR for this closed PR.

@jianghaolu
Copy link
Copy Markdown
Contributor

Per communication offline, the error in semantic validation is a false alarm.

Oops, this looks like a bug in travis-ci logic. So for PR_ONLY=true mode, we run the semantic validator on the files that were touched in this PR. Unfortunately this is the PR where only the file containing the model definitions (LinkedService.json) was touched. The actual swagger spec (datafactory.json) was not touched. The actual swagger spec should have been the entry point for the semantic validator instead of the external model file.
If I execute the following command on my machine, then everything works fine.
oav validate-spec https://github.com/fhljys/azure-rest-api-specs/blob/19db39b7ade68cf715a6d4102d6faf81d9215f30/specification/datafactory/resource-manager/Microsoft.DataFactory/preview/2017-09-01-preview/datafactory.json
info: No Errors were found.
Bottom line: in PR_ONLY true mode we need to ensure that we are validating a swagger spec and not a model definition file. The problem here is that model definition files are also swagger specs but they only have model definitions no paths. So we need to find an intelligent way to find out the right swagger spec(entry point) and validate accordingly.
Thanks,
Amar

@AutorestCI
Copy link
Copy Markdown

This commit was treated and no generation was made for Azure/azure-sdk-for-go

@AutorestCI
Copy link
Copy Markdown

Swagger to SDK encountered an unknown error: (Azure/azure-sdk-for-go)

Traceback (most recent call last):
  File "/usr/local/lib/python3.6/dist-packages/swaggertosdk/github_tools.py", line 29, in exception_to_github
    yield context
  File "/usr/local/lib/python3.6/dist-packages/swaggertosdk/restapi/github.py", line 180, in rest_handle_action
    return rest_pull_close(body, github_con, restapi_repo, sdk_pr_target_repo, sdkbase)
  File "/usr/local/lib/python3.6/dist-packages/swaggertosdk/restapi/github.py", line 311, in rest_pull_close
    rest_pr.create_issue_comment("Was unable to create SDK %s PR for this closed PR.", sdkid)
TypeError: create_issue_comment() takes 2 positional arguments but 3 were given

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants