diff --git a/sdk/rdbms/azure-mgmt-rdbms/_meta.json b/sdk/rdbms/azure-mgmt-rdbms/_meta.json index f3691bf4a228..447b80d9bda3 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/_meta.json +++ b/sdk/rdbms/azure-mgmt-rdbms/_meta.json @@ -1,11 +1,11 @@ { - "commit": "87589a8b18e6dc791e0b49fadc74c5a513c5dd73", + "commit": "2353c808b334ddb01d52401b6815d2c36f06a95b", "repository_url": "https://github.com/Azure/azure-rest-api-specs", "autorest": "3.9.2", "use": [ "@autorest/python@6.4.8", "@autorest/modelerfour@4.24.3" ], - "autorest_command": "autorest specification/mysql/resource-manager/readme.md --generate-sample=True --include-x-ms-examples-original-file=True --python --python-sdks-folder=/home/vsts/work/1/azure-sdk-for-python/sdk --use=@autorest/python@6.4.8 --use=@autorest/modelerfour@4.24.3 --version=3.9.2 --version-tolerant=False", - "readme": "specification/mysql/resource-manager/readme.md" + "autorest_command": "autorest specification/postgresql/resource-manager/readme.md --generate-sample=True --include-x-ms-examples-original-file=True --python --python-sdks-folder=/mnt/vss/_work/1/s/azure-sdk-for-python/sdk --use=@autorest/python@6.4.8 --use=@autorest/modelerfour@4.24.3 --version=3.9.2 --version-tolerant=False", + "readme": "specification/postgresql/resource-manager/readme.md" } \ No newline at end of file diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql/_version.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql/_version.py index 91208d5dd7b5..e5754a47ce68 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql/_version.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql/_version.py @@ -6,4 +6,4 @@ # Changes may cause incorrect behavior and will be lost if the code is regenerated. # -------------------------------------------------------------------------- -VERSION = "10.2.0b7" +VERSION = "1.0.0b1" diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_configuration.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_configuration.py index bb402eb97577..25cfe24e4acf 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_configuration.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_configuration.py @@ -29,14 +29,14 @@ class PostgreSQLManagementClientConfiguration(Configuration): # pylint: disable :type credential: ~azure.core.credentials.TokenCredential :param subscription_id: The ID of the target subscription. Required. :type subscription_id: str - :keyword api_version: Api Version. Default value is "2022-12-01". Note that overriding this - default value may result in unsupported behavior. + :keyword api_version: Api Version. Default value is "2023-03-01-preview". Note that overriding + this default value may result in unsupported behavior. :paramtype api_version: str """ def __init__(self, credential: "TokenCredential", subscription_id: str, **kwargs: Any) -> None: super(PostgreSQLManagementClientConfiguration, self).__init__(**kwargs) - api_version: str = kwargs.pop("api_version", "2022-12-01") + api_version: str = kwargs.pop("api_version", "2023-03-01-preview") if credential is None: raise ValueError("Parameter 'credential' must not be None.") diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_postgre_sql_management_client.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_postgre_sql_management_client.py index bfd1826600e5..b9aa19d3e3fe 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_postgre_sql_management_client.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_postgre_sql_management_client.py @@ -25,8 +25,10 @@ FirewallRulesOperations, GetPrivateDnsZoneSuffixOperations, LocationBasedCapabilitiesOperations, + LogFilesOperations, Operations, ReplicasOperations, + ServerCapabilitiesOperations, ServersOperations, VirtualNetworkSubnetUsageOperations, ) @@ -49,6 +51,9 @@ class PostgreSQLManagementClient: # pylint: disable=client-accepts-api-version- :ivar location_based_capabilities: LocationBasedCapabilitiesOperations operations :vartype location_based_capabilities: azure.mgmt.rdbms.postgresql_flexibleservers.operations.LocationBasedCapabilitiesOperations + :ivar server_capabilities: ServerCapabilitiesOperations operations + :vartype server_capabilities: + azure.mgmt.rdbms.postgresql_flexibleservers.operations.ServerCapabilitiesOperations :ivar check_name_availability: CheckNameAvailabilityOperations operations :vartype check_name_availability: azure.mgmt.rdbms.postgresql_flexibleservers.operations.CheckNameAvailabilityOperations @@ -73,6 +78,8 @@ class PostgreSQLManagementClient: # pylint: disable=client-accepts-api-version- azure.mgmt.rdbms.postgresql_flexibleservers.operations.GetPrivateDnsZoneSuffixOperations :ivar replicas: ReplicasOperations operations :vartype replicas: azure.mgmt.rdbms.postgresql_flexibleservers.operations.ReplicasOperations + :ivar log_files: LogFilesOperations operations + :vartype log_files: azure.mgmt.rdbms.postgresql_flexibleservers.operations.LogFilesOperations :ivar virtual_network_subnet_usage: VirtualNetworkSubnetUsageOperations operations :vartype virtual_network_subnet_usage: azure.mgmt.rdbms.postgresql_flexibleservers.operations.VirtualNetworkSubnetUsageOperations @@ -82,8 +89,8 @@ class PostgreSQLManagementClient: # pylint: disable=client-accepts-api-version- :type subscription_id: str :param base_url: Service URL. Default value is "https://management.azure.com". :type base_url: str - :keyword api_version: Api Version. Default value is "2022-12-01". Note that overriding this - default value may result in unsupported behavior. + :keyword api_version: Api Version. Default value is "2023-03-01-preview". Note that overriding + this default value may result in unsupported behavior. :paramtype api_version: str :keyword int polling_interval: Default waiting time between two polls for LRO operations if no Retry-After header is present. @@ -110,6 +117,9 @@ def __init__( self.location_based_capabilities = LocationBasedCapabilitiesOperations( self._client, self._config, self._serialize, self._deserialize ) + self.server_capabilities = ServerCapabilitiesOperations( + self._client, self._config, self._serialize, self._deserialize + ) self.check_name_availability = CheckNameAvailabilityOperations( self._client, self._config, self._serialize, self._deserialize ) @@ -125,6 +135,7 @@ def __init__( self._client, self._config, self._serialize, self._deserialize ) self.replicas = ReplicasOperations(self._client, self._config, self._serialize, self._deserialize) + self.log_files = LogFilesOperations(self._client, self._config, self._serialize, self._deserialize) self.virtual_network_subnet_usage = VirtualNetworkSubnetUsageOperations( self._client, self._config, self._serialize, self._deserialize ) diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_version.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_version.py index 91208d5dd7b5..e5754a47ce68 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_version.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/_version.py @@ -6,4 +6,4 @@ # Changes may cause incorrect behavior and will be lost if the code is regenerated. # -------------------------------------------------------------------------- -VERSION = "10.2.0b7" +VERSION = "1.0.0b1" diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/_configuration.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/_configuration.py index fdd0cc855357..a360d1e66c98 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/_configuration.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/_configuration.py @@ -29,14 +29,14 @@ class PostgreSQLManagementClientConfiguration(Configuration): # pylint: disable :type credential: ~azure.core.credentials_async.AsyncTokenCredential :param subscription_id: The ID of the target subscription. Required. :type subscription_id: str - :keyword api_version: Api Version. Default value is "2022-12-01". Note that overriding this - default value may result in unsupported behavior. + :keyword api_version: Api Version. Default value is "2023-03-01-preview". Note that overriding + this default value may result in unsupported behavior. :paramtype api_version: str """ def __init__(self, credential: "AsyncTokenCredential", subscription_id: str, **kwargs: Any) -> None: super(PostgreSQLManagementClientConfiguration, self).__init__(**kwargs) - api_version: str = kwargs.pop("api_version", "2022-12-01") + api_version: str = kwargs.pop("api_version", "2023-03-01-preview") if credential is None: raise ValueError("Parameter 'credential' must not be None.") diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/_postgre_sql_management_client.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/_postgre_sql_management_client.py index ebbfb195bd8a..a7367a74d3ea 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/_postgre_sql_management_client.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/_postgre_sql_management_client.py @@ -25,8 +25,10 @@ FirewallRulesOperations, GetPrivateDnsZoneSuffixOperations, LocationBasedCapabilitiesOperations, + LogFilesOperations, Operations, ReplicasOperations, + ServerCapabilitiesOperations, ServersOperations, VirtualNetworkSubnetUsageOperations, ) @@ -49,6 +51,9 @@ class PostgreSQLManagementClient: # pylint: disable=client-accepts-api-version- :ivar location_based_capabilities: LocationBasedCapabilitiesOperations operations :vartype location_based_capabilities: azure.mgmt.rdbms.postgresql_flexibleservers.aio.operations.LocationBasedCapabilitiesOperations + :ivar server_capabilities: ServerCapabilitiesOperations operations + :vartype server_capabilities: + azure.mgmt.rdbms.postgresql_flexibleservers.aio.operations.ServerCapabilitiesOperations :ivar check_name_availability: CheckNameAvailabilityOperations operations :vartype check_name_availability: azure.mgmt.rdbms.postgresql_flexibleservers.aio.operations.CheckNameAvailabilityOperations @@ -75,6 +80,9 @@ class PostgreSQLManagementClient: # pylint: disable=client-accepts-api-version- :ivar replicas: ReplicasOperations operations :vartype replicas: azure.mgmt.rdbms.postgresql_flexibleservers.aio.operations.ReplicasOperations + :ivar log_files: LogFilesOperations operations + :vartype log_files: + azure.mgmt.rdbms.postgresql_flexibleservers.aio.operations.LogFilesOperations :ivar virtual_network_subnet_usage: VirtualNetworkSubnetUsageOperations operations :vartype virtual_network_subnet_usage: azure.mgmt.rdbms.postgresql_flexibleservers.aio.operations.VirtualNetworkSubnetUsageOperations @@ -84,8 +92,8 @@ class PostgreSQLManagementClient: # pylint: disable=client-accepts-api-version- :type subscription_id: str :param base_url: Service URL. Default value is "https://management.azure.com". :type base_url: str - :keyword api_version: Api Version. Default value is "2022-12-01". Note that overriding this - default value may result in unsupported behavior. + :keyword api_version: Api Version. Default value is "2023-03-01-preview". Note that overriding + this default value may result in unsupported behavior. :paramtype api_version: str :keyword int polling_interval: Default waiting time between two polls for LRO operations if no Retry-After header is present. @@ -112,6 +120,9 @@ def __init__( self.location_based_capabilities = LocationBasedCapabilitiesOperations( self._client, self._config, self._serialize, self._deserialize ) + self.server_capabilities = ServerCapabilitiesOperations( + self._client, self._config, self._serialize, self._deserialize + ) self.check_name_availability = CheckNameAvailabilityOperations( self._client, self._config, self._serialize, self._deserialize ) @@ -127,6 +138,7 @@ def __init__( self._client, self._config, self._serialize, self._deserialize ) self.replicas = ReplicasOperations(self._client, self._config, self._serialize, self._deserialize) + self.log_files = LogFilesOperations(self._client, self._config, self._serialize, self._deserialize) self.virtual_network_subnet_usage = VirtualNetworkSubnetUsageOperations( self._client, self._config, self._serialize, self._deserialize ) diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/__init__.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/__init__.py index 2bb2626b6162..f27d647ef2c2 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/__init__.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/__init__.py @@ -9,6 +9,7 @@ from ._administrators_operations import AdministratorsOperations from ._backups_operations import BackupsOperations from ._location_based_capabilities_operations import LocationBasedCapabilitiesOperations +from ._server_capabilities_operations import ServerCapabilitiesOperations from ._check_name_availability_operations import CheckNameAvailabilityOperations from ._check_name_availability_with_location_operations import CheckNameAvailabilityWithLocationOperations from ._configurations_operations import ConfigurationsOperations @@ -18,6 +19,7 @@ from ._operations import Operations from ._get_private_dns_zone_suffix_operations import GetPrivateDnsZoneSuffixOperations from ._replicas_operations import ReplicasOperations +from ._log_files_operations import LogFilesOperations from ._virtual_network_subnet_usage_operations import VirtualNetworkSubnetUsageOperations from ._patch import __all__ as _patch_all @@ -28,6 +30,7 @@ "AdministratorsOperations", "BackupsOperations", "LocationBasedCapabilitiesOperations", + "ServerCapabilitiesOperations", "CheckNameAvailabilityOperations", "CheckNameAvailabilityWithLocationOperations", "ConfigurationsOperations", @@ -37,6 +40,7 @@ "Operations", "GetPrivateDnsZoneSuffixOperations", "ReplicasOperations", + "LogFilesOperations", "VirtualNetworkSubnetUsageOperations", ] __all__.extend([p for p in _patch_all if p not in __all__]) diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_location_based_capabilities_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_location_based_capabilities_operations.py index 2fcbfc8d718c..58db1a2c2f26 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_location_based_capabilities_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_location_based_capabilities_operations.py @@ -6,10 +6,8 @@ # Code generated by Microsoft (R) AutoRest Code Generator. # Changes may cause incorrect behavior and will be lost if the code is regenerated. # -------------------------------------------------------------------------- -from typing import Any, AsyncIterable, Callable, Dict, Optional, TypeVar -import urllib.parse +from typing import Any, Callable, Dict, Optional, TypeVar -from azure.core.async_paging import AsyncItemPaged, AsyncList from azure.core.exceptions import ( ClientAuthenticationError, HttpResponseError, @@ -21,7 +19,7 @@ from azure.core.pipeline import PipelineResponse from azure.core.pipeline.transport import AsyncHttpResponse from azure.core.rest import HttpRequest -from azure.core.tracing.decorator import distributed_trace +from azure.core.tracing.decorator_async import distributed_trace_async from azure.core.utils import case_insensitive_dict from azure.mgmt.core.exceptions import ARMErrorFormat @@ -52,25 +50,17 @@ def __init__(self, *args, **kwargs) -> None: self._serialize = input_args.pop(0) if input_args else kwargs.pop("serializer") self._deserialize = input_args.pop(0) if input_args else kwargs.pop("deserializer") - @distributed_trace - def execute(self, location_name: str, **kwargs: Any) -> AsyncIterable["_models.CapabilityProperties"]: + @distributed_trace_async + async def execute(self, location_name: str, **kwargs: Any) -> _models.CapabilitiesListResult: """Get capabilities at specified location in a given subscription. :param location_name: The name of the location. Required. :type location_name: str :keyword callable cls: A custom type or function that will be passed the direct response - :return: An iterator like instance of either CapabilityProperties or the result of - cls(response) - :rtype: - ~azure.core.async_paging.AsyncItemPaged[~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilityProperties] + :return: CapabilitiesListResult or the result of cls(response) + :rtype: ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilitiesListResult :raises ~azure.core.exceptions.HttpResponseError: """ - _headers = kwargs.pop("headers", {}) or {} - _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - - api_version: str = kwargs.pop("api_version", _params.pop("api-version", self._config.api_version)) - cls: ClsType[_models.CapabilitiesListResult] = kwargs.pop("cls", None) - error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, @@ -79,62 +69,41 @@ def execute(self, location_name: str, **kwargs: Any) -> AsyncIterable["_models.C } error_map.update(kwargs.pop("error_map", {}) or {}) - def prepare_request(next_link=None): - if not next_link: - - request = build_execute_request( - location_name=location_name, - subscription_id=self._config.subscription_id, - api_version=api_version, - template_url=self.execute.metadata["url"], - headers=_headers, - params=_params, - ) - request = _convert_request(request) - request.url = self._client.format_url(request.url) - - else: - # make call to next link with the client's api-version - _parsed_next_link = urllib.parse.urlparse(next_link) - _next_request_params = case_insensitive_dict( - { - key: [urllib.parse.quote(v) for v in value] - for key, value in urllib.parse.parse_qs(_parsed_next_link.query).items() - } - ) - _next_request_params["api-version"] = self._config.api_version - request = HttpRequest( - "GET", urllib.parse.urljoin(next_link, _parsed_next_link.path), params=_next_request_params - ) - request = _convert_request(request) - request.url = self._client.format_url(request.url) - request.method = "GET" - return request - - async def extract_data(pipeline_response): - deserialized = self._deserialize("CapabilitiesListResult", pipeline_response) - list_of_elem = deserialized.value - if cls: - list_of_elem = cls(list_of_elem) # type: ignore - return deserialized.next_link or None, AsyncList(list_of_elem) - - async def get_next(next_link=None): - request = prepare_request(next_link) - - _stream = False - pipeline_response: PipelineResponse = await self._client._pipeline.run( # pylint: disable=protected-access - request, stream=_stream, **kwargs - ) - response = pipeline_response.http_response - - if response.status_code not in [200]: - map_error(status_code=response.status_code, response=response, error_map=error_map) - error = self._deserialize.failsafe_deserialize(_models.ErrorResponse, pipeline_response) - raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) - - return pipeline_response - - return AsyncItemPaged(get_next, extract_data) + _headers = kwargs.pop("headers", {}) or {} + _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) + + api_version: str = kwargs.pop("api_version", _params.pop("api-version", self._config.api_version)) + cls: ClsType[_models.CapabilitiesListResult] = kwargs.pop("cls", None) + + request = build_execute_request( + location_name=location_name, + subscription_id=self._config.subscription_id, + api_version=api_version, + template_url=self.execute.metadata["url"], + headers=_headers, + params=_params, + ) + request = _convert_request(request) + request.url = self._client.format_url(request.url) + + _stream = False + pipeline_response: PipelineResponse = await self._client._pipeline.run( # pylint: disable=protected-access + request, stream=_stream, **kwargs + ) + + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + error = self._deserialize.failsafe_deserialize(_models.ErrorResponse, pipeline_response) + raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) + + deserialized = self._deserialize("CapabilitiesListResult", pipeline_response) + + if cls: + return cls(pipeline_response, deserialized, {}) + + return deserialized execute.metadata = { "url": "/subscriptions/{subscriptionId}/providers/Microsoft.DBforPostgreSQL/locations/{locationName}/capabilities" diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_log_files_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_log_files_operations.py new file mode 100644 index 000000000000..a3c3d391f539 --- /dev/null +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_log_files_operations.py @@ -0,0 +1,146 @@ +# pylint: disable=too-many-lines +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is regenerated. +# -------------------------------------------------------------------------- +from typing import Any, AsyncIterable, Callable, Dict, Optional, TypeVar +import urllib.parse + +from azure.core.async_paging import AsyncItemPaged, AsyncList +from azure.core.exceptions import ( + ClientAuthenticationError, + HttpResponseError, + ResourceExistsError, + ResourceNotFoundError, + ResourceNotModifiedError, + map_error, +) +from azure.core.pipeline import PipelineResponse +from azure.core.pipeline.transport import AsyncHttpResponse +from azure.core.rest import HttpRequest +from azure.core.tracing.decorator import distributed_trace +from azure.core.utils import case_insensitive_dict +from azure.mgmt.core.exceptions import ARMErrorFormat + +from ... import models as _models +from ..._vendor import _convert_request +from ...operations._log_files_operations import build_list_by_server_request + +T = TypeVar("T") +ClsType = Optional[Callable[[PipelineResponse[HttpRequest, AsyncHttpResponse], T, Dict[str, Any]], Any]] + + +class LogFilesOperations: + """ + .. warning:: + **DO NOT** instantiate this class directly. + + Instead, you should access the following operations through + :class:`~azure.mgmt.rdbms.postgresql_flexibleservers.aio.PostgreSQLManagementClient`'s + :attr:`log_files` attribute. + """ + + models = _models + + def __init__(self, *args, **kwargs) -> None: + input_args = list(args) + self._client = input_args.pop(0) if input_args else kwargs.pop("client") + self._config = input_args.pop(0) if input_args else kwargs.pop("config") + self._serialize = input_args.pop(0) if input_args else kwargs.pop("serializer") + self._deserialize = input_args.pop(0) if input_args else kwargs.pop("deserializer") + + @distributed_trace + def list_by_server( + self, resource_group_name: str, server_name: str, **kwargs: Any + ) -> AsyncIterable["_models.LogFile"]: + """List all the server log files in a given server. + + :param resource_group_name: The name of the resource group. The name is case insensitive. + Required. + :type resource_group_name: str + :param server_name: The name of the server. Required. + :type server_name: str + :keyword callable cls: A custom type or function that will be passed the direct response + :return: An iterator like instance of either LogFile or the result of cls(response) + :rtype: + ~azure.core.async_paging.AsyncItemPaged[~azure.mgmt.rdbms.postgresql_flexibleservers.models.LogFile] + :raises ~azure.core.exceptions.HttpResponseError: + """ + _headers = kwargs.pop("headers", {}) or {} + _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) + + api_version: str = kwargs.pop("api_version", _params.pop("api-version", self._config.api_version)) + cls: ClsType[_models.LogFileListResult] = kwargs.pop("cls", None) + + error_map = { + 401: ClientAuthenticationError, + 404: ResourceNotFoundError, + 409: ResourceExistsError, + 304: ResourceNotModifiedError, + } + error_map.update(kwargs.pop("error_map", {}) or {}) + + def prepare_request(next_link=None): + if not next_link: + + request = build_list_by_server_request( + resource_group_name=resource_group_name, + server_name=server_name, + subscription_id=self._config.subscription_id, + api_version=api_version, + template_url=self.list_by_server.metadata["url"], + headers=_headers, + params=_params, + ) + request = _convert_request(request) + request.url = self._client.format_url(request.url) + + else: + # make call to next link with the client's api-version + _parsed_next_link = urllib.parse.urlparse(next_link) + _next_request_params = case_insensitive_dict( + { + key: [urllib.parse.quote(v) for v in value] + for key, value in urllib.parse.parse_qs(_parsed_next_link.query).items() + } + ) + _next_request_params["api-version"] = self._config.api_version + request = HttpRequest( + "GET", urllib.parse.urljoin(next_link, _parsed_next_link.path), params=_next_request_params + ) + request = _convert_request(request) + request.url = self._client.format_url(request.url) + request.method = "GET" + return request + + async def extract_data(pipeline_response): + deserialized = self._deserialize("LogFileListResult", pipeline_response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) # type: ignore + return deserialized.next_link or None, AsyncList(list_of_elem) + + async def get_next(next_link=None): + request = prepare_request(next_link) + + _stream = False + pipeline_response: PipelineResponse = await self._client._pipeline.run( # pylint: disable=protected-access + request, stream=_stream, **kwargs + ) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + error = self._deserialize.failsafe_deserialize(_models.ErrorResponse, pipeline_response) + raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) + + return pipeline_response + + return AsyncItemPaged(get_next, extract_data) + + list_by_server.metadata = { + "url": "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/flexibleServers/{serverName}/logFiles" + } diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_server_capabilities_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_server_capabilities_operations.py new file mode 100644 index 000000000000..65db08f70137 --- /dev/null +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/aio/operations/_server_capabilities_operations.py @@ -0,0 +1,114 @@ +# pylint: disable=too-many-lines +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is regenerated. +# -------------------------------------------------------------------------- +from typing import Any, Callable, Dict, Optional, TypeVar + +from azure.core.exceptions import ( + ClientAuthenticationError, + HttpResponseError, + ResourceExistsError, + ResourceNotFoundError, + ResourceNotModifiedError, + map_error, +) +from azure.core.pipeline import PipelineResponse +from azure.core.pipeline.transport import AsyncHttpResponse +from azure.core.rest import HttpRequest +from azure.core.tracing.decorator_async import distributed_trace_async +from azure.core.utils import case_insensitive_dict +from azure.mgmt.core.exceptions import ARMErrorFormat + +from ... import models as _models +from ..._vendor import _convert_request +from ...operations._server_capabilities_operations import build_list_request + +T = TypeVar("T") +ClsType = Optional[Callable[[PipelineResponse[HttpRequest, AsyncHttpResponse], T, Dict[str, Any]], Any]] + + +class ServerCapabilitiesOperations: + """ + .. warning:: + **DO NOT** instantiate this class directly. + + Instead, you should access the following operations through + :class:`~azure.mgmt.rdbms.postgresql_flexibleservers.aio.PostgreSQLManagementClient`'s + :attr:`server_capabilities` attribute. + """ + + models = _models + + def __init__(self, *args, **kwargs) -> None: + input_args = list(args) + self._client = input_args.pop(0) if input_args else kwargs.pop("client") + self._config = input_args.pop(0) if input_args else kwargs.pop("config") + self._serialize = input_args.pop(0) if input_args else kwargs.pop("serializer") + self._deserialize = input_args.pop(0) if input_args else kwargs.pop("deserializer") + + @distributed_trace_async + async def list(self, resource_group_name: str, server_name: str, **kwargs: Any) -> _models.CapabilitiesListResult: + """Get capabilities at specified location in a given subscription. + + :param resource_group_name: The name of the resource group. The name is case insensitive. + Required. + :type resource_group_name: str + :param server_name: The name of the server. Required. + :type server_name: str + :keyword callable cls: A custom type or function that will be passed the direct response + :return: CapabilitiesListResult or the result of cls(response) + :rtype: ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilitiesListResult + :raises ~azure.core.exceptions.HttpResponseError: + """ + error_map = { + 401: ClientAuthenticationError, + 404: ResourceNotFoundError, + 409: ResourceExistsError, + 304: ResourceNotModifiedError, + } + error_map.update(kwargs.pop("error_map", {}) or {}) + + _headers = kwargs.pop("headers", {}) or {} + _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) + + api_version: str = kwargs.pop("api_version", _params.pop("api-version", self._config.api_version)) + cls: ClsType[_models.CapabilitiesListResult] = kwargs.pop("cls", None) + + request = build_list_request( + resource_group_name=resource_group_name, + server_name=server_name, + subscription_id=self._config.subscription_id, + api_version=api_version, + template_url=self.list.metadata["url"], + headers=_headers, + params=_params, + ) + request = _convert_request(request) + request.url = self._client.format_url(request.url) + + _stream = False + pipeline_response: PipelineResponse = await self._client._pipeline.run( # pylint: disable=protected-access + request, stream=_stream, **kwargs + ) + + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + error = self._deserialize.failsafe_deserialize(_models.ErrorResponse, pipeline_response) + raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) + + deserialized = self._deserialize("CapabilitiesListResult", pipeline_response) + + if cls: + return cls(pipeline_response, deserialized, {}) + + return deserialized + + list.metadata = { + "url": "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/flexibleServers/{serverName}/capabilities" + } diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/__init__.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/__init__.py index 960f99d3bb7f..2baa638293a7 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/__init__.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/__init__.py @@ -12,7 +12,7 @@ from ._models_py3 import AuthConfig from ._models_py3 import Backup from ._models_py3 import CapabilitiesListResult -from ._models_py3 import CapabilityProperties +from ._models_py3 import CapabilityBase from ._models_py3 import CheckNameAvailabilityRequest from ._models_py3 import CheckNameAvailabilityResponse from ._models_py3 import Configuration @@ -28,13 +28,14 @@ from ._models_py3 import FastProvisioningEditionCapability from ._models_py3 import FirewallRule from ._models_py3 import FirewallRuleListResult +from ._models_py3 import FlexibleServerCapability from ._models_py3 import FlexibleServerEditionCapability from ._models_py3 import HighAvailability -from ._models_py3 import HyperscaleNodeEditionCapability +from ._models_py3 import LogFile +from ._models_py3 import LogFileListResult from ._models_py3 import MaintenanceWindow from ._models_py3 import NameAvailability from ._models_py3 import Network -from ._models_py3 import NodeTypeCapability from ._models_py3 import Operation from ._models_py3 import OperationDisplay from ._models_py3 import OperationListResult @@ -46,41 +47,52 @@ from ._models_py3 import ServerBackupListResult from ._models_py3 import ServerForUpdate from ._models_py3 import ServerListResult +from ._models_py3 import ServerSku from ._models_py3 import ServerVersionCapability from ._models_py3 import Sku from ._models_py3 import Storage from ._models_py3 import StorageEditionCapability -from ._models_py3 import StorageMBCapability +from ._models_py3 import StorageMbCapability from ._models_py3 import StorageTierCapability from ._models_py3 import SystemData from ._models_py3 import TrackedResource from ._models_py3 import UserAssignedIdentity from ._models_py3 import UserIdentity -from ._models_py3 import VcoreCapability from ._models_py3 import VirtualNetworkSubnetUsageParameter from ._models_py3 import VirtualNetworkSubnetUsageResult from ._postgre_sql_management_client_enums import ActiveDirectoryAuthEnum from ._postgre_sql_management_client_enums import ArmServerKeyType +from ._postgre_sql_management_client_enums import AzureManagedDiskPerformanceTiers +from ._postgre_sql_management_client_enums import CapabilityStatus from ._postgre_sql_management_client_enums import CheckNameAvailabilityReason from ._postgre_sql_management_client_enums import ConfigurationDataType from ._postgre_sql_management_client_enums import CreateMode from ._postgre_sql_management_client_enums import CreateModeForUpdate from ._postgre_sql_management_client_enums import CreatedByType from ._postgre_sql_management_client_enums import FailoverMode +from ._postgre_sql_management_client_enums import FastProvisioningSupportedEnum +from ._postgre_sql_management_client_enums import GeoBackupSupportedEnum from ._postgre_sql_management_client_enums import GeoRedundantBackupEnum from ._postgre_sql_management_client_enums import HighAvailabilityMode from ._postgre_sql_management_client_enums import IdentityType +from ._postgre_sql_management_client_enums import KeyStatusEnum +from ._postgre_sql_management_client_enums import OnlineResizeSupportedEnum from ._postgre_sql_management_client_enums import OperationOrigin from ._postgre_sql_management_client_enums import Origin from ._postgre_sql_management_client_enums import PasswordAuthEnum from ._postgre_sql_management_client_enums import PrincipalType from ._postgre_sql_management_client_enums import ReplicationRole +from ._postgre_sql_management_client_enums import RestrictedEnum from ._postgre_sql_management_client_enums import ServerHAState from ._postgre_sql_management_client_enums import ServerPublicNetworkAccessState from ._postgre_sql_management_client_enums import ServerState from ._postgre_sql_management_client_enums import ServerVersion from ._postgre_sql_management_client_enums import SkuTier +from ._postgre_sql_management_client_enums import StorageAutoGrow +from ._postgre_sql_management_client_enums import StorageAutoGrowthSupportedEnum +from ._postgre_sql_management_client_enums import ZoneRedundantHaAndGeoBackupSupportedEnum +from ._postgre_sql_management_client_enums import ZoneRedundantHaSupportedEnum from ._patch import __all__ as _patch_all from ._patch import * # pylint: disable=unused-wildcard-import from ._patch import patch_sdk as _patch_sdk @@ -92,7 +104,7 @@ "AuthConfig", "Backup", "CapabilitiesListResult", - "CapabilityProperties", + "CapabilityBase", "CheckNameAvailabilityRequest", "CheckNameAvailabilityResponse", "Configuration", @@ -108,13 +120,14 @@ "FastProvisioningEditionCapability", "FirewallRule", "FirewallRuleListResult", + "FlexibleServerCapability", "FlexibleServerEditionCapability", "HighAvailability", - "HyperscaleNodeEditionCapability", + "LogFile", + "LogFileListResult", "MaintenanceWindow", "NameAvailability", "Network", - "NodeTypeCapability", "Operation", "OperationDisplay", "OperationListResult", @@ -126,40 +139,51 @@ "ServerBackupListResult", "ServerForUpdate", "ServerListResult", + "ServerSku", "ServerVersionCapability", "Sku", "Storage", "StorageEditionCapability", - "StorageMBCapability", + "StorageMbCapability", "StorageTierCapability", "SystemData", "TrackedResource", "UserAssignedIdentity", "UserIdentity", - "VcoreCapability", "VirtualNetworkSubnetUsageParameter", "VirtualNetworkSubnetUsageResult", "ActiveDirectoryAuthEnum", "ArmServerKeyType", + "AzureManagedDiskPerformanceTiers", + "CapabilityStatus", "CheckNameAvailabilityReason", "ConfigurationDataType", "CreateMode", "CreateModeForUpdate", "CreatedByType", "FailoverMode", + "FastProvisioningSupportedEnum", + "GeoBackupSupportedEnum", "GeoRedundantBackupEnum", "HighAvailabilityMode", "IdentityType", + "KeyStatusEnum", + "OnlineResizeSupportedEnum", "OperationOrigin", "Origin", "PasswordAuthEnum", "PrincipalType", "ReplicationRole", + "RestrictedEnum", "ServerHAState", "ServerPublicNetworkAccessState", "ServerState", "ServerVersion", "SkuTier", + "StorageAutoGrow", + "StorageAutoGrowthSupportedEnum", + "ZoneRedundantHaAndGeoBackupSupportedEnum", + "ZoneRedundantHaSupportedEnum", ] __all__.extend([p for p in _patch_all if p not in __all__]) _patch_sdk() diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/_models_py3.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/_models_py3.py index 2d0cbb9a961e..360f4c42570e 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/_models_py3.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/_models_py3.py @@ -341,12 +341,13 @@ def __init__( class CapabilitiesListResult(_serialization.Model): - """location capability. + """Capability for the PostgreSQL server. Variables are only populated by the server, and will be ignored when sending a request. :ivar value: A list of supported capabilities. - :vartype value: list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilityProperties] + :vartype value: + list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.FlexibleServerCapability] :ivar next_link: Link to retrieve next page of results. :vartype next_link: str """ @@ -357,7 +358,7 @@ class CapabilitiesListResult(_serialization.Model): } _attribute_map = { - "value": {"key": "value", "type": "[CapabilityProperties]"}, + "value": {"key": "value", "type": "[FlexibleServerCapability]"}, "next_link": {"key": "nextLink", "type": "str"}, } @@ -368,88 +369,33 @@ def __init__(self, **kwargs: Any) -> None: self.next_link = None -class CapabilityProperties(_serialization.Model): - """Location capabilities. +class CapabilityBase(_serialization.Model): + """Base object for representing capability. Variables are only populated by the server, and will be ignored when sending a request. - :ivar zone: zone name. - :vartype zone: str - :ivar supported_ha_mode: Supported high availability mode. - :vartype supported_ha_mode: list[str] - :ivar geo_backup_supported: A value indicating whether a new server in this region can have - geo-backups to paired region. - :vartype geo_backup_supported: bool - :ivar zone_redundant_ha_supported: A value indicating whether a new server in this region can - support multi zone HA. - :vartype zone_redundant_ha_supported: bool - :ivar zone_redundant_ha_and_geo_backup_supported: A value indicating whether a new server in - this region can have geo-backups to paired region. - :vartype zone_redundant_ha_and_geo_backup_supported: bool - :ivar supported_flexible_server_editions: - :vartype supported_flexible_server_editions: - list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.FlexibleServerEditionCapability] - :ivar supported_hyperscale_node_editions: - :vartype supported_hyperscale_node_editions: - list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.HyperscaleNodeEditionCapability] - :ivar fast_provisioning_supported: A value indicating whether fast provisioning is supported in - this region. - :vartype fast_provisioning_supported: bool - :ivar supported_fast_provisioning_editions: - :vartype supported_fast_provisioning_editions: - list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.FastProvisioningEditionCapability] - :ivar status: The status. - :vartype status: str + :ivar status: The status of the capability. Known values are: "Visible", "Available", + "Default", and "Disabled". + :vartype status: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilityStatus + :ivar reason: The reason for the capability not being available. + :vartype reason: str """ _validation = { - "zone": {"readonly": True}, - "supported_ha_mode": {"readonly": True}, - "geo_backup_supported": {"readonly": True}, - "zone_redundant_ha_supported": {"readonly": True}, - "zone_redundant_ha_and_geo_backup_supported": {"readonly": True}, - "supported_flexible_server_editions": {"readonly": True}, - "supported_hyperscale_node_editions": {"readonly": True}, - "fast_provisioning_supported": {"readonly": True}, - "supported_fast_provisioning_editions": {"readonly": True}, "status": {"readonly": True}, + "reason": {"readonly": True}, } _attribute_map = { - "zone": {"key": "zone", "type": "str"}, - "supported_ha_mode": {"key": "supportedHAMode", "type": "[str]"}, - "geo_backup_supported": {"key": "geoBackupSupported", "type": "bool"}, - "zone_redundant_ha_supported": {"key": "zoneRedundantHaSupported", "type": "bool"}, - "zone_redundant_ha_and_geo_backup_supported": {"key": "zoneRedundantHaAndGeoBackupSupported", "type": "bool"}, - "supported_flexible_server_editions": { - "key": "supportedFlexibleServerEditions", - "type": "[FlexibleServerEditionCapability]", - }, - "supported_hyperscale_node_editions": { - "key": "supportedHyperscaleNodeEditions", - "type": "[HyperscaleNodeEditionCapability]", - }, - "fast_provisioning_supported": {"key": "fastProvisioningSupported", "type": "bool"}, - "supported_fast_provisioning_editions": { - "key": "supportedFastProvisioningEditions", - "type": "[FastProvisioningEditionCapability]", - }, "status": {"key": "status", "type": "str"}, + "reason": {"key": "reason", "type": "str"}, } def __init__(self, **kwargs: Any) -> None: """ """ super().__init__(**kwargs) - self.zone = None - self.supported_ha_mode = None - self.geo_backup_supported = None - self.zone_redundant_ha_supported = None - self.zone_redundant_ha_and_geo_backup_supported = None - self.supported_flexible_server_editions = None - self.supported_hyperscale_node_editions = None - self.fast_provisioning_supported = None - self.supported_fast_provisioning_editions = None self.status = None + self.reason = None class CheckNameAvailabilityRequest(_serialization.Model): @@ -812,15 +758,32 @@ class DataEncryption(_serialization.Model): :ivar primary_user_assigned_identity_id: Resource Id for the User assigned identity to be used for data encryption for primary server. :vartype primary_user_assigned_identity_id: str + :ivar geo_backup_key_uri: URI for the key for data encryption for geo-backup of server. + :vartype geo_backup_key_uri: str + :ivar geo_backup_user_assigned_identity_id: Resource Id for the User assigned identity to be + used for data encryption for geo-backup of server. + :vartype geo_backup_user_assigned_identity_id: str :ivar type: Data encryption type to depict if it is System Managed vs Azure Key vault. Known values are: "SystemManaged" and "AzureKeyVault". :vartype type: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.ArmServerKeyType + :ivar primary_encryption_key_status: Primary encryption key status for Data encryption enabled + server. Known values are: "Valid" and "Invalid". + :vartype primary_encryption_key_status: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.KeyStatusEnum + :ivar geo_backup_encryption_key_status: Geo-backup encryption key status for Data encryption + enabled server. Known values are: "Valid" and "Invalid". + :vartype geo_backup_encryption_key_status: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.KeyStatusEnum """ _attribute_map = { "primary_key_uri": {"key": "primaryKeyURI", "type": "str"}, "primary_user_assigned_identity_id": {"key": "primaryUserAssignedIdentityId", "type": "str"}, + "geo_backup_key_uri": {"key": "geoBackupKeyURI", "type": "str"}, + "geo_backup_user_assigned_identity_id": {"key": "geoBackupUserAssignedIdentityId", "type": "str"}, "type": {"key": "type", "type": "str"}, + "primary_encryption_key_status": {"key": "primaryEncryptionKeyStatus", "type": "str"}, + "geo_backup_encryption_key_status": {"key": "geoBackupEncryptionKeyStatus", "type": "str"}, } def __init__( @@ -828,7 +791,11 @@ def __init__( *, primary_key_uri: Optional[str] = None, primary_user_assigned_identity_id: Optional[str] = None, + geo_backup_key_uri: Optional[str] = None, + geo_backup_user_assigned_identity_id: Optional[str] = None, type: Optional[Union[str, "_models.ArmServerKeyType"]] = None, + primary_encryption_key_status: Optional[Union[str, "_models.KeyStatusEnum"]] = None, + geo_backup_encryption_key_status: Optional[Union[str, "_models.KeyStatusEnum"]] = None, **kwargs: Any ) -> None: """ @@ -837,14 +804,31 @@ def __init__( :keyword primary_user_assigned_identity_id: Resource Id for the User assigned identity to be used for data encryption for primary server. :paramtype primary_user_assigned_identity_id: str + :keyword geo_backup_key_uri: URI for the key for data encryption for geo-backup of server. + :paramtype geo_backup_key_uri: str + :keyword geo_backup_user_assigned_identity_id: Resource Id for the User assigned identity to be + used for data encryption for geo-backup of server. + :paramtype geo_backup_user_assigned_identity_id: str :keyword type: Data encryption type to depict if it is System Managed vs Azure Key vault. Known values are: "SystemManaged" and "AzureKeyVault". :paramtype type: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.ArmServerKeyType + :keyword primary_encryption_key_status: Primary encryption key status for Data encryption + enabled server. Known values are: "Valid" and "Invalid". + :paramtype primary_encryption_key_status: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.KeyStatusEnum + :keyword geo_backup_encryption_key_status: Geo-backup encryption key status for Data encryption + enabled server. Known values are: "Valid" and "Invalid". + :paramtype geo_backup_encryption_key_status: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.KeyStatusEnum """ super().__init__(**kwargs) self.primary_key_uri = primary_key_uri self.primary_user_assigned_identity_id = primary_user_assigned_identity_id + self.geo_backup_key_uri = geo_backup_key_uri + self.geo_backup_user_assigned_identity_id = geo_backup_user_assigned_identity_id self.type = type + self.primary_encryption_key_status = primary_encryption_key_status + self.geo_backup_encryption_key_status = geo_backup_encryption_key_status class DelegatedSubnetUsage(_serialization.Model): @@ -968,37 +952,56 @@ def __init__(self, *, error: Optional["_models.ErrorDetail"] = None, **kwargs: A self.error = error -class FastProvisioningEditionCapability(_serialization.Model): - """FastProvisioningEditionCapability. +class FastProvisioningEditionCapability(CapabilityBase): + """Represents capability of a fast provisioning edition. Variables are only populated by the server, and will be ignored when sending a request. + :ivar status: The status of the capability. Known values are: "Visible", "Available", + "Default", and "Disabled". + :vartype status: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilityStatus + :ivar reason: The reason for the capability not being available. + :vartype reason: str + :ivar supported_tier: Fast provisioning supported tier name. + :vartype supported_tier: str :ivar supported_sku: Fast provisioning supported sku name. :vartype supported_sku: str :ivar supported_storage_gb: Fast provisioning supported storage in Gb. :vartype supported_storage_gb: int :ivar supported_server_versions: Fast provisioning supported version. :vartype supported_server_versions: str + :ivar server_count: Count of servers in cache matching the spec. + :vartype server_count: int """ _validation = { + "status": {"readonly": True}, + "reason": {"readonly": True}, + "supported_tier": {"readonly": True}, "supported_sku": {"readonly": True}, "supported_storage_gb": {"readonly": True}, "supported_server_versions": {"readonly": True}, + "server_count": {"readonly": True}, } _attribute_map = { + "status": {"key": "status", "type": "str"}, + "reason": {"key": "reason", "type": "str"}, + "supported_tier": {"key": "supportedTier", "type": "str"}, "supported_sku": {"key": "supportedSku", "type": "str"}, "supported_storage_gb": {"key": "supportedStorageGb", "type": "int"}, "supported_server_versions": {"key": "supportedServerVersions", "type": "str"}, + "server_count": {"key": "serverCount", "type": "int"}, } def __init__(self, **kwargs: Any) -> None: """ """ super().__init__(**kwargs) + self.supported_tier = None self.supported_sku = None self.supported_storage_gb = None self.supported_server_versions = None + self.server_count = None class FirewallRule(ProxyResource): @@ -1093,44 +1096,157 @@ def __init__( self.next_link = next_link -class FlexibleServerEditionCapability(_serialization.Model): +class FlexibleServerCapability(CapabilityBase): # pylint: disable=too-many-instance-attributes + """Capability for the PostgreSQL server. + + Variables are only populated by the server, and will be ignored when sending a request. + + :ivar status: The status of the capability. Known values are: "Visible", "Available", + "Default", and "Disabled". + :vartype status: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilityStatus + :ivar reason: The reason for the capability not being available. + :vartype reason: str + :ivar name: Name of flexible servers capability. + :vartype name: str + :ivar supported_server_editions: List of supported flexible server editions. + :vartype supported_server_editions: + list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.FlexibleServerEditionCapability] + :ivar supported_server_versions: The list of server versions supported for this capability. + :vartype supported_server_versions: + list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.ServerVersionCapability] + :ivar fast_provisioning_supported: Gets a value indicating whether fast provisioning is + supported. Known values are: "Enabled" and "Disabled". + :vartype fast_provisioning_supported: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.FastProvisioningSupportedEnum + :ivar supported_fast_provisioning_editions: List of supported server editions for fast + provisioning. + :vartype supported_fast_provisioning_editions: + list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.FastProvisioningEditionCapability] + :ivar geo_backup_supported: Determines if geo-backup is supported in this region. Known values + are: "Enabled" and "Disabled". + :vartype geo_backup_supported: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.GeoBackupSupportedEnum + :ivar zone_redundant_ha_supported: A value indicating whether Zone Redundant HA is supported in + this region. Known values are: "Enabled" and "Disabled". + :vartype zone_redundant_ha_supported: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.ZoneRedundantHaSupportedEnum + :ivar zone_redundant_ha_and_geo_backup_supported: A value indicating whether Zone Redundant HA + and Geo-backup is supported in this region. Known values are: "Enabled" and "Disabled". + :vartype zone_redundant_ha_and_geo_backup_supported: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.ZoneRedundantHaAndGeoBackupSupportedEnum + :ivar storage_auto_growth_supported: A value indicating whether storage auto-grow is supported + in this region. Known values are: "Enabled" and "Disabled". + :vartype storage_auto_growth_supported: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.StorageAutoGrowthSupportedEnum + :ivar online_resize_supported: A value indicating whether online resize is supported in this + region for the given subscription. Known values are: "Enabled" and "Disabled". + :vartype online_resize_supported: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.OnlineResizeSupportedEnum + :ivar restricted: A value indicating whether this region is restricted. Known values are: + "Enabled" and "Disabled". + :vartype restricted: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.RestrictedEnum + """ + + _validation = { + "status": {"readonly": True}, + "reason": {"readonly": True}, + "supported_server_editions": {"readonly": True}, + "supported_server_versions": {"readonly": True}, + "fast_provisioning_supported": {"readonly": True}, + "supported_fast_provisioning_editions": {"readonly": True}, + "geo_backup_supported": {"readonly": True}, + "zone_redundant_ha_supported": {"readonly": True}, + "zone_redundant_ha_and_geo_backup_supported": {"readonly": True}, + "storage_auto_growth_supported": {"readonly": True}, + "online_resize_supported": {"readonly": True}, + "restricted": {"readonly": True}, + } + + _attribute_map = { + "status": {"key": "status", "type": "str"}, + "reason": {"key": "reason", "type": "str"}, + "name": {"key": "name", "type": "str"}, + "supported_server_editions": {"key": "supportedServerEditions", "type": "[FlexibleServerEditionCapability]"}, + "supported_server_versions": {"key": "supportedServerVersions", "type": "[ServerVersionCapability]"}, + "fast_provisioning_supported": {"key": "fastProvisioningSupported", "type": "str"}, + "supported_fast_provisioning_editions": { + "key": "supportedFastProvisioningEditions", + "type": "[FastProvisioningEditionCapability]", + }, + "geo_backup_supported": {"key": "geoBackupSupported", "type": "str"}, + "zone_redundant_ha_supported": {"key": "zoneRedundantHaSupported", "type": "str"}, + "zone_redundant_ha_and_geo_backup_supported": {"key": "zoneRedundantHaAndGeoBackupSupported", "type": "str"}, + "storage_auto_growth_supported": {"key": "storageAutoGrowthSupported", "type": "str"}, + "online_resize_supported": {"key": "onlineResizeSupported", "type": "str"}, + "restricted": {"key": "restricted", "type": "str"}, + } + + def __init__(self, *, name: Optional[str] = None, **kwargs: Any) -> None: + """ + :keyword name: Name of flexible servers capability. + :paramtype name: str + """ + super().__init__(**kwargs) + self.name = name + self.supported_server_editions = None + self.supported_server_versions = None + self.fast_provisioning_supported = None + self.supported_fast_provisioning_editions = None + self.geo_backup_supported = None + self.zone_redundant_ha_supported = None + self.zone_redundant_ha_and_geo_backup_supported = None + self.storage_auto_growth_supported = None + self.online_resize_supported = None + self.restricted = None + + +class FlexibleServerEditionCapability(CapabilityBase): """Flexible server edition capabilities. Variables are only populated by the server, and will be ignored when sending a request. + :ivar status: The status of the capability. Known values are: "Visible", "Available", + "Default", and "Disabled". + :vartype status: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilityStatus + :ivar reason: The reason for the capability not being available. + :vartype reason: str :ivar name: Server edition name. :vartype name: str + :ivar default_sku_name: Default sku name for the server edition. + :vartype default_sku_name: str :ivar supported_storage_editions: The list of editions supported by this server edition. :vartype supported_storage_editions: list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.StorageEditionCapability] - :ivar supported_server_versions: The list of server versions supported by this server edition. - :vartype supported_server_versions: - list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.ServerVersionCapability] - :ivar status: The status. - :vartype status: str + :ivar supported_server_skus: List of supported server SKUs. + :vartype supported_server_skus: + list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.ServerSku] """ _validation = { + "status": {"readonly": True}, + "reason": {"readonly": True}, "name": {"readonly": True}, + "default_sku_name": {"readonly": True}, "supported_storage_editions": {"readonly": True}, - "supported_server_versions": {"readonly": True}, - "status": {"readonly": True}, + "supported_server_skus": {"readonly": True}, } _attribute_map = { + "status": {"key": "status", "type": "str"}, + "reason": {"key": "reason", "type": "str"}, "name": {"key": "name", "type": "str"}, + "default_sku_name": {"key": "defaultSkuName", "type": "str"}, "supported_storage_editions": {"key": "supportedStorageEditions", "type": "[StorageEditionCapability]"}, - "supported_server_versions": {"key": "supportedServerVersions", "type": "[ServerVersionCapability]"}, - "status": {"key": "status", "type": "str"}, + "supported_server_skus": {"key": "supportedServerSkus", "type": "[ServerSku]"}, } def __init__(self, **kwargs: Any) -> None: """ """ super().__init__(**kwargs) self.name = None + self.default_sku_name = None self.supported_storage_editions = None - self.supported_server_versions = None - self.status = None + self.supported_server_skus = None class HighAvailability(_serialization.Model): @@ -1179,50 +1295,109 @@ def __init__( self.standby_availability_zone = standby_availability_zone -class HyperscaleNodeEditionCapability(_serialization.Model): - """Hyperscale node edition capabilities. +class LogFile(ProxyResource): + """Represents a logFile. Variables are only populated by the server, and will be ignored when sending a request. - :ivar name: Server edition name. + :ivar id: Fully qualified resource ID for the resource. Ex - + /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}. + :vartype id: str + :ivar name: The name of the resource. :vartype name: str - :ivar supported_storage_editions: The list of editions supported by this server edition. - :vartype supported_storage_editions: - list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.StorageEditionCapability] - :ivar supported_server_versions: The list of server versions supported by this server edition. - :vartype supported_server_versions: - list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.ServerVersionCapability] - :ivar supported_node_types: The list of Node Types supported by this server edition. - :vartype supported_node_types: - list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.NodeTypeCapability] - :ivar status: The status. - :vartype status: str + :ivar type: The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or + "Microsoft.Storage/storageAccounts". + :vartype type: str + :ivar system_data: Azure Resource Manager metadata containing createdBy and modifiedBy + information. + :vartype system_data: ~azure.mgmt.rdbms.postgresql_flexibleservers.models.SystemData + :ivar created_time: Creation timestamp of the log file. + :vartype created_time: ~datetime.datetime + :ivar last_modified_time: Last modified timestamp of the log file. + :vartype last_modified_time: ~datetime.datetime + :ivar size_in_kb: The size in kb of the logFile. + :vartype size_in_kb: int + :ivar type_properties_type: Type of the log file. + :vartype type_properties_type: str + :ivar url: The url to download the log file from. + :vartype url: str """ _validation = { + "id": {"readonly": True}, "name": {"readonly": True}, - "supported_storage_editions": {"readonly": True}, - "supported_server_versions": {"readonly": True}, - "supported_node_types": {"readonly": True}, - "status": {"readonly": True}, + "type": {"readonly": True}, + "system_data": {"readonly": True}, } _attribute_map = { + "id": {"key": "id", "type": "str"}, "name": {"key": "name", "type": "str"}, - "supported_storage_editions": {"key": "supportedStorageEditions", "type": "[StorageEditionCapability]"}, - "supported_server_versions": {"key": "supportedServerVersions", "type": "[ServerVersionCapability]"}, - "supported_node_types": {"key": "supportedNodeTypes", "type": "[NodeTypeCapability]"}, - "status": {"key": "status", "type": "str"}, + "type": {"key": "type", "type": "str"}, + "system_data": {"key": "systemData", "type": "SystemData"}, + "created_time": {"key": "properties.createdTime", "type": "iso-8601"}, + "last_modified_time": {"key": "properties.lastModifiedTime", "type": "iso-8601"}, + "size_in_kb": {"key": "properties.sizeInKb", "type": "int"}, + "type_properties_type": {"key": "properties.type", "type": "str"}, + "url": {"key": "properties.url", "type": "str"}, } - def __init__(self, **kwargs: Any) -> None: - """ """ + def __init__( + self, + *, + created_time: Optional[datetime.datetime] = None, + last_modified_time: Optional[datetime.datetime] = None, + size_in_kb: Optional[int] = None, + type_properties_type: Optional[str] = None, + url: Optional[str] = None, + **kwargs: Any + ) -> None: + """ + :keyword created_time: Creation timestamp of the log file. + :paramtype created_time: ~datetime.datetime + :keyword last_modified_time: Last modified timestamp of the log file. + :paramtype last_modified_time: ~datetime.datetime + :keyword size_in_kb: The size in kb of the logFile. + :paramtype size_in_kb: int + :keyword type_properties_type: Type of the log file. + :paramtype type_properties_type: str + :keyword url: The url to download the log file from. + :paramtype url: str + """ super().__init__(**kwargs) - self.name = None - self.supported_storage_editions = None - self.supported_server_versions = None - self.supported_node_types = None - self.status = None + self.created_time = created_time + self.last_modified_time = last_modified_time + self.size_in_kb = size_in_kb + self.type_properties_type = type_properties_type + self.url = url + + +class LogFileListResult(_serialization.Model): + """A List of logFiles. + + :ivar value: The list of logFiles in a server. + :vartype value: list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.LogFile] + :ivar next_link: The link used to get the next page of operations. + :vartype next_link: str + """ + + _attribute_map = { + "value": {"key": "value", "type": "[LogFile]"}, + "next_link": {"key": "nextLink", "type": "str"}, + } + + def __init__( + self, *, value: Optional[List["_models.LogFile"]] = None, next_link: Optional[str] = None, **kwargs: Any + ) -> None: + """ + :keyword value: The list of logFiles in a server. + :paramtype value: list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.LogFile] + :keyword next_link: The link used to get the next page of operations. + :paramtype next_link: str + """ + super().__init__(**kwargs) + self.value = value + self.next_link = next_link class MaintenanceWindow(_serialization.Model): @@ -1366,39 +1541,6 @@ def __init__( self.private_dns_zone_arm_resource_id = private_dns_zone_arm_resource_id -class NodeTypeCapability(_serialization.Model): - """node type capability. - - Variables are only populated by the server, and will be ignored when sending a request. - - :ivar name: note type name. - :vartype name: str - :ivar node_type: note type. - :vartype node_type: str - :ivar status: The status. - :vartype status: str - """ - - _validation = { - "name": {"readonly": True}, - "node_type": {"readonly": True}, - "status": {"readonly": True}, - } - - _attribute_map = { - "name": {"key": "name", "type": "str"}, - "node_type": {"key": "nodeType", "type": "str"}, - "status": {"key": "status", "type": "str"}, - } - - def __init__(self, **kwargs: Any) -> None: - """ """ - super().__init__(**kwargs) - self.name = None - self.node_type = None - self.status = None - - class Operation(_serialization.Model): """REST API operation definition. @@ -1634,7 +1776,7 @@ class Server(TrackedResource): # pylint: disable=too-many-instance-attributes :ivar administrator_login_password: The administrator login password (required for server creation). :vartype administrator_login_password: str - :ivar version: PostgreSQL Server version. Known values are: "14", "13", "12", and "11". + :ivar version: PostgreSQL Server version. Known values are: "15", "14", "13", "12", and "11". :vartype version: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.ServerVersion :ivar minor_version: The minor version of the server. :vartype minor_version: str @@ -1759,7 +1901,8 @@ def __init__( # pylint: disable=too-many-locals :keyword administrator_login_password: The administrator login password (required for server creation). :paramtype administrator_login_password: str - :keyword version: PostgreSQL Server version. Known values are: "14", "13", "12", and "11". + :keyword version: PostgreSQL Server version. Known values are: "15", "14", "13", "12", and + "11". :paramtype version: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.ServerVersion :keyword storage: Storage properties of a server. :paramtype storage: ~azure.mgmt.rdbms.postgresql_flexibleservers.models.Storage @@ -1921,7 +2064,7 @@ class ServerForUpdate(_serialization.Model): # pylint: disable=too-many-instanc :vartype tags: dict[str, str] :ivar administrator_login_password: The password of the administrator login. :vartype administrator_login_password: str - :ivar version: PostgreSQL Server version. Known values are: "14", "13", "12", and "11". + :ivar version: PostgreSQL Server version. Known values are: "15", "14", "13", "12", and "11". :vartype version: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.ServerVersion :ivar storage: Storage properties of a server. :vartype storage: ~azure.mgmt.rdbms.postgresql_flexibleservers.models.Storage @@ -1990,7 +2133,8 @@ def __init__( :paramtype tags: dict[str, str] :keyword administrator_login_password: The password of the administrator login. :paramtype administrator_login_password: str - :keyword version: PostgreSQL Server version. Known values are: "14", "13", "12", and "11". + :keyword version: PostgreSQL Server version. Known values are: "15", "14", "13", "12", and + "11". :paramtype version: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.ServerVersion :keyword storage: Storage properties of a server. :paramtype storage: ~azure.mgmt.rdbms.postgresql_flexibleservers.models.Storage @@ -2059,34 +2203,82 @@ def __init__( self.next_link = next_link +class ServerSku(CapabilityBase): + """Sku capability. + + Variables are only populated by the server, and will be ignored when sending a request. + + :ivar status: The status of the capability. Known values are: "Visible", "Available", + "Default", and "Disabled". + :vartype status: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilityStatus + :ivar reason: The reason for the capability not being available. + :vartype reason: str + :ivar name: Sku name. + :vartype name: str + :ivar v_cores: Supported vCores. + :vartype v_cores: int + :ivar supported_iops: Supported IOPS. + :vartype supported_iops: int + :ivar supported_memory_per_vcore_mb: Supported memory per vCore in MB. + :vartype supported_memory_per_vcore_mb: int + :ivar supported_zones: List of supported Availability Zones. + :vartype supported_zones: list[str] + :ivar supported_ha_mode: Supported high availability mode. + :vartype supported_ha_mode: list[str] + """ + + _validation = { + "status": {"readonly": True}, + "reason": {"readonly": True}, + "name": {"readonly": True}, + "v_cores": {"readonly": True}, + "supported_iops": {"readonly": True}, + "supported_memory_per_vcore_mb": {"readonly": True}, + "supported_zones": {"readonly": True}, + "supported_ha_mode": {"readonly": True}, + } + + _attribute_map = { + "status": {"key": "status", "type": "str"}, + "reason": {"key": "reason", "type": "str"}, + "name": {"key": "name", "type": "str"}, + "v_cores": {"key": "vCores", "type": "int"}, + "supported_iops": {"key": "supportedIops", "type": "int"}, + "supported_memory_per_vcore_mb": {"key": "supportedMemoryPerVcoreMb", "type": "int"}, + "supported_zones": {"key": "supportedZones", "type": "[str]"}, + "supported_ha_mode": {"key": "supportedHaMode", "type": "[str]"}, + } + + def __init__(self, **kwargs: Any) -> None: + """ """ + super().__init__(**kwargs) + self.name = None + self.v_cores = None + self.supported_iops = None + self.supported_memory_per_vcore_mb = None + self.supported_zones = None + self.supported_ha_mode = None + + class ServerVersionCapability(_serialization.Model): """Server version capabilities. Variables are only populated by the server, and will be ignored when sending a request. - :ivar name: server version. + :ivar name: Server version. :vartype name: str :ivar supported_versions_to_upgrade: Supported servers versions to upgrade. :vartype supported_versions_to_upgrade: list[str] - :ivar supported_vcores: - :vartype supported_vcores: - list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.VcoreCapability] - :ivar status: The status. - :vartype status: str """ _validation = { "name": {"readonly": True}, "supported_versions_to_upgrade": {"readonly": True}, - "supported_vcores": {"readonly": True}, - "status": {"readonly": True}, } _attribute_map = { "name": {"key": "name", "type": "str"}, "supported_versions_to_upgrade": {"key": "supportedVersionsToUpgrade", "type": "[str]"}, - "supported_vcores": {"key": "supportedVcores", "type": "[VcoreCapability]"}, - "status": {"key": "status", "type": "str"}, } def __init__(self, **kwargs: Any) -> None: @@ -2094,8 +2286,6 @@ def __init__(self, **kwargs: Any) -> None: super().__init__(**kwargs) self.name = None self.supported_versions_to_upgrade = None - self.supported_vcores = None - self.status = None class Sku(_serialization.Model): @@ -2138,142 +2328,167 @@ def __init__(self, *, name: str, tier: Union[str, "_models.SkuTier"], **kwargs: class Storage(_serialization.Model): """Storage properties of a server. + Variables are only populated by the server, and will be ignored when sending a request. + :ivar storage_size_gb: Max storage allowed for a server. :vartype storage_size_gb: int + :ivar auto_grow: Flag to enable / disable Storage Auto grow for flexible server. Known values + are: "Enabled" and "Disabled". + :vartype auto_grow: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.StorageAutoGrow + :ivar iops_tier: Name of storage tier for IOPS. Known values are: "P1", "P2", "P3", "P4", "P6", + "P10", "P15", "P20", "P30", "P40", "P50", "P60", "P70", and "P80". + :vartype iops_tier: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.AzureManagedDiskPerformanceTiers + :ivar iops: Storage tier IOPS quantity. + :vartype iops: int """ + _validation = { + "iops": {"readonly": True}, + } + _attribute_map = { "storage_size_gb": {"key": "storageSizeGB", "type": "int"}, + "auto_grow": {"key": "autoGrow", "type": "str"}, + "iops_tier": {"key": "iopsTier", "type": "str"}, + "iops": {"key": "iops", "type": "int"}, } - def __init__(self, *, storage_size_gb: Optional[int] = None, **kwargs: Any) -> None: + def __init__( + self, + *, + storage_size_gb: Optional[int] = None, + auto_grow: Optional[Union[str, "_models.StorageAutoGrow"]] = None, + iops_tier: Optional[Union[str, "_models.AzureManagedDiskPerformanceTiers"]] = None, + **kwargs: Any + ) -> None: """ :keyword storage_size_gb: Max storage allowed for a server. :paramtype storage_size_gb: int + :keyword auto_grow: Flag to enable / disable Storage Auto grow for flexible server. Known + values are: "Enabled" and "Disabled". + :paramtype auto_grow: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.StorageAutoGrow + :keyword iops_tier: Name of storage tier for IOPS. Known values are: "P1", "P2", "P3", "P4", + "P6", "P10", "P15", "P20", "P30", "P40", "P50", "P60", "P70", and "P80". + :paramtype iops_tier: str or + ~azure.mgmt.rdbms.postgresql_flexibleservers.models.AzureManagedDiskPerformanceTiers """ super().__init__(**kwargs) self.storage_size_gb = storage_size_gb + self.auto_grow = auto_grow + self.iops_tier = iops_tier + self.iops = None class StorageEditionCapability(_serialization.Model): - """storage edition capability. + """Storage edition capability. Variables are only populated by the server, and will be ignored when sending a request. - :ivar name: storage edition name. + :ivar name: Storage edition name. :vartype name: str - :ivar supported_storage_mb: + :ivar default_storage_size_mb: Default storage size in MB for storage edition. + :vartype default_storage_size_mb: int + :ivar supported_storage_mb: Flexible server supported storage range in MB. :vartype supported_storage_mb: - list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.StorageMBCapability] - :ivar status: The status. - :vartype status: str + list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.StorageMbCapability] """ _validation = { "name": {"readonly": True}, + "default_storage_size_mb": {"readonly": True}, "supported_storage_mb": {"readonly": True}, - "status": {"readonly": True}, } _attribute_map = { "name": {"key": "name", "type": "str"}, - "supported_storage_mb": {"key": "supportedStorageMB", "type": "[StorageMBCapability]"}, - "status": {"key": "status", "type": "str"}, + "default_storage_size_mb": {"key": "defaultStorageSizeMb", "type": "int"}, + "supported_storage_mb": {"key": "supportedStorageMb", "type": "[StorageMbCapability]"}, } def __init__(self, **kwargs: Any) -> None: """ """ super().__init__(**kwargs) self.name = None + self.default_storage_size_mb = None self.supported_storage_mb = None - self.status = None -class StorageMBCapability(_serialization.Model): +class StorageMbCapability(CapabilityBase): """storage size in MB capability. Variables are only populated by the server, and will be ignored when sending a request. - :ivar name: storage MB name. - :vartype name: str - :ivar supported_iops: supported IOPS. + :ivar status: The status of the capability. Known values are: "Visible", "Available", + "Default", and "Disabled". + :vartype status: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilityStatus + :ivar reason: The reason for the capability not being available. + :vartype reason: str + :ivar supported_iops: Supported IOPS. :vartype supported_iops: int - :ivar storage_size_mb: storage size in MB. + :ivar storage_size_mb: Storage size in MB. :vartype storage_size_mb: int - :ivar supported_upgradable_tier_list: - :vartype supported_upgradable_tier_list: + :ivar default_iops_tier: Default tier for IOPS. + :vartype default_iops_tier: str + :ivar supported_iops_tiers: List of available options to upgrade the storage performance. + :vartype supported_iops_tiers: list[~azure.mgmt.rdbms.postgresql_flexibleservers.models.StorageTierCapability] - :ivar status: The status. - :vartype status: str """ _validation = { - "name": {"readonly": True}, + "status": {"readonly": True}, + "reason": {"readonly": True}, "supported_iops": {"readonly": True}, "storage_size_mb": {"readonly": True}, - "supported_upgradable_tier_list": {"readonly": True}, - "status": {"readonly": True}, + "default_iops_tier": {"readonly": True}, + "supported_iops_tiers": {"readonly": True}, } _attribute_map = { - "name": {"key": "name", "type": "str"}, - "supported_iops": {"key": "supportedIops", "type": "int"}, - "storage_size_mb": {"key": "storageSizeMB", "type": "int"}, - "supported_upgradable_tier_list": {"key": "supportedUpgradableTierList", "type": "[StorageTierCapability]"}, "status": {"key": "status", "type": "str"}, + "reason": {"key": "reason", "type": "str"}, + "supported_iops": {"key": "supportedIops", "type": "int"}, + "storage_size_mb": {"key": "storageSizeMb", "type": "int"}, + "default_iops_tier": {"key": "defaultIopsTier", "type": "str"}, + "supported_iops_tiers": {"key": "supportedIopsTiers", "type": "[StorageTierCapability]"}, } def __init__(self, **kwargs: Any) -> None: """ """ super().__init__(**kwargs) - self.name = None self.supported_iops = None self.storage_size_mb = None - self.supported_upgradable_tier_list = None - self.status = None + self.default_iops_tier = None + self.supported_iops_tiers = None class StorageTierCapability(_serialization.Model): - """StorageTierCapability. + """Represents capability of a storage tier. Variables are only populated by the server, and will be ignored when sending a request. :ivar name: Name to represent Storage tier capability. :vartype name: str - :ivar tier_name: Storage tier name. - :vartype tier_name: str :ivar iops: Supported IOPS for this storage tier. :vartype iops: int - :ivar is_baseline: Indicates if this is a baseline storage tier or not. - :vartype is_baseline: bool - :ivar status: Status os this storage tier. - :vartype status: str """ _validation = { "name": {"readonly": True}, - "tier_name": {"readonly": True}, "iops": {"readonly": True}, - "is_baseline": {"readonly": True}, - "status": {"readonly": True}, } _attribute_map = { "name": {"key": "name", "type": "str"}, - "tier_name": {"key": "tierName", "type": "str"}, "iops": {"key": "iops", "type": "int"}, - "is_baseline": {"key": "isBaseline", "type": "bool"}, - "status": {"key": "status", "type": "str"}, } def __init__(self, **kwargs: Any) -> None: """ """ super().__init__(**kwargs) self.name = None - self.tier_name = None self.iops = None - self.is_baseline = None - self.status = None class SystemData(_serialization.Model): @@ -2353,8 +2568,7 @@ class UserAssignedIdentity(_serialization.Model): :vartype user_assigned_identities: dict[str, ~azure.mgmt.rdbms.postgresql_flexibleservers.models.UserIdentity] :ivar type: the types of identities associated with this resource; currently restricted to - 'SystemAssigned and UserAssigned'. Required. Known values are: "None", "SystemAssigned", and - "UserAssigned". + 'SystemAssigned and UserAssigned'. Required. Known values are: "None" and "UserAssigned". :vartype type: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.IdentityType """ @@ -2379,8 +2593,7 @@ def __init__( :paramtype user_assigned_identities: dict[str, ~azure.mgmt.rdbms.postgresql_flexibleservers.models.UserIdentity] :keyword type: the types of identities associated with this resource; currently restricted to - 'SystemAssigned and UserAssigned'. Required. Known values are: "None", "SystemAssigned", and - "UserAssigned". + 'SystemAssigned and UserAssigned'. Required. Known values are: "None" and "UserAssigned". :paramtype type: str or ~azure.mgmt.rdbms.postgresql_flexibleservers.models.IdentityType """ super().__init__(**kwargs) @@ -2417,49 +2630,6 @@ def __init__(self, *, principal_id: Optional[str] = None, client_id: Optional[st self.client_id = client_id -class VcoreCapability(_serialization.Model): - """Vcores capability. - - Variables are only populated by the server, and will be ignored when sending a request. - - :ivar name: vCore name. - :vartype name: str - :ivar v_cores: supported vCores. - :vartype v_cores: int - :ivar supported_iops: supported IOPS. - :vartype supported_iops: int - :ivar supported_memory_per_vcore_mb: supported memory per vCore in MB. - :vartype supported_memory_per_vcore_mb: int - :ivar status: The status. - :vartype status: str - """ - - _validation = { - "name": {"readonly": True}, - "v_cores": {"readonly": True}, - "supported_iops": {"readonly": True}, - "supported_memory_per_vcore_mb": {"readonly": True}, - "status": {"readonly": True}, - } - - _attribute_map = { - "name": {"key": "name", "type": "str"}, - "v_cores": {"key": "vCores", "type": "int"}, - "supported_iops": {"key": "supportedIops", "type": "int"}, - "supported_memory_per_vcore_mb": {"key": "supportedMemoryPerVcoreMB", "type": "int"}, - "status": {"key": "status", "type": "str"}, - } - - def __init__(self, **kwargs: Any) -> None: - """ """ - super().__init__(**kwargs) - self.name = None - self.v_cores = None - self.supported_iops = None - self.supported_memory_per_vcore_mb = None - self.status = None - - class VirtualNetworkSubnetUsageParameter(_serialization.Model): """Virtual network subnet usage parameter. diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/_postgre_sql_management_client_enums.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/_postgre_sql_management_client_enums.py index c03e83c00b24..3110f8204bcb 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/_postgre_sql_management_client_enums.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/models/_postgre_sql_management_client_enums.py @@ -24,6 +24,34 @@ class ArmServerKeyType(str, Enum, metaclass=CaseInsensitiveEnumMeta): AZURE_KEY_VAULT = "AzureKeyVault" +class AzureManagedDiskPerformanceTiers(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """Name of storage tier for IOPS.""" + + P1 = "P1" + P2 = "P2" + P3 = "P3" + P4 = "P4" + P6 = "P6" + P10 = "P10" + P15 = "P15" + P20 = "P20" + P30 = "P30" + P40 = "P40" + P50 = "P50" + P60 = "P60" + P70 = "P70" + P80 = "P80" + + +class CapabilityStatus(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """The status of the capability.""" + + VISIBLE = "Visible" + AVAILABLE = "Available" + DEFAULT = "Default" + DISABLED = "Disabled" + + class CheckNameAvailabilityReason(str, Enum, metaclass=CaseInsensitiveEnumMeta): """The reason why the given name is not available.""" @@ -76,6 +104,20 @@ class FailoverMode(str, Enum, metaclass=CaseInsensitiveEnumMeta): FORCED_SWITCHOVER = "ForcedSwitchover" +class FastProvisioningSupportedEnum(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """Gets a value indicating whether fast provisioning is supported.""" + + ENABLED = "Enabled" + DISABLED = "Disabled" + + +class GeoBackupSupportedEnum(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """Determines if geo-backup is supported in this region.""" + + ENABLED = "Enabled" + DISABLED = "Disabled" + + class GeoRedundantBackupEnum(str, Enum, metaclass=CaseInsensitiveEnumMeta): """A value indicating whether Geo-Redundant backup is enabled on the server.""" @@ -97,10 +139,25 @@ class IdentityType(str, Enum, metaclass=CaseInsensitiveEnumMeta): """ NONE = "None" - SYSTEM_ASSIGNED = "SystemAssigned" USER_ASSIGNED = "UserAssigned" +class KeyStatusEnum(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """Primary encryption key status for Data encryption enabled server.""" + + VALID = "Valid" + INVALID = "Invalid" + + +class OnlineResizeSupportedEnum(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """A value indicating whether online resize is supported in this region for the given + subscription. + """ + + ENABLED = "Enabled" + DISABLED = "Disabled" + + class OperationOrigin(str, Enum, metaclass=CaseInsensitiveEnumMeta): """The intended executor of the operation.""" @@ -140,6 +197,13 @@ class ReplicationRole(str, Enum, metaclass=CaseInsensitiveEnumMeta): GEO_ASYNC_REPLICA = "GeoAsyncReplica" +class RestrictedEnum(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """A value indicating whether this region is restricted.""" + + ENABLED = "Enabled" + DISABLED = "Disabled" + + class ServerHAState(str, Enum, metaclass=CaseInsensitiveEnumMeta): """A state of a HA server that is visible to user.""" @@ -173,6 +237,7 @@ class ServerState(str, Enum, metaclass=CaseInsensitiveEnumMeta): class ServerVersion(str, Enum, metaclass=CaseInsensitiveEnumMeta): """The version of a server.""" + FIFTEEN = "15" FOURTEEN = "14" THIRTEEN = "13" TWELVE = "12" @@ -185,3 +250,31 @@ class SkuTier(str, Enum, metaclass=CaseInsensitiveEnumMeta): BURSTABLE = "Burstable" GENERAL_PURPOSE = "GeneralPurpose" MEMORY_OPTIMIZED = "MemoryOptimized" + + +class StorageAutoGrow(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """Flag to enable / disable Storage Auto grow for flexible server.""" + + ENABLED = "Enabled" + DISABLED = "Disabled" + + +class StorageAutoGrowthSupportedEnum(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """A value indicating whether storage auto-grow is supported in this region.""" + + ENABLED = "Enabled" + DISABLED = "Disabled" + + +class ZoneRedundantHaAndGeoBackupSupportedEnum(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """A value indicating whether Zone Redundant HA and Geo-backup is supported in this region.""" + + ENABLED = "Enabled" + DISABLED = "Disabled" + + +class ZoneRedundantHaSupportedEnum(str, Enum, metaclass=CaseInsensitiveEnumMeta): + """A value indicating whether Zone Redundant HA is supported in this region.""" + + ENABLED = "Enabled" + DISABLED = "Disabled" diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/__init__.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/__init__.py index 2bb2626b6162..f27d647ef2c2 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/__init__.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/__init__.py @@ -9,6 +9,7 @@ from ._administrators_operations import AdministratorsOperations from ._backups_operations import BackupsOperations from ._location_based_capabilities_operations import LocationBasedCapabilitiesOperations +from ._server_capabilities_operations import ServerCapabilitiesOperations from ._check_name_availability_operations import CheckNameAvailabilityOperations from ._check_name_availability_with_location_operations import CheckNameAvailabilityWithLocationOperations from ._configurations_operations import ConfigurationsOperations @@ -18,6 +19,7 @@ from ._operations import Operations from ._get_private_dns_zone_suffix_operations import GetPrivateDnsZoneSuffixOperations from ._replicas_operations import ReplicasOperations +from ._log_files_operations import LogFilesOperations from ._virtual_network_subnet_usage_operations import VirtualNetworkSubnetUsageOperations from ._patch import __all__ as _patch_all @@ -28,6 +30,7 @@ "AdministratorsOperations", "BackupsOperations", "LocationBasedCapabilitiesOperations", + "ServerCapabilitiesOperations", "CheckNameAvailabilityOperations", "CheckNameAvailabilityWithLocationOperations", "ConfigurationsOperations", @@ -37,6 +40,7 @@ "Operations", "GetPrivateDnsZoneSuffixOperations", "ReplicasOperations", + "LogFilesOperations", "VirtualNetworkSubnetUsageOperations", ] __all__.extend([p for p in _patch_all if p not in __all__]) diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_administrators_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_administrators_operations.py index 045ddd22e9a5..e01bcd501a9b 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_administrators_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_administrators_operations.py @@ -44,7 +44,7 @@ def build_create_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") @@ -83,7 +83,7 @@ def build_delete_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -119,7 +119,7 @@ def build_get_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -155,7 +155,7 @@ def build_list_by_server_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_backups_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_backups_operations.py index e07428402355..f7a18e844a19 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_backups_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_backups_operations.py @@ -42,7 +42,7 @@ def build_get_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -78,7 +78,7 @@ def build_list_by_server_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_check_name_availability_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_check_name_availability_operations.py index de27763f681c..b4e241da0c6a 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_check_name_availability_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_check_name_availability_operations.py @@ -38,7 +38,7 @@ def build_execute_request(subscription_id: str, **kwargs: Any) -> HttpRequest: _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_check_name_availability_with_location_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_check_name_availability_with_location_operations.py index 95113177646c..8134733ee2c5 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_check_name_availability_with_location_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_check_name_availability_with_location_operations.py @@ -38,7 +38,7 @@ def build_execute_request(location_name: str, subscription_id: str, **kwargs: An _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_configurations_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_configurations_operations.py index 4068f2bc20c5..6667d215377a 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_configurations_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_configurations_operations.py @@ -44,7 +44,7 @@ def build_list_by_server_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -79,7 +79,7 @@ def build_get_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -117,7 +117,7 @@ def build_update_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") @@ -158,7 +158,7 @@ def build_put_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_databases_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_databases_operations.py index 5380ea47664b..0473d0df3f8f 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_databases_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_databases_operations.py @@ -44,7 +44,7 @@ def build_create_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") @@ -83,7 +83,7 @@ def build_delete_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -119,7 +119,7 @@ def build_get_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -155,7 +155,7 @@ def build_list_by_server_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_firewall_rules_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_firewall_rules_operations.py index 429a14b3f282..0e2261a96586 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_firewall_rules_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_firewall_rules_operations.py @@ -44,7 +44,7 @@ def build_create_or_update_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") @@ -85,7 +85,7 @@ def build_delete_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -123,7 +123,7 @@ def build_get_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -161,7 +161,7 @@ def build_list_by_server_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_get_private_dns_zone_suffix_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_get_private_dns_zone_suffix_operations.py index b73fc86e0d9d..4b7d0f22365d 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_get_private_dns_zone_suffix_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_get_private_dns_zone_suffix_operations.py @@ -38,7 +38,7 @@ def build_execute_request(**kwargs: Any) -> HttpRequest: _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_location_based_capabilities_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_location_based_capabilities_operations.py index 44966bd2facc..0a1cc9fe0fd9 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_location_based_capabilities_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_location_based_capabilities_operations.py @@ -6,8 +6,7 @@ # Code generated by Microsoft (R) AutoRest Code Generator. # Changes may cause incorrect behavior and will be lost if the code is regenerated. # -------------------------------------------------------------------------- -from typing import Any, Callable, Dict, Iterable, Optional, TypeVar -import urllib.parse +from typing import Any, Callable, Dict, Optional, TypeVar from azure.core.exceptions import ( ClientAuthenticationError, @@ -17,7 +16,6 @@ ResourceNotModifiedError, map_error, ) -from azure.core.paging import ItemPaged from azure.core.pipeline import PipelineResponse from azure.core.pipeline.transport import HttpResponse from azure.core.rest import HttpRequest @@ -40,7 +38,7 @@ def build_execute_request(location_name: str, subscription_id: str, **kwargs: An _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -84,24 +82,16 @@ def __init__(self, *args, **kwargs): self._deserialize = input_args.pop(0) if input_args else kwargs.pop("deserializer") @distributed_trace - def execute(self, location_name: str, **kwargs: Any) -> Iterable["_models.CapabilityProperties"]: + def execute(self, location_name: str, **kwargs: Any) -> _models.CapabilitiesListResult: """Get capabilities at specified location in a given subscription. :param location_name: The name of the location. Required. :type location_name: str :keyword callable cls: A custom type or function that will be passed the direct response - :return: An iterator like instance of either CapabilityProperties or the result of - cls(response) - :rtype: - ~azure.core.paging.ItemPaged[~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilityProperties] + :return: CapabilitiesListResult or the result of cls(response) + :rtype: ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilitiesListResult :raises ~azure.core.exceptions.HttpResponseError: """ - _headers = kwargs.pop("headers", {}) or {} - _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - - api_version: str = kwargs.pop("api_version", _params.pop("api-version", self._config.api_version)) - cls: ClsType[_models.CapabilitiesListResult] = kwargs.pop("cls", None) - error_map = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, @@ -110,62 +100,41 @@ def execute(self, location_name: str, **kwargs: Any) -> Iterable["_models.Capabi } error_map.update(kwargs.pop("error_map", {}) or {}) - def prepare_request(next_link=None): - if not next_link: - - request = build_execute_request( - location_name=location_name, - subscription_id=self._config.subscription_id, - api_version=api_version, - template_url=self.execute.metadata["url"], - headers=_headers, - params=_params, - ) - request = _convert_request(request) - request.url = self._client.format_url(request.url) - - else: - # make call to next link with the client's api-version - _parsed_next_link = urllib.parse.urlparse(next_link) - _next_request_params = case_insensitive_dict( - { - key: [urllib.parse.quote(v) for v in value] - for key, value in urllib.parse.parse_qs(_parsed_next_link.query).items() - } - ) - _next_request_params["api-version"] = self._config.api_version - request = HttpRequest( - "GET", urllib.parse.urljoin(next_link, _parsed_next_link.path), params=_next_request_params - ) - request = _convert_request(request) - request.url = self._client.format_url(request.url) - request.method = "GET" - return request - - def extract_data(pipeline_response): - deserialized = self._deserialize("CapabilitiesListResult", pipeline_response) - list_of_elem = deserialized.value - if cls: - list_of_elem = cls(list_of_elem) # type: ignore - return deserialized.next_link or None, iter(list_of_elem) - - def get_next(next_link=None): - request = prepare_request(next_link) - - _stream = False - pipeline_response: PipelineResponse = self._client._pipeline.run( # pylint: disable=protected-access - request, stream=_stream, **kwargs - ) - response = pipeline_response.http_response - - if response.status_code not in [200]: - map_error(status_code=response.status_code, response=response, error_map=error_map) - error = self._deserialize.failsafe_deserialize(_models.ErrorResponse, pipeline_response) - raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) - - return pipeline_response - - return ItemPaged(get_next, extract_data) + _headers = kwargs.pop("headers", {}) or {} + _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) + + api_version: str = kwargs.pop("api_version", _params.pop("api-version", self._config.api_version)) + cls: ClsType[_models.CapabilitiesListResult] = kwargs.pop("cls", None) + + request = build_execute_request( + location_name=location_name, + subscription_id=self._config.subscription_id, + api_version=api_version, + template_url=self.execute.metadata["url"], + headers=_headers, + params=_params, + ) + request = _convert_request(request) + request.url = self._client.format_url(request.url) + + _stream = False + pipeline_response: PipelineResponse = self._client._pipeline.run( # pylint: disable=protected-access + request, stream=_stream, **kwargs + ) + + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + error = self._deserialize.failsafe_deserialize(_models.ErrorResponse, pipeline_response) + raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) + + deserialized = self._deserialize("CapabilitiesListResult", pipeline_response) + + if cls: + return cls(pipeline_response, deserialized, {}) + + return deserialized execute.metadata = { "url": "/subscriptions/{subscriptionId}/providers/Microsoft.DBforPostgreSQL/locations/{locationName}/capabilities" diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_log_files_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_log_files_operations.py new file mode 100644 index 000000000000..2aab7ae27466 --- /dev/null +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_log_files_operations.py @@ -0,0 +1,182 @@ +# pylint: disable=too-many-lines +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is regenerated. +# -------------------------------------------------------------------------- +from typing import Any, Callable, Dict, Iterable, Optional, TypeVar +import urllib.parse + +from azure.core.exceptions import ( + ClientAuthenticationError, + HttpResponseError, + ResourceExistsError, + ResourceNotFoundError, + ResourceNotModifiedError, + map_error, +) +from azure.core.paging import ItemPaged +from azure.core.pipeline import PipelineResponse +from azure.core.pipeline.transport import HttpResponse +from azure.core.rest import HttpRequest +from azure.core.tracing.decorator import distributed_trace +from azure.core.utils import case_insensitive_dict +from azure.mgmt.core.exceptions import ARMErrorFormat + +from .. import models as _models +from .._serialization import Serializer +from .._vendor import _convert_request, _format_url_section + +T = TypeVar("T") +ClsType = Optional[Callable[[PipelineResponse[HttpRequest, HttpResponse], T, Dict[str, Any]], Any]] + +_SERIALIZER = Serializer() +_SERIALIZER.client_side_validation = False + + +def build_list_by_server_request( + resource_group_name: str, server_name: str, subscription_id: str, **kwargs: Any +) -> HttpRequest: + _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) + _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) + + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) + accept = _headers.pop("Accept", "application/json") + + # Construct URL + _url = kwargs.pop( + "template_url", + "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/flexibleServers/{serverName}/logFiles", + ) # pylint: disable=line-too-long + path_format_arguments = { + "subscriptionId": _SERIALIZER.url("subscription_id", subscription_id, "str", min_length=1), + "resourceGroupName": _SERIALIZER.url( + "resource_group_name", resource_group_name, "str", max_length=90, min_length=1 + ), + "serverName": _SERIALIZER.url( + "server_name", server_name, "str", max_length=63, min_length=3, pattern=r"^[a-zA-Z0-9]+(-[a-zA-Z0-9]+)*" + ), + } + + _url: str = _format_url_section(_url, **path_format_arguments) # type: ignore + + # Construct parameters + _params["api-version"] = _SERIALIZER.query("api_version", api_version, "str") + + # Construct headers + _headers["Accept"] = _SERIALIZER.header("accept", accept, "str") + + return HttpRequest(method="GET", url=_url, params=_params, headers=_headers, **kwargs) + + +class LogFilesOperations: + """ + .. warning:: + **DO NOT** instantiate this class directly. + + Instead, you should access the following operations through + :class:`~azure.mgmt.rdbms.postgresql_flexibleservers.PostgreSQLManagementClient`'s + :attr:`log_files` attribute. + """ + + models = _models + + def __init__(self, *args, **kwargs): + input_args = list(args) + self._client = input_args.pop(0) if input_args else kwargs.pop("client") + self._config = input_args.pop(0) if input_args else kwargs.pop("config") + self._serialize = input_args.pop(0) if input_args else kwargs.pop("serializer") + self._deserialize = input_args.pop(0) if input_args else kwargs.pop("deserializer") + + @distributed_trace + def list_by_server(self, resource_group_name: str, server_name: str, **kwargs: Any) -> Iterable["_models.LogFile"]: + """List all the server log files in a given server. + + :param resource_group_name: The name of the resource group. The name is case insensitive. + Required. + :type resource_group_name: str + :param server_name: The name of the server. Required. + :type server_name: str + :keyword callable cls: A custom type or function that will be passed the direct response + :return: An iterator like instance of either LogFile or the result of cls(response) + :rtype: + ~azure.core.paging.ItemPaged[~azure.mgmt.rdbms.postgresql_flexibleservers.models.LogFile] + :raises ~azure.core.exceptions.HttpResponseError: + """ + _headers = kwargs.pop("headers", {}) or {} + _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) + + api_version: str = kwargs.pop("api_version", _params.pop("api-version", self._config.api_version)) + cls: ClsType[_models.LogFileListResult] = kwargs.pop("cls", None) + + error_map = { + 401: ClientAuthenticationError, + 404: ResourceNotFoundError, + 409: ResourceExistsError, + 304: ResourceNotModifiedError, + } + error_map.update(kwargs.pop("error_map", {}) or {}) + + def prepare_request(next_link=None): + if not next_link: + + request = build_list_by_server_request( + resource_group_name=resource_group_name, + server_name=server_name, + subscription_id=self._config.subscription_id, + api_version=api_version, + template_url=self.list_by_server.metadata["url"], + headers=_headers, + params=_params, + ) + request = _convert_request(request) + request.url = self._client.format_url(request.url) + + else: + # make call to next link with the client's api-version + _parsed_next_link = urllib.parse.urlparse(next_link) + _next_request_params = case_insensitive_dict( + { + key: [urllib.parse.quote(v) for v in value] + for key, value in urllib.parse.parse_qs(_parsed_next_link.query).items() + } + ) + _next_request_params["api-version"] = self._config.api_version + request = HttpRequest( + "GET", urllib.parse.urljoin(next_link, _parsed_next_link.path), params=_next_request_params + ) + request = _convert_request(request) + request.url = self._client.format_url(request.url) + request.method = "GET" + return request + + def extract_data(pipeline_response): + deserialized = self._deserialize("LogFileListResult", pipeline_response) + list_of_elem = deserialized.value + if cls: + list_of_elem = cls(list_of_elem) # type: ignore + return deserialized.next_link or None, iter(list_of_elem) + + def get_next(next_link=None): + request = prepare_request(next_link) + + _stream = False + pipeline_response: PipelineResponse = self._client._pipeline.run( # pylint: disable=protected-access + request, stream=_stream, **kwargs + ) + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + error = self._deserialize.failsafe_deserialize(_models.ErrorResponse, pipeline_response) + raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) + + return pipeline_response + + return ItemPaged(get_next, extract_data) + + list_by_server.metadata = { + "url": "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/flexibleServers/{serverName}/logFiles" + } diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_operations.py index 80a920a36035..e51474946c8c 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_operations.py @@ -38,7 +38,7 @@ def build_list_request(**kwargs: Any) -> HttpRequest: _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_replicas_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_replicas_operations.py index 781d7e504c91..e560165bdeb4 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_replicas_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_replicas_operations.py @@ -42,7 +42,7 @@ def build_list_by_server_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_server_capabilities_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_server_capabilities_operations.py new file mode 100644 index 000000000000..06069e7e683c --- /dev/null +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_server_capabilities_operations.py @@ -0,0 +1,150 @@ +# pylint: disable=too-many-lines +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is regenerated. +# -------------------------------------------------------------------------- +from typing import Any, Callable, Dict, Optional, TypeVar + +from azure.core.exceptions import ( + ClientAuthenticationError, + HttpResponseError, + ResourceExistsError, + ResourceNotFoundError, + ResourceNotModifiedError, + map_error, +) +from azure.core.pipeline import PipelineResponse +from azure.core.pipeline.transport import HttpResponse +from azure.core.rest import HttpRequest +from azure.core.tracing.decorator import distributed_trace +from azure.core.utils import case_insensitive_dict +from azure.mgmt.core.exceptions import ARMErrorFormat + +from .. import models as _models +from .._serialization import Serializer +from .._vendor import _convert_request, _format_url_section + +T = TypeVar("T") +ClsType = Optional[Callable[[PipelineResponse[HttpRequest, HttpResponse], T, Dict[str, Any]], Any]] + +_SERIALIZER = Serializer() +_SERIALIZER.client_side_validation = False + + +def build_list_request(resource_group_name: str, server_name: str, subscription_id: str, **kwargs: Any) -> HttpRequest: + _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) + _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) + + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) + accept = _headers.pop("Accept", "application/json") + + # Construct URL + _url = kwargs.pop( + "template_url", + "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/flexibleServers/{serverName}/capabilities", + ) # pylint: disable=line-too-long + path_format_arguments = { + "subscriptionId": _SERIALIZER.url("subscription_id", subscription_id, "str", min_length=1), + "resourceGroupName": _SERIALIZER.url( + "resource_group_name", resource_group_name, "str", max_length=90, min_length=1 + ), + "serverName": _SERIALIZER.url( + "server_name", server_name, "str", max_length=63, min_length=3, pattern=r"^[a-zA-Z0-9]+(-[a-zA-Z0-9]+)*" + ), + } + + _url: str = _format_url_section(_url, **path_format_arguments) # type: ignore + + # Construct parameters + _params["api-version"] = _SERIALIZER.query("api_version", api_version, "str") + + # Construct headers + _headers["Accept"] = _SERIALIZER.header("accept", accept, "str") + + return HttpRequest(method="GET", url=_url, params=_params, headers=_headers, **kwargs) + + +class ServerCapabilitiesOperations: + """ + .. warning:: + **DO NOT** instantiate this class directly. + + Instead, you should access the following operations through + :class:`~azure.mgmt.rdbms.postgresql_flexibleservers.PostgreSQLManagementClient`'s + :attr:`server_capabilities` attribute. + """ + + models = _models + + def __init__(self, *args, **kwargs): + input_args = list(args) + self._client = input_args.pop(0) if input_args else kwargs.pop("client") + self._config = input_args.pop(0) if input_args else kwargs.pop("config") + self._serialize = input_args.pop(0) if input_args else kwargs.pop("serializer") + self._deserialize = input_args.pop(0) if input_args else kwargs.pop("deserializer") + + @distributed_trace + def list(self, resource_group_name: str, server_name: str, **kwargs: Any) -> _models.CapabilitiesListResult: + """Get capabilities at specified location in a given subscription. + + :param resource_group_name: The name of the resource group. The name is case insensitive. + Required. + :type resource_group_name: str + :param server_name: The name of the server. Required. + :type server_name: str + :keyword callable cls: A custom type or function that will be passed the direct response + :return: CapabilitiesListResult or the result of cls(response) + :rtype: ~azure.mgmt.rdbms.postgresql_flexibleservers.models.CapabilitiesListResult + :raises ~azure.core.exceptions.HttpResponseError: + """ + error_map = { + 401: ClientAuthenticationError, + 404: ResourceNotFoundError, + 409: ResourceExistsError, + 304: ResourceNotModifiedError, + } + error_map.update(kwargs.pop("error_map", {}) or {}) + + _headers = kwargs.pop("headers", {}) or {} + _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) + + api_version: str = kwargs.pop("api_version", _params.pop("api-version", self._config.api_version)) + cls: ClsType[_models.CapabilitiesListResult] = kwargs.pop("cls", None) + + request = build_list_request( + resource_group_name=resource_group_name, + server_name=server_name, + subscription_id=self._config.subscription_id, + api_version=api_version, + template_url=self.list.metadata["url"], + headers=_headers, + params=_params, + ) + request = _convert_request(request) + request.url = self._client.format_url(request.url) + + _stream = False + pipeline_response: PipelineResponse = self._client._pipeline.run( # pylint: disable=protected-access + request, stream=_stream, **kwargs + ) + + response = pipeline_response.http_response + + if response.status_code not in [200]: + map_error(status_code=response.status_code, response=response, error_map=error_map) + error = self._deserialize.failsafe_deserialize(_models.ErrorResponse, pipeline_response) + raise HttpResponseError(response=response, model=error, error_format=ARMErrorFormat) + + deserialized = self._deserialize("CapabilitiesListResult", pipeline_response) + + if cls: + return cls(pipeline_response, deserialized, {}) + + return deserialized + + list.metadata = { + "url": "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/flexibleServers/{serverName}/capabilities" + } diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_servers_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_servers_operations.py index 2d24e97de453..6f2aaaf55b53 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_servers_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_servers_operations.py @@ -44,7 +44,7 @@ def build_create_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") @@ -82,7 +82,7 @@ def build_update_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") @@ -120,7 +120,7 @@ def build_delete_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -153,7 +153,7 @@ def build_get_request(resource_group_name: str, server_name: str, subscription_i _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -186,7 +186,7 @@ def build_list_by_resource_group_request(resource_group_name: str, subscription_ _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -216,7 +216,7 @@ def build_list_request(subscription_id: str, **kwargs: Any) -> HttpRequest: _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -244,7 +244,7 @@ def build_restart_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") @@ -280,7 +280,7 @@ def build_start_request(resource_group_name: str, server_name: str, subscription _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -313,7 +313,7 @@ def build_stop_request(resource_group_name: str, server_name: str, subscription_ _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) accept = _headers.pop("Accept", "application/json") # Construct URL diff --git a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_virtual_network_subnet_usage_operations.py b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_virtual_network_subnet_usage_operations.py index ac7b61000770..f0dc313c4cad 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_virtual_network_subnet_usage_operations.py +++ b/sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_virtual_network_subnet_usage_operations.py @@ -38,7 +38,7 @@ def build_execute_request(location_name: str, subscription_id: str, **kwargs: An _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2022-12-01")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2023-03-01-preview")) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) accept = _headers.pop("Accept", "application/json") diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_batch_update.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrator_add.py similarity index 66% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_batch_update.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrator_add.py index 2280e20d73f0..362e04ccfb6a 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_batch_update.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrator_add.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python configurations_batch_update.py + python administrator_add.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,25 +24,26 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.configurations.begin_batch_update( + response = client.administrators.begin_create( resource_group_name="testrg", - server_name="mysqltestserver", + server_name="testserver", + object_id="oooooooo-oooo-oooo-oooo-oooooooooooo", parameters={ - "resetAllToDefault": "False", - "value": [ - {"name": "event_scheduler", "properties": {"value": "OFF"}}, - {"name": "div_precision_increment", "properties": {"value": "8"}}, - ], + "properties": { + "principalName": "testuser1@microsoft.com", + "principalType": "User", + "tenantId": "tttttttt-tttt-tttt-tttt-tttttttttttt", + } }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Configurations/preview/2021-12-01-preview/examples/ConfigurationsBatchUpdate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/AdministratorAdd.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrator_delete.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrator_delete.py similarity index 74% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrator_delete.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrator_delete.py index 121b4015abe0..131531932a86 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrator_delete.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrator_delete.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python azure_ad_administrator_delete.py + python administrator_delete.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.azure_ad_administrators.begin_delete( + response = client.administrators.begin_delete( resource_group_name="testrg", - server_name="mysqltestsvc4", - administrator_name="ActiveDirectory", + server_name="testserver", + object_id="oooooooo-oooo-oooo-oooo-oooooooooooo", ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/AAD/preview/2021-12-01-preview/examples/AzureADAdministratorDelete.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/AdministratorDelete.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrator_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrator_get.py similarity index 74% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrator_get.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrator_get.py index bf67d9888156..8cc399fb01fc 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrator_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrator_get.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python azure_ad_administrator_get.py + python administrator_get.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.azure_ad_administrators.get( + response = client.administrators.get( resource_group_name="testrg", - server_name="mysqltestsvc4", - administrator_name="ActiveDirectory", + server_name="pgtestsvc1", + object_id="oooooooo-oooo-oooo-oooo-oooooooooooo", ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/AAD/preview/2021-12-01-preview/examples/AzureADAdministratorGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/AdministratorGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrators_list_by_server.py similarity index 76% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_list_by_server.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrators_list_by_server.py index 8be7ded59d00..70d99d07b6df 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/administrators_list_by_server.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python configurations_list_by_server.py + python administrators_list_by_server.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.configurations.list_by_server( + response = client.administrators.list_by_server( resource_group_name="testrg", - server_name="mysqltestserver", + server_name="pgtestsvc1", ) for item in response: print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Configurations/preview/2021-12-01-preview/examples/ConfigurationsListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/AdministratorsListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/advisors_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/advisors_list_by_server.py deleted file mode 100644 index e98238907185..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/advisors_list_by_server.py +++ /dev/null @@ -1,42 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python advisors_list_by_server.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.advisors.list_by_server( - resource_group_name="testResourceGroupName", - server_name="testServerName", - ) - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/AdvisorsListByServer.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrator_create.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrator_create.py deleted file mode 100644 index 8a9d0fe92ea2..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrator_create.py +++ /dev/null @@ -1,51 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python azure_ad_administrator_create.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.azure_ad_administrators.begin_create_or_update( - resource_group_name="testrg", - server_name="mysqltestsvc4", - administrator_name="ActiveDirectory", - parameters={ - "properties": { - "administratorType": "ActiveDirectory", - "identityResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/test-group/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-umi", - "login": "bob@contoso.com", - "sid": "c6b82b90-a647-49cb-8a62-0d2d3cb7ac7c", - "tenantId": "c12b7025-bfe2-46c1-b463-993b5e4cd467", - } - }, - ).result() - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/AAD/preview/2021-12-01-preview/examples/AzureADAdministratorCreate.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_and_export.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_and_export.py deleted file mode 100644 index edffe5c94e53..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_and_export.py +++ /dev/null @@ -1,45 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python backup_and_export.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.backup_and_export.begin_create( - resource_group_name="TestGroup", - server_name="mysqltestserver", - parameters={ - "backupSettings": {"backupName": "customer-backup-name"}, - "targetDetails": {"objectType": "FullBackupStoreDetails", "sasUriList": ["sasuri1", "sasuri2"]}, - }, - ).result() - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Backups/preview/2022-09-30-preview/examples/BackupAndExport.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_get.py index 1a59cd0de32b..6b024b3584db 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.backups.get( resource_group_name="TestGroup", - server_name="mysqltestserver", + server_name="postgresqltestserver", backup_name="daily_20210615T160516", ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Backups/preview/2022-09-30-preview/examples/BackupGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/BackupGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backups_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_list_by_server.py similarity index 79% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/backups_list_by_server.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_list_by_server.py index 711b8bb25565..c989b580d613 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backups_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_list_by_server.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python backups_list_by_server.py + python backup_list_by_server.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.backups.list_by_server( resource_group_name="TestGroup", - server_name="mysqltestserver", + server_name="postgresqltestserver", ) for item in response: print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Backups/preview/2022-09-30-preview/examples/BackupsListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/BackupListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/validate_backup.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/capabilities_by_location.py similarity index 74% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/validate_backup.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/capabilities_by_location.py index 88f07ed34a9d..976b42e395f2 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/validate_backup.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/capabilities_by_location.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python validate_backup.py + python capabilities_by_location.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,18 +24,17 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.backup_and_export.validate_backup( - resource_group_name="TestGroup", - server_name="mysqltestserver", + response = client.location_based_capabilities.execute( + location_name="westus", ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Backups/preview/2022-09-30-preview/examples/ValidateBackup.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/CapabilitiesByLocation.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/capabilities_by_location_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/capabilities_by_location_list.py deleted file mode 100644 index d2dc22ef3de7..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/capabilities_by_location_list.py +++ /dev/null @@ -1,41 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python capabilities_by_location_list.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.location_based_capabilities.list( - location_name="WestUS", - ) - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/ServiceOperations/preview/2021-12-01-preview/examples/CapabilitiesByLocationList.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_name_availability.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_name_availability.py index 9e3ef6db4767..0921ec893978 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_name_availability.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_name_availability.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,17 +24,17 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.check_name_availability.execute( - name_availability_request={"name": "name1", "type": "Microsoft.DBforMySQL"}, + name_availability_request={"name": "name1", "type": "Microsoft.DBforPostgreSQL"}, ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/CheckNameAvailability.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/CheckNameAvailability.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/advisors_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_name_availability_location_based.py similarity index 69% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/advisors_get.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_name_availability_location_based.py index ea56fbccf483..2347692d84d3 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/advisors_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_name_availability_location_based.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python advisors_get.py + python check_name_availability_location_based.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,19 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.advisors.get( - resource_group_name="testResourceGroupName", - server_name="testServerName", - advisor_name="Index", + response = client.check_name_availability_with_location.execute( + location_name="westus", + name_availability_request={"name": "name1", "type": "Microsoft.DBforPostgreSQL/flexibleServers"}, ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/AdvisorsGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/CheckNameAvailabilityLocationBased.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_create_or_update.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_create_or_update.py index b86df333c888..c99866042768 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_create_or_update.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_create_or_update.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -32,12 +32,12 @@ def main(): response = client.configurations.begin_create_or_update( resource_group_name="TestGroup", server_name="testserver", - configuration_name="event_scheduler", + configuration_name="array_nulls", parameters={"properties": {"source": "user-override", "value": "off"}}, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ConfigurationCreateOrUpdate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ConfigurationCreateOrUpdate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_get.py index e4ce84ed0522..6d88d709bfe5 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -32,11 +32,11 @@ def main(): response = client.configurations.get( resource_group_name="TestGroup", server_name="testserver", - configuration_name="event_scheduler", + configuration_name="array_nulls", ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ConfigurationGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ConfigurationGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_list_by_server.py index 2cc9881e755b..bd8dcabf2dd2 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_list_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.configurations.list_by_server( - resource_group_name="testrg", - server_name="mysqltestsvc1", + resource_group_name="TestGroup", + server_name="testserver", ) for item in response: print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ConfigurationListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ConfigurationListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_update.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_update.py index 331b953e30aa..0f7145d8669d 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_update.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configuration_update.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -38,6 +38,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Configurations/preview/2021-12-01-preview/examples/ConfigurationUpdate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ConfigurationUpdate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_update_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_update_by_server.py index f40bafcde0ec..fd68770d08b3 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_update_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/configurations_update_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,22 +24,22 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.server_parameters.begin_list_update_configurations( - resource_group_name="testrg", - server_name="mysqltestsvc1", + resource_group_name="TestGroup", + server_name="testserver", value=[ - {"name": "event_scheduler", "properties": {"value": "OFF"}}, - {"name": "div_precision_increment", "properties": {"value": "4"}}, + {"name": "array_nulls", "properties": {"value": "on"}}, + {"name": "backslash_quote", "properties": {"value": "on"}}, ], ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ConfigurationsUpdateByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ConfigurationsUpdateByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_create.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_create.py index c949ecbd8358..770ec8060aed 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_create.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_create.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -33,11 +33,11 @@ def main(): resource_group_name="TestGroup", server_name="testserver", database_name="db1", - parameters={"properties": {"charset": "utf8", "collation": "utf8_general_ci"}}, + parameters={"properties": {"charset": "UTF8", "collation": "English_United States.1252"}}, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/DatabaseCreate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/DatabaseCreate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_delete.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_delete.py index 2e84b298e34c..110bdb9953e7 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_delete.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_delete.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/DatabaseDelete.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/DatabaseDelete.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_get.py index 850b564fb5ae..d054c6b475d3 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/DatabaseGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/DatabaseGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_list_by_server.py index a0934ff1492b..454818759b47 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/database_list_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/DatabaseListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/DatabaseListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/databases_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/databases_list_by_server.py index 76f6f69952f7..f3bf9bd857ef 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/databases_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/databases_list_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Databases/preview/2021-12-01-preview/examples/DatabasesListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/DatabasesListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_create.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_create.py index e5ea3c2ba963..74fae897a3b9 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_create.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_create.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -38,6 +38,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/FirewallRuleCreate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/FirewallRuleCreate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_delete.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_delete.py index fb1a28ce6b8c..baab444017db 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_delete.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_delete.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/FirewallRuleDelete.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/FirewallRuleDelete.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_get.py index 16ab6af7c1d4..15057f6dda11 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/FirewallRuleGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/FirewallRuleGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_list_by_server.py index 3ddd50df2e7e..426b086fb1bd 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rule_list_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/FirewallRuleListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/FirewallRuleListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rules_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rules_list_by_server.py deleted file mode 100644 index 496fea7c213b..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/firewall_rules_list_by_server.py +++ /dev/null @@ -1,42 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python firewall_rules_list_by_server.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.firewall_rules.list_by_server( - resource_group_name="TestGroup", - server_name="testserver", - ) - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Firewall/preview/2021-12-01-preview/examples/FirewallRulesListByServer.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/get_private_dns_zone_suffix.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/get_private_dns_zone_suffix.py index dd94b67541bd..b75d6703dd48 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/get_private_dns_zone_suffix.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/get_private_dns_zone_suffix.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,15 +24,15 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), - subscription_id="SUBSCRIPTION_ID", + subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.get_private_dns_zone_suffix.execute() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/ServiceOperations/preview/2021-12-01-preview/examples/GetPrivateDnsZoneSuffix.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/GetPrivateDnsZoneSuffix.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/log_file_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/log_file_list_by_server.py index 0245032a27a4..877b0de52027 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/log_file_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/log_file_list_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/LogFileListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/LogFileListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/log_files_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/log_files_list_by_server.py index 9d9c36edc5a2..b9ce972f355c 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/log_files_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/log_files_list_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.log_files.list_by_server( resource_group_name="testrg", - server_name="mysqltestsvc1", + server_name="postgresqltestsvc1", ) for item in response: print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/LogFiles/preview/2021-12-01-preview/examples/LogFilesListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/LogFilesListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/operation_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/operation_list.py index 392b60f745b8..30fd17d192dd 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/operation_list.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/operation_list.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="SUBSCRIPTION_ID", ) @@ -33,6 +33,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/OperationList.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/OperationList.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/operations_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/operations_list.py deleted file mode 100644 index 487f4265edbb..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/operations_list.py +++ /dev/null @@ -1,39 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python operations_list.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="SUBSCRIPTION_ID", - ) - - response = client.operations.list() - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/ServiceOperations/preview/2021-12-01-preview/examples/OperationsList.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/performance_tiers_list_by_location.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/performance_tiers_list_by_location.py index 6252b506688f..fa9932529812 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/performance_tiers_list_by_location.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/performance_tiers_list_by_location.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -36,6 +36,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/PerformanceTiersListByLocation.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/PerformanceTiersListByLocation.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/performance_tiers_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/performance_tiers_list_by_server.py index 4a6ef3fd14a3..d91d761ed47e 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/performance_tiers_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/performance_tiers_list_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.server_based_performance_tier.list( - resource_group_name="testrg", - server_name="mysqltestsvc1", + resource_group_name="TestGroup", + server_name="testserver", ) for item in response: print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/PerformanceTiersListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/PerformanceTiersListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_delete.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_delete.py index 2f5b17d576ef..5a1580957d5a 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_delete.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_delete.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/PrivateEndpointConnectionDelete.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2018-06-01/examples/PrivateEndpointConnectionDelete.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_get.py index af0e6f00579a..b3e1a5b3b9a5 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/PrivateEndpointConnectionGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2018-06-01/examples/PrivateEndpointConnectionGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_list.py index 528f3a9dddf7..e874a4b180fe 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_list.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_list.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/PrivateEndpointConnectionList.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2018-06-01/examples/PrivateEndpointConnectionList.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_update.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_update.py index b76b7549c621..db4d5ea7fe3c 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_update.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_update.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -45,6 +45,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/PrivateEndpointConnectionUpdate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2018-06-01/examples/PrivateEndpointConnectionUpdate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_update_tags.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_update_tags.py index 31de9b186f8c..25a364ffa1d6 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_update_tags.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_endpoint_connection_update_tags.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -33,11 +33,11 @@ def main(): resource_group_name="Default", server_name="test-svr", private_endpoint_connection_name="private-endpoint-connection-name", - parameters={"tags": {"key1": "val1", "key2": "val2"}}, + parameters={"tags": {"key1": "val1", "key2": "val2", "key3": "val3"}}, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/PrivateEndpointConnectionUpdateTags.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2018-06-01/examples/PrivateEndpointConnectionUpdateTags.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_link_resources_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_link_resources_get.py index 7d29edee6ce7..4c35923893d4 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_link_resources_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_link_resources_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/PrivateLinkResourcesGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2018-06-01/examples/PrivateLinkResourcesGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_link_resources_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_link_resources_list.py index 63b6775951fc..a8703cecc24e 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_link_resources_list.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/private_link_resources_list.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/PrivateLinkResourcesList.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2018-06-01/examples/PrivateLinkResourcesList.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/query_performance_insight_reset_data.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/query_performance_insight_reset_data.py deleted file mode 100644 index c70be33dba67..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/query_performance_insight_reset_data.py +++ /dev/null @@ -1,41 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python query_performance_insight_reset_data.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.reset_query_performance_insight_data( - resource_group_name="testResourceGroupName", - server_name="testServerName", - ) - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/QueryPerformanceInsightResetData.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/query_texts_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/query_texts_get.py deleted file mode 100644 index 3c394f79f7ac..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/query_texts_get.py +++ /dev/null @@ -1,42 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python query_texts_get.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.query_texts.get( - resource_group_name="testResourceGroupName", - server_name="testServerName", - query_id="1", - ) - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/QueryTextsGet.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/query_texts_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/query_texts_list_by_server.py deleted file mode 100644 index 06e8320410d4..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/query_texts_list_by_server.py +++ /dev/null @@ -1,43 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python query_texts_list_by_server.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.query_texts.list_by_server( - resource_group_name="testResourceGroupName", - server_name="testServerName", - query_ids=["1", "2"], - ) - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/QueryTextsListByServer.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_action_session_create.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_action_session_create.py deleted file mode 100644 index 001d3f500a77..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_action_session_create.py +++ /dev/null @@ -1,43 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python recommended_action_session_create.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.begin_create_recommended_action_session( - resource_group_name="testResourceGroupName", - server_name="testServerName", - advisor_name="Index", - database_name="someDatabaseName", - ).result() - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/RecommendedActionSessionCreate.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_action_session_operation_status.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_action_session_operation_status.py deleted file mode 100644 index 08330cc8ec8a..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_action_session_operation_status.py +++ /dev/null @@ -1,41 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python recommended_action_session_operation_status.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.location_based_recommended_action_sessions_operation_status.get( - location_name="WestUS", - operation_id="aaaabbbb-cccc-dddd-0000-111122223333", - ) - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/RecommendedActionSessionOperationStatus.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_action_session_result.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_action_session_result.py deleted file mode 100644 index b3a07ad5927e..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_action_session_result.py +++ /dev/null @@ -1,42 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python recommended_action_session_result.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.location_based_recommended_action_sessions_result.list( - location_name="WestUS", - operation_id="aaaabbbb-cccc-dddd-0000-111122223333", - ) - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/RecommendedActionSessionResult.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_actions_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_actions_get.py deleted file mode 100644 index 33ff5b0cb357..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_actions_get.py +++ /dev/null @@ -1,43 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python recommended_actions_get.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.recommended_actions.get( - resource_group_name="testResourceGroupName", - server_name="testServerName", - advisor_name="Index", - recommended_action_name="Index-1", - ) - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/RecommendedActionsGet.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_actions_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_actions_list_by_server.py deleted file mode 100644 index 27c3877460bd..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recommended_actions_list_by_server.py +++ /dev/null @@ -1,43 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python recommended_actions_list_by_server.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.recommended_actions.list_by_server( - resource_group_name="testResourceGroupName", - server_name="testServerName", - advisor_name="Index", - ) - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/RecommendedActionsListByServer.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recoverable_servers_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recoverable_servers_get.py index a40c7296d53c..42276e352d24 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recoverable_servers_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/recoverable_servers_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,18 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.recoverable_servers.get( resource_group_name="testrg", - server_name="testsvc4", + server_name="pgtestsvc4", ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/RecoverableServersGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/RecoverableServersGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/replicas_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/replicas_list_by_server.py index 212f2b96fd15..d6b340648809 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/replicas_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/replicas_list_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.replicas.list_by_server( - resource_group_name="TestGroup", - server_name="testmaster", + resource_group_name="TestGroup_WestCentralUS", + server_name="testserver-master", ) for item in response: print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ReplicasListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ReplicasListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_create_update.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_create_update.py index b4b59922e3da..1cd20f1bc552 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_create_update.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_create_update.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,14 +24,14 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.server_administrators.begin_create_or_update( resource_group_name="testrg", - server_name="mysqltestsvc4", + server_name="pgtestsvc4", properties={ "properties": { "administratorType": "ActiveDirectory", @@ -44,6 +44,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerAdminCreateUpdate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerAdminCreateUpdate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_delete.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_delete.py index d050ed55c57c..59ee3edd8a66 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_delete.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_delete.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,18 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.server_administrators.begin_delete( resource_group_name="testrg", - server_name="mysqltestsvc4", + server_name="pgtestsvc4", ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerAdminDelete.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerAdminDelete.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_get.py index 334c740d3cab..86f8c77de383 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,18 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.server_administrators.get( resource_group_name="testrg", - server_name="mysqltestsvc4", + server_name="pgtestsvc4", ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerAdminGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerAdminGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_list.py index 84e5438a3ee9..23e93a15ff9b 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_list.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_admin_list.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.server_administrators.list( resource_group_name="testrg", - server_name="mysqltestsvc4", + server_name="pgtestsvc4", ) for item in response: print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerAdminList.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerAdminList.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_put.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_capabilities.py similarity index 74% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_put.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_capabilities.py index d0024fa44409..50c9502e8f58 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/backup_put.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_capabilities.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python backup_put.py + python server_capabilities.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,19 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.backups.put( - resource_group_name="TestGroup", - server_name="mysqltestserver", - backup_name="mybackup", + response = client.server_capabilities.list( + resource_group_name="testrg", + server_name="pgtestsvc4", ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/Backups/preview/2022-09-30-preview/examples/BackupPut.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerCapabilities.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create.py index 828b69ffa687..e0bdc86b98f7 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,30 +24,31 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.begin_create( - resource_group_name="testrg", - server_name="mysqltestsvc4", + resource_group_name="TestGroup", + server_name="pgtestsvc4", parameters={ "location": "westus", "properties": { "administratorLogin": "cloudsa", "administratorLoginPassword": "", "createMode": "Default", + "minimalTlsVersion": "TLS1_2", "sslEnforcement": "Enabled", - "storageProfile": {"backupRetentionDays": 7, "geoRedundantBackup": "Enabled", "storageMB": 128000}, + "storageProfile": {"backupRetentionDays": 7, "geoRedundantBackup": "Disabled", "storageMB": 128000}, }, - "sku": {"capacity": 2, "family": "Gen5", "name": "GP_Gen5_2", "tier": "GeneralPurpose"}, + "sku": {"capacity": 2, "family": "Gen5", "name": "B_Gen5_2", "tier": "Basic"}, "tags": {"ElasticServer": "1"}, }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerCreate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerCreate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_geo_restore_mode.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_geo_restore_mode.py index e910b741df5f..0df1bd90a35e 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_geo_restore_mode.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_geo_restore_mode.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -36,7 +36,7 @@ def main(): "location": "westus", "properties": { "createMode": "GeoRestore", - "sourceServerId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/SourceResourceGroup/providers/Microsoft.DBforMySQL/servers/sourceserver", + "sourceServerId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/SourceResourceGroup/providers/Microsoft.DBforPostgreSQL/servers/sourceserver", }, "sku": {"capacity": 2, "family": "Gen5", "name": "GP_Gen5_2", "tier": "GeneralPurpose"}, "tags": {"ElasticServer": "1"}, @@ -45,6 +45,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerCreateGeoRestoreMode.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerCreateGeoRestoreMode.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_byok.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_geo_restore_with_data_encryption_enabled.py similarity index 54% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_byok.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_geo_restore_with_data_encryption_enabled.py index 12a5b451224b..71249e3a7e5f 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_byok.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_geo_restore_with_data_encryption_enabled.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python server_create_with_byok.py + python server_create_geo_restore_with_data_encryption_enabled.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,46 +24,40 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.begin_create( resource_group_name="testrg", - server_name="mysqltestserver", + server_name="pgtestsvc5geo", parameters={ "identity": { "type": "UserAssigned", "userAssignedIdentities": { - "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-identity": {} + "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-geo-usermanagedidentity": {}, + "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-usermanagedidentity": {}, }, }, - "location": "southeastasia", + "location": "eastus", "properties": { - "administratorLogin": "cloudsa", - "administratorLoginPassword": "your_password", - "availabilityZone": "1", - "backup": {"backupRetentionDays": 7, "geoRedundantBackup": "Disabled"}, - "createMode": "Default", + "createMode": "GeoRestore", "dataEncryption": { - "geoBackupKeyURI": "https://test-geo.vault.azure.net/keys/key/c8a92236622244c0a4fdb892666f671a", - "geoBackupUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-geo-identity", - "primaryKeyURI": "https://test.vault.azure.net/keys/key/c8a92236622244c0a4fdb892666f671a", - "primaryUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-identity", + "geoBackupKeyURI": "https://test-geo-kv.vault.azure.net/keys/test-key1/66f57315bab34b0189daa113fbc78787", + "geoBackupUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-geo-usermanagedidentity", + "primaryKeyURI": "https://test-kv.vault.azure.net/keys/test-key1/77f57315bab34b0189daa113fbc78787", + "primaryUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-usermanagedidentity", "type": "AzureKeyVault", }, - "highAvailability": {"mode": "ZoneRedundant", "standbyAvailabilityZone": "3"}, - "storage": {"autoGrow": "Disabled", "iops": 600, "storageSizeGB": 100}, - "version": "5.7", + "pointInTimeUTC": "2021-06-27T00:04:59.4078005+00:00", + "sourceServerResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.DBforPostgreSQL/flexibleServers/sourcepgservername", }, - "sku": {"name": "Standard_D2ds_v4", "tier": "GeneralPurpose"}, - "tags": {"num": "1"}, }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServerCreateWithBYOK.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerCreateGeoRestoreWithDataEncryptionEnabled.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_point_in_time_restore.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_point_in_time_restore.py index f339f4c941e4..69a0a1528e5e 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_point_in_time_restore.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_point_in_time_restore.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,15 +37,15 @@ def main(): "properties": { "createMode": "PointInTimeRestore", "restorePointInTime": "2017-12-14T00:00:37.467Z", - "sourceServerId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/SourceResourceGroup/providers/Microsoft.DBforMySQL/servers/sourceserver", + "sourceServerId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/SourceResourceGroup/providers/Microsoft.DBforPostgreSQL/servers/sourceserver", }, - "sku": {"capacity": 2, "family": "Gen5", "name": "GP_Gen5_2", "tier": "GeneralPurpose"}, + "sku": {"capacity": 2, "family": "Gen5", "name": "B_Gen5_2", "tier": "Basic"}, "tags": {"ElasticServer": "1"}, }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerCreatePointInTimeRestore.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerCreatePointInTimeRestore.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_replica.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_replica.py index b07d126d3a4b..b5b2edab419f 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_replica.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_replica.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,25 +24,39 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.begin_create( - resource_group_name="testgr", - server_name="replica-server", + resource_group_name="testrg", + server_name="pgtestsvc5rep", parameters={ - "location": "SoutheastAsia", + "identity": { + "type": "UserAssigned", + "userAssignedIdentities": { + "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-usermanagedidentity": {} + }, + }, + "location": "westus", "properties": { "createMode": "Replica", - "sourceServerResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testgr/providers/Microsoft.DBforMySQL/flexibleServers/source-server", + "dataEncryption": { + "geoBackupKeyURI": "", + "geoBackupUserAssignedIdentityId": "", + "primaryKeyURI": "https://test-kv.vault.azure.net/keys/test-key1/77f57315bab34b0189daa113fbc78787", + "primaryUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-usermanagedidentity", + "type": "AzureKeyVault", + }, + "pointInTimeUTC": "2021-06-27T00:04:59.4078005+00:00", + "sourceServerResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.DBforPostgreSQL/flexibleServers/sourcepgservername", }, }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServerCreateReplica.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerCreateReplica.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_replica_mode.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_replica_mode.py index 6eb52442b895..1cf8d6f03057 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_replica_mode.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_replica_mode.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,25 +24,26 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.begin_create( - resource_group_name="TargetResourceGroup", - server_name="targetserver", + resource_group_name="TestGroup_WestCentralUS", + server_name="testserver-replica1", parameters={ - "location": "westus", + "location": "westcentralus", "properties": { "createMode": "Replica", - "sourceServerId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/MasterResourceGroup/providers/Microsoft.DBforMySQL/servers/masterserver", + "sourceServerId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/TestGroup_WestCentralUS/providers/Microsoft.DBforPostgreSQL/servers/testserver-master", }, + "sku": {"capacity": 2, "family": "Gen5", "name": "GP_Gen5_2", "tier": "GeneralPurpose"}, }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerCreateReplicaMode.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerCreateReplicaMode.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_aad_auth_enabled.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_aad_auth_enabled.py new file mode 100644 index 000000000000..7fd7e513a001 --- /dev/null +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_aad_auth_enabled.py @@ -0,0 +1,66 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is regenerated. +# -------------------------------------------------------------------------- + +from azure.identity import DefaultAzureCredential +from azure.mgmt.rdbms import PostgreSQLManagementClient + +""" +# PREREQUISITES + pip install azure-identity + pip install azure-mgmt-rdbms +# USAGE + python server_create_with_aad_auth_enabled.py + + Before run the sample, please set the values of the client ID, tenant ID and client secret + of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, + AZURE_CLIENT_SECRET. For more info about how to get the value, please see: + https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal +""" + + +def main(): + client = PostgreSQLManagementClient( + credential=DefaultAzureCredential(), + subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", + ) + + response = client.servers.begin_create( + resource_group_name="testrg", + server_name="pgtestsvc4", + parameters={ + "location": "westus", + "properties": { + "administratorLogin": "cloudsa", + "administratorLoginPassword": "password", + "authConfig": { + "activeDirectoryAuth": "Enabled", + "passwordAuth": "Enabled", + "tenantId": "tttttt-tttt-tttt-tttt-tttttttttttt", + }, + "availabilityZone": "1", + "backup": {"backupRetentionDays": 7, "geoRedundantBackup": "Disabled"}, + "createMode": "Create", + "dataEncryption": {"type": "SystemManaged"}, + "highAvailability": {"mode": "ZoneRedundant"}, + "network": { + "delegatedSubnetResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/test-vnet-subnet", + "privateDnsZoneArmResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourcegroups/testrg/providers/Microsoft.Network/privateDnsZones/test-private-dns-zone.postgres.database.azure.com", + }, + "storage": {"autoGrow": "Disabled", "iopsTier": "P20", "storageSizeGB": 512}, + "version": "12", + }, + "sku": {"name": "Standard_D4s_v3", "tier": "GeneralPurpose"}, + "tags": {"ElasticServer": "1"}, + }, + ).result() + print(response) + + +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerCreateWithAadAuthEnabled.json +if __name__ == "__main__": + main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_data_encryption_enabled.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_data_encryption_enabled.py new file mode 100644 index 000000000000..140703da823d --- /dev/null +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_data_encryption_enabled.py @@ -0,0 +1,73 @@ +# coding=utf-8 +# -------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# Code generated by Microsoft (R) AutoRest Code Generator. +# Changes may cause incorrect behavior and will be lost if the code is regenerated. +# -------------------------------------------------------------------------- + +from azure.identity import DefaultAzureCredential +from azure.mgmt.rdbms import PostgreSQLManagementClient + +""" +# PREREQUISITES + pip install azure-identity + pip install azure-mgmt-rdbms +# USAGE + python server_create_with_data_encryption_enabled.py + + Before run the sample, please set the values of the client ID, tenant ID and client secret + of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, + AZURE_CLIENT_SECRET. For more info about how to get the value, please see: + https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal +""" + + +def main(): + client = PostgreSQLManagementClient( + credential=DefaultAzureCredential(), + subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", + ) + + response = client.servers.begin_create( + resource_group_name="testrg", + server_name="pgtestsvc4", + parameters={ + "identity": { + "type": "UserAssigned", + "userAssignedIdentities": { + "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-usermanagedidentity": {} + }, + }, + "location": "westus", + "properties": { + "administratorLogin": "cloudsa", + "administratorLoginPassword": "password", + "availabilityZone": "1", + "backup": {"backupRetentionDays": 7, "geoRedundantBackup": "Disabled"}, + "createMode": "Create", + "dataEncryption": { + "geoBackupKeyURI": "", + "geoBackupUserAssignedIdentityId": "", + "primaryKeyURI": "https://test-kv.vault.azure.net/keys/test-key1/77f57315bab34b0189daa113fbc78787", + "primaryUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-usermanagedidentity", + "type": "AzureKeyVault", + }, + "highAvailability": {"mode": "ZoneRedundant"}, + "network": { + "delegatedSubnetResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/test-vnet-subnet", + "privateDnsZoneArmResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourcegroups/testrg/providers/Microsoft.Network/privateDnsZones/test-private-dns-zone.postgres.database.azure.com", + }, + "storage": {"autoGrow": "Disabled", "storageSizeGB": 512}, + "version": "12", + }, + "sku": {"name": "Standard_D4s_v3", "tier": "GeneralPurpose"}, + "tags": {"ElasticServer": "1"}, + }, + ).result() + print(response) + + +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerCreateWithDataEncryptionEnabled.json +if __name__ == "__main__": + main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_delete.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_delete.py index 309e4f2f78aa..ff8135cd93c3 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_delete.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_delete.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -36,6 +36,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerDelete.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerDelete.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_get.py index 95fc8b96cad2..497f58b435fe 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,18 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.get( resource_group_name="testrg", - server_name="mysqltestsvc4", + server_name="pgtestsvc1", ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_get_with_vnet.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_get_with_vnet.py index 1d7224a64a6b..2ac58279a17e 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_get_with_vnet.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_get_with_vnet.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,18 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.get( resource_group_name="testrg", - server_name="mysqltestserver", + server_name="pgtestsvc4", ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServerGetWithVnet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerGetWithVnet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_create_or_update.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_create_or_update.py index 67677f32a360..ddc69f814bea 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_create_or_update.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_create_or_update.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -43,6 +43,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2020-01-01/examples/ServerKeyCreateOrUpdate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2020-01-01/examples/ServerKeyCreateOrUpdate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_delete.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_delete.py index 2cae28a8bd79..95650fdd65aa 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_delete.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_delete.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2020-01-01/examples/ServerKeyDelete.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2020-01-01/examples/ServerKeyDelete.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_get.py index 7f7486e3f867..380f35e37603 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2020-01-01/examples/ServerKeyGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2020-01-01/examples/ServerKeyGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_list.py index e3a56d6dc2b1..284bc739a551 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_list.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_key_list.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2020-01-01/examples/ServerKeyList.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2020-01-01/examples/ServerKeyList.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_list.py index 23f279e1e85a..c720e67e1c27 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_list.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_list.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -34,6 +34,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerList.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerList.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_list_by_resource_group.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_list_by_resource_group.py index 60a8dd79a4a0..f3bb05884d32 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_list_by_resource_group.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_list_by_resource_group.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,18 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.list_by_resource_group( - resource_group_name="testrg", + resource_group_name="TestGroup", ) for item in response: print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerListByResourceGroup.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerListByResourceGroup.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_reset_gtid.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_reset_gtid.py deleted file mode 100644 index 03f75fc423b3..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_reset_gtid.py +++ /dev/null @@ -1,42 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python server_reset_gtid.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.servers.begin_reset_gtid( - resource_group_name="TestGroup", - server_name="testserver", - parameters={"gtidSet": "4aff5b51-97ba-11ed-a955-002248036acc:1-16"}, - ).result() - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServerResetGtid.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_restart.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_restart.py index 7ffad75f5298..77458b850326 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_restart.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_restart.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -36,6 +36,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerRestart.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerRestart.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_failover.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_restart_with_failover.py similarity index 76% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_failover.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_restart_with_failover.py index 01b1724d0a6e..d419db8d9f2a 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_failover.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_restart_with_failover.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python server_failover.py + python server_restart_with_failover.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,18 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.servers.begin_failover( - resource_group_name="TestGroup", + response = client.servers.begin_restart( + resource_group_name="testrg", server_name="testserver", ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServerFailover.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerRestartWithFailover.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_create_max.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_create_max.py index 30993b34e3ed..027f44abad10 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_create_max.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_create_max.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -48,6 +48,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerSecurityAlertsCreateMax.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerSecurityAlertsCreateMax.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_create_min.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_create_min.py index 7079ac24ccb6..de88d9d359b2 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_create_min.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_create_min.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -38,6 +38,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerSecurityAlertsCreateMin.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerSecurityAlertsCreateMin.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_get.py index c1d4de2acc68..e4d55c3cc0fe 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerSecurityAlertsGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerSecurityAlertsGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_list_by_server.py index e84a042d25f3..b27d9d3217d0 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_security_alerts_list_by_server.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="00000000-1111-2222-3333-444444444444", ) @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerSecurityAlertsListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerSecurityAlertsListByServer.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_start.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_start.py index b51d4d6be4e1..844536112602 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_start.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_start.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,18 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.begin_start( - resource_group_name="TestGroup", + resource_group_name="testrg", server_name="testserver", ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2020-01-01/examples/ServerStart.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerStart.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_stop.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_stop.py index 17a5b5b51893..d104bf91b022 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_stop.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_stop.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,18 +24,18 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.begin_stop( - resource_group_name="TestGroup", + resource_group_name="testrg", server_name="testserver", ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2020-01-01/examples/ServerStop.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerStop.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update.py index 0483d72e7836..e2b1ae13a6e2 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,21 +24,25 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.begin_update( resource_group_name="testrg", - server_name="mysqltestsvc4", + server_name="pgtestsvc4", parameters={ - "properties": {"administratorLoginPassword": "", "sslEnforcement": "Disabled"} + "properties": { + "administratorLoginPassword": "", + "minimalTlsVersion": "TLS1_2", + "sslEnforcement": "Enabled", + } }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/ServerUpdate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/ServerUpdate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_point_in_time_restore.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_aad_auth_enabled.py similarity index 56% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_point_in_time_restore.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_aad_auth_enabled.py index 46bd1dc60aa7..8df98ff556d4 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_create_with_point_in_time_restore.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_aad_auth_enabled.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python server_create_with_point_in_time_restore.py + python server_update_with_aad_auth_enabled.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,28 +24,32 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.servers.begin_create( - resource_group_name="TargetResourceGroup", - server_name="targetserver", + response = client.servers.begin_update( + resource_group_name="TestGroup", + server_name="pgtestsvc4", parameters={ - "location": "SoutheastAsia", "properties": { - "createMode": "PointInTimeRestore", - "restorePointInTime": "2021-06-24T00:00:37.467Z", - "sourceServerResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/SourceResourceGroup/providers/Microsoft.DBforMySQL/flexibleServers/sourceserver", + "administratorLoginPassword": "newpassword", + "authConfig": { + "activeDirectoryAuth": "Enabled", + "passwordAuth": "Enabled", + "tenantId": "tttttt-tttt-tttt-tttt-tttttttttttt", + }, + "backup": {"backupRetentionDays": 20}, + "createMode": "Update", + "storage": {"autoGrow": "Disabled", "iopsTier": "P30", "storageSizeGB": 1024}, }, - "sku": {"name": "Standard_D14_v2", "tier": "GeneralPurpose"}, - "tags": {"num": "1"}, + "sku": {"name": "Standard_D8s_v3", "tier": "GeneralPurpose"}, }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServerCreateWithPointInTimeRestore.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerUpdateWithAadAuthEnabled.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_customer_maintenance_window.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_customer_maintenance_window.py index 9450e971122d..2aaf0d9669d6 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_customer_maintenance_window.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_customer_maintenance_window.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,23 +24,24 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.begin_update( resource_group_name="testrg", - server_name="mysqltestserver", + server_name="pgtestsvc4", parameters={ "properties": { - "maintenanceWindow": {"customWindow": "Enabled", "dayOfWeek": 1, "startHour": 8, "startMinute": 0} + "createMode": "Update", + "maintenanceWindow": {"customWindow": "Enabled", "dayOfWeek": 0, "startHour": 8, "startMinute": 0}, } }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServerUpdateWithCustomerMaintenanceWindow.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerUpdateWithCustomerMaintenanceWindow.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_byok.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_data_encryption_enabled.py similarity index 54% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_byok.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_data_encryption_enabled.py index 714d736f1181..07f2a56f95da 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_byok.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_data_encryption_enabled.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python server_update_with_byok.py + python server_update_with_data_encryption_enabled.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,35 +24,40 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) response = client.servers.begin_update( - resource_group_name="testrg", - server_name="mysqltestserver", + resource_group_name="TestGroup", + server_name="pgtestsvc4", parameters={ "identity": { "type": "UserAssigned", "userAssignedIdentities": { - "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-identity": {} + "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-geo-usermanagedidentity": {}, + "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-usermanagedidentity": {}, }, }, "properties": { + "administratorLoginPassword": "newpassword", + "backup": {"backupRetentionDays": 20}, + "createMode": "Update", "dataEncryption": { - "geoBackupKeyURI": "https://test-geo.vault.azure.net/keys/key/c8a92236622244c0a4fdb892666f671a", - "geoBackupUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-geo-identity", - "primaryKeyURI": "https://test.vault.azure.net/keys/key/c8a92236622244c0a4fdb892666f671a", - "primaryUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-identity", + "geoBackupKeyURI": "https://test-geo-kv.vault.azure.net/keys/test-key1/66f57315bab34b0189daa113fbc78787", + "geoBackupUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-geo-usermanagedidentity", + "primaryKeyURI": "https://test-kv.vault.azure.net/keys/test-key1/77f57315bab34b0189daa113fbc78787", + "primaryUserAssignedIdentityId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-usermanagedidentity", "type": "AzureKeyVault", - } + }, }, + "sku": {"name": "Standard_D8s_v3", "tier": "GeneralPurpose"}, }, ).result() print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServerUpdateWithBYOK.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerUpdateWithDataEncryptionEnabled.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrators_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_major_version_upgrade.py similarity index 69% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrators_list_by_server.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_major_version_upgrade.py index 91cba30ca17b..8b3dfa3efd77 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/azure_ad_administrators_list_by_server.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_update_with_major_version_upgrade.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python azure_ad_administrators_list_by_server.py + python server_update_with_major_version_upgrade.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,19 +24,19 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.azure_ad_administrators.list_by_server( + response = client.servers.begin_update( resource_group_name="testrg", - server_name="mysqltestsvc4", - ) - for item in response: - print(item) + server_name="pgtestsvc4", + parameters={"properties": {"createMode": "Update", "version": "14"}}, + ).result() + print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/AAD/preview/2021-12-01-preview/examples/AzureADAdministratorsListByServer.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/ServerUpdateWithMajorVersionUpgrade.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_upgrade.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_upgrade.py deleted file mode 100644 index 13a03f9aa2ef..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/server_upgrade.py +++ /dev/null @@ -1,42 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python server_upgrade.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.servers.begin_upgrade( - resource_group_name="TestGroup", - server_name="testserver", - parameters={"properties": {"targetServerVersion": "5.7"}}, - ).result() - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2020-01-01/examples/ServerUpgrade.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/servers_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/servers_list.py deleted file mode 100644 index 5e38428a0502..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/servers_list.py +++ /dev/null @@ -1,39 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python servers_list.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.servers.list() - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServersList.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/servers_list_by_resource_group.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/servers_list_by_resource_group.py deleted file mode 100644 index 2c0ea1869acd..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/servers_list_by_resource_group.py +++ /dev/null @@ -1,41 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python servers_list_by_resource_group.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.servers.list_by_resource_group( - resource_group_name="TestGroup", - ) - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/FlexibleServers/preview/2022-09-30-preview/examples/ServersListByResourceGroup.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/top_query_statistics_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/top_query_statistics_get.py deleted file mode 100644 index dd292150b4e9..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/top_query_statistics_get.py +++ /dev/null @@ -1,42 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python top_query_statistics_get.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.top_query_statistics.get( - resource_group_name="testResourceGroupName", - server_name="testServerName", - query_statistic_id="66-636923268000000000-636923277000000000-avg-duration", - ) - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/TopQueryStatisticsGet.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/top_query_statistics_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/top_query_statistics_list_by_server.py deleted file mode 100644 index fd05f88012fc..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/top_query_statistics_list_by_server.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python top_query_statistics_list_by_server.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.top_query_statistics.list_by_server( - resource_group_name="testResourceGroupName", - server_name="testServerName", - parameters={ - "properties": { - "aggregationFunction": "avg", - "aggregationWindow": "PT15M", - "numberOfTopQueries": 5, - "observationEndTime": "2019-05-07T20:00:00.000Z", - "observationStartTime": "2019-05-01T20:00:00.000Z", - "observedMetric": "duration", - } - }, - ) - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/TopQueryStatisticsListByServer.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_create_or_update.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_create_or_update.py index 353def888dbe..99c3f4581e7c 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_create_or_update.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_create_or_update.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -43,6 +43,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/VirtualNetworkRulesCreateOrUpdate.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/VirtualNetworkRulesCreateOrUpdate.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_delete.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_delete.py index 073417235d47..69bf59f6c31a 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_delete.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_delete.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/VirtualNetworkRulesDelete.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/VirtualNetworkRulesDelete.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_get.py index 909c69b55d15..aa0c97dd1d3b 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_get.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_get.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/VirtualNetworkRulesGet.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/VirtualNetworkRulesGet.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_list.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_list.py index 5f9056166604..6f15fd3465af 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_list.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_rules_list.py @@ -7,7 +7,7 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES @@ -24,7 +24,7 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2017-12-01/examples/VirtualNetworkRulesList.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/stable/2017-12-01/examples/VirtualNetworkRulesList.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_virtual_network_subnet_usage.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_subnet_usage.py similarity index 67% rename from sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_virtual_network_subnet_usage.py rename to sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_subnet_usage.py index cf9a19680364..e98b25f91552 100644 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/check_virtual_network_subnet_usage.py +++ b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/virtual_network_subnet_usage.py @@ -7,14 +7,14 @@ # -------------------------------------------------------------------------- from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient +from azure.mgmt.rdbms import PostgreSQLManagementClient """ # PREREQUISITES pip install azure-identity pip install azure-mgmt-rdbms # USAGE - python check_virtual_network_subnet_usage.py + python virtual_network_subnet_usage.py Before run the sample, please set the values of the client ID, tenant ID and client secret of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, @@ -24,20 +24,20 @@ def main(): - client = MySQLManagementClient( + client = PostgreSQLManagementClient( credential=DefaultAzureCredential(), subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", ) - response = client.check_virtual_network_subnet_usage.execute( - location_name="WestUS", + response = client.virtual_network_subnet_usage.execute( + location_name="westus", parameters={ - "virtualNetworkResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.Network/virtualNetworks/testvnet" + "virtualNetworkArmResourceId": "/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.Network/virtualNetworks/testvnet" }, ) print(response) -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/ServiceOperations/preview/2021-12-01-preview/examples/CheckVirtualNetworkSubnetUsage.json +# x-ms-original-file: specification/postgresql/resource-manager/Microsoft.DBforPostgreSQL/preview/2023-03-01-preview/examples/VirtualNetworkSubnetUsage.json if __name__ == "__main__": main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/wait_statistics_get.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/wait_statistics_get.py deleted file mode 100644 index 22de0e73e781..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/wait_statistics_get.py +++ /dev/null @@ -1,42 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python wait_statistics_get.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.wait_statistics.get( - resource_group_name="testResourceGroupName", - server_name="testServerName", - wait_statistics_id="636927606000000000-636927615000000000-send-wait/io/socket/sql/client_connection-2--0", - ) - print(response) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/WaitStatisticsGet.json -if __name__ == "__main__": - main() diff --git a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/wait_statistics_list_by_server.py b/sdk/rdbms/azure-mgmt-rdbms/generated_samples/wait_statistics_list_by_server.py deleted file mode 100644 index 3b36c20e2ef8..000000000000 --- a/sdk/rdbms/azure-mgmt-rdbms/generated_samples/wait_statistics_list_by_server.py +++ /dev/null @@ -1,49 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for license information. -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is regenerated. -# -------------------------------------------------------------------------- - -from azure.identity import DefaultAzureCredential -from azure.mgmt.rdbms import MySQLManagementClient - -""" -# PREREQUISITES - pip install azure-identity - pip install azure-mgmt-rdbms -# USAGE - python wait_statistics_list_by_server.py - - Before run the sample, please set the values of the client ID, tenant ID and client secret - of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID, - AZURE_CLIENT_SECRET. For more info about how to get the value, please see: - https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal -""" - - -def main(): - client = MySQLManagementClient( - credential=DefaultAzureCredential(), - subscription_id="ffffffff-ffff-ffff-ffff-ffffffffffff", - ) - - response = client.wait_statistics.list_by_server( - resource_group_name="testResourceGroupName", - server_name="testServerName", - parameters={ - "properties": { - "aggregationWindow": "PT15M", - "observationEndTime": "2019-05-07T20:00:00.000Z", - "observationStartTime": "2019-05-01T20:00:00.000Z", - } - }, - ) - for item in response: - print(item) - - -# x-ms-original-file: specification/mysql/resource-manager/Microsoft.DBforMySQL/legacy/stable/2018-06-01/examples/WaitStatisticsListByServer.json -if __name__ == "__main__": - main()