Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Hub Generated] Review request for Microsoft.Authorization to add version stable/2020-09-01 #11391

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
351f5ae
Adds base for updating Microsoft.Authorization from version stable/20…
feruilob Oct 26, 2020
33f9efd
Updates readme
feruilob Oct 26, 2020
9c15c87
Updates API version in new specs and examples
feruilob Oct 26, 2020
b01d257
Adding Swagger spec for DataPolicyManifests
feruilob Oct 26, 2020
59d842b
Bring back files from previous version for validation
feruilob Oct 26, 2020
daa5282
Revert order in which definitions appear in swagger spec for DataPoli…
feruilob Oct 26, 2020
83f3ca9
Fixing array of class
feruilob Oct 26, 2020
e83da9f
Fix identation and version
feruilob Oct 26, 2020
80aa069
Fix properties in example and bad title
feruilob Oct 26, 2020
2128d20
Remove description from items
feruilob Oct 26, 2020
e716034
Fix bug in array of DataManifestCustomResourceFunctionDefinition
feruilob Oct 26, 2020
2ecb7db
Fixing invalid namespaces type
feruilob Oct 26, 2020
d04a28d
Fixed bug in array for alias paths
feruilob Oct 26, 2020
c2d4f77
Add dataPolicyManifest to readme
feruilob Oct 27, 2020
59fe703
Adding data policy manifests operation endpoint
feruilob Oct 27, 2020
7a4a809
Revert "Adding data policy manifests operation endpoint"
feruilob Oct 27, 2020
9907164
Adds suppression to readme
feruilob Oct 27, 2020
c84bd5b
Merge branch 'dev-resources-Microsoft.Authorization-2020-09-01' of ht…
feruilob Oct 27, 2020
dd20556
Remove files from previous versions
feruilob Oct 27, 2020
81be5d0
Adds suppression to readme
feruilob Oct 27, 2020
ab64e18
Adds suppression to readme
feruilob Oct 27, 2020
cf53b38
Add sample response for getting data policy manifests with namespace …
feruilob Oct 27, 2020
8e4937e
Removing paging and adding 404 response
feruilob Oct 27, 2020
590c2bc
Fixing resource types and namespaces
feruilob Oct 27, 2020
ef71503
Merge branch 'dev-resources-Microsoft.Authorization-2020-09-01' of ht…
feruilob Oct 27, 2020
5547fe9
Addressing comments in PR
feruilob Oct 27, 2020
f92cab8
Adding 404 response code to example
feruilob Oct 27, 2020
91bcf48
Removing schema from 404 response (couldn't find any similar example)
feruilob Oct 27, 2020
406c949
Adds suppression to readme
feruilob Oct 28, 2020
8f3d91d
Fix comma typo
feruilob Oct 28, 2020
0cdd841
Merge branch 'dev-resources-Microsoft.Authorization-2020-09-01' of ht…
feruilob Oct 28, 2020
b474728
Adds suppression to readme
feruilob Oct 28, 2020
90721dc
Committing changes done by prettier
feruilob Oct 28, 2020
cda29c3
Merge branch 'dev-resources-Microsoft.Authorization-2020-09-01' of ht…
feruilob Oct 28, 2020
f66f8c0
Change effect for audit effect
feruilob Oct 28, 2020
c85ab29
Readding x-ms-pageable
feruilob Oct 29, 2020
bdbf496
Removing 404 response
feruilob Oct 29, 2020
015e3c7
Put nextLink in the correct place in the definition
feruilob Oct 29, 2020
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,307 @@
{
"swagger": "2.0",
"info": {
"title": "PolicyClient",
"version": "2020-09-01",
"description": "To manage and control access to your resources, you can define customized policies and assign them at a scope."
},
"host": "management.azure.com",
"schemes": [
"https"
],
"consumes": [
"application/json"
],
"produces": [
"application/json"
],
"security": [
{
"azure_auth": [
"user_impersonation"
]
}
],
"securityDefinitions": {
"azure_auth": {
feruilob marked this conversation as resolved.
Show resolved Hide resolved
"type": "oauth2",
"authorizationUrl": "https://login.microsoftonline.com/common/oauth2/authorize",
"flow": "implicit",
"description": "Azure Active Directory OAuth2 Flow",
"scopes": {
"user_impersonation": "impersonate your user account"
}
}
},
"paths": {
"/providers/Microsoft.Authorization/dataPolicyManifests/{policyMode}": {
"get": {
"tags": [
"DataPolicyManifests"
],
"operationId": "DataPolicyManifests_GetByPolicyMode",
"summary": "Retrieves a data policy manifest.",
"description": "This operation retrieves the data policy manifest with the given policy mode.",
"x-ms-examples": {
"Retrieve a data policy manifest by policy mode": {
"$ref": "./examples/getDataPolicyManifest.json"
}
},
"parameters": [
{
"name": "policyMode",
"in": "path",
"required": true,
"type": "string",
"description": "The policy mode of the data policy manifest to get."
},
{
"$ref": "#/parameters/ApiVersionParameter"
}
],
"responses": {
"200": {
"description": "OK - Returns information about a data policy manifest.",
"schema": {
"$ref": "#/definitions/DataPolicyManifest"
}
},
feruilob marked this conversation as resolved.
Show resolved Hide resolved
"default": {
"description": "Error response describing why the operation failed.",
"schema": {
"$ref": "#/definitions/CloudError"
}
}
}
}
},
"/providers/Microsoft.Authorization/dataPolicyManifests": {
feruilob marked this conversation as resolved.
Show resolved Hide resolved
"get": {
"tags": [
"DataPolicyManifests"
],
"operationId": "DataPolicyManifests_List",
"summary": "Retrieves data policy manifests",
"description": "This operation retrieves a list of all the data policy manifests that match the optional given $filter. Valid values for $filter are: \"$filter=namespace eq '{0}'\". If $filter is not provided, the unfiltered list includes all data policy manifests for data resource types. If $filter=namespace is provided, the returned list only includes all data policy manifests that have a namespace matching the provided value.",
"x-ms-examples": {
"List data policy manifests": {
"$ref": "./examples/listDataPolicyManifests.json"
},
"List data policy manifests with namespace filter": {
"$ref": "./examples/listDataPolicyManifestsNamespaceFilter.json"
}
feruilob marked this conversation as resolved.
Show resolved Hide resolved
},
"parameters": [
{
"$ref": "#/parameters/ApiVersionParameter"
},
{
"$ref": "#/parameters/DataPolicyManifestsFilterParameter"
}
],
"responses": {
"200": {
"description": "OK - Returns an array of data policy manifests.",
"schema": {
"$ref": "#/definitions/DataPolicyManifestListResult"
}
},
"default": {
"description": "Error response describing why the operation failed.",
"schema": {
"$ref": "#/definitions/CloudError"
}
}
},
"x-ms-pageable": {
feruilob marked this conversation as resolved.
Show resolved Hide resolved
"nextLinkName": "nextLink"
}
}
}
},
"definitions": {
"CloudError": {
"x-ms-external": true,
"$ref": "../../../../../common-types/resource-management/v2/types.json#/definitions/ErrorResponse",
"description": "An error response from a policy operation."
},
"DataManifestCustomResourceFunctionDefinition": {
"properties": {
"name": {
"type": "string",
"description": "The function name as it will appear in the policy rule. eg - 'vault'."
},
"fullyQualifiedResourceType": {
"type": "string",
"description": "The fully qualified control plane resource type that this function represents. eg - 'Microsoft.KeyVault/vaults'."
},
"defaultProperties": {
"type": "array",
"items": {
"type": "string"
},
"description": "The top-level properties that can be selected on the function's output. eg - [ \"name\", \"location\" ] if vault().name and vault().location are supported"
},
"allowCustomProperties": {
"type": "boolean",
"description": "A value indicating whether the custom properties within the property bag are allowed. Needs api-version to be specified in the policy rule eg - vault('2019-06-01')."
}
},
"description": "The custom resource function definition."
},
"DataManifestResourceFunctionsDefinition": {
"properties": {
"standard": {
"type": "array",
"items": {
"type": "string"
},
"description": "The standard resource functions (subscription and/or resourceGroup)."
},
"custom": {
"type": "array",
"items": {
"$ref": "#/definitions/DataManifestCustomResourceFunctionDefinition"
},
"description": "An array of data manifest custom resource definition."
}
},
"description": "The resource functions supported by a manifest"
},
"DataEffect": {
"properties": {
"name": {
"type": "string",
"description": "The data effect name."
},
"detailsSchema": {
"type": "object",
"description": "The data effect details schema."
}
},
"description": "The data effect definition."
},
"ResourceTypeAliases": {
"properties": {
"resourceType": {
"type": "string",
"description": "The resource type name."
},
"aliases": {
"type": "array",
"items": {
"$ref": "../../../Microsoft.Resources/stable/2020-06-01/resources.json#/definitions/Alias"
},
"description": "The aliases for property names."
}
},
"description": "The resource type aliases definition."
},
"DataPolicyManifestProperties": {
"properties": {
"namespaces": {
"type": "array",
"items": {
"type": "string"
},
"description": "The list of namespaces for the data policy manifest."
},
"policyMode": {
"type": "string",
"description": "The policy mode of the data policy manifest."
},
"isBuiltInOnly": {
"type": "boolean",
"description": "A value indicating whether policy mode is allowed only in built-in definitions."
},
"resourceTypeAliases": {
"type": "array",
"items": {
"$ref": "#/definitions/ResourceTypeAliases"
},
"description": "An array of resource type aliases."
},
"effects": {
"type": "array",
"items": {
"$ref": "#/definitions/DataEffect"
},
"description": "The effect definition."
},
"fieldValues": {
"type": "array",
"items": {
"type": "string"
},
"description": "The non-alias field accessor values that can be used in the policy rule."
},
"resourceFunctions": {
"x-ms-client-flatten": true,
"$ref": "#/definitions/DataManifestResourceFunctionsDefinition",
"description": "The resource functions definition specified in the data manifest."
}
},
"description": "The properties of the data policy manifest."
},
"DataPolicyManifest": {
"properties": {
"properties": {
"x-ms-client-flatten": true,
"$ref": "#/definitions/DataPolicyManifestProperties",
"description": "The data policy manifest properties."
},
"id": {
"readOnly": true,
"type": "string",
"description": "The ID of the data policy manifest."
},
"name": {
"readOnly": true,
"type": "string",
"description": "The name of the data policy manifest (it's the same as the Policy Mode)."
},
"type": {
"readOnly": true,
"type": "string",
"description": "The type of the resource (Microsoft.Authorization/dataPolicyManifests)."
}
},
"description": "The data policy manifest.",
"x-ms-azure-resource": true
},
"DataPolicyManifestListResult": {
"properties": {
"value": {
"type": "array",
"items": {
"$ref": "#/definitions/DataPolicyManifest"
},
"description": "An array of data policy manifests."
},
"nextLink": {
"type": "string",
"description": "The URL to use for getting the next set of results."
}
},
"description": "List of data policy manifests."
}
},
"parameters": {
"ApiVersionParameter": {
"name": "api-version",
"in": "query",
"required": true,
"type": "string",
"description": "The API version to use for the operation."
},
"DataPolicyManifestsFilterParameter": {
"name": "$filter",
"in": "query",
"required": false,
"type": "string",
"description": "The filter to apply on the operation. Valid values for $filter are: \"namespace eq '{value}'\". If $filter is not provided, no filtering is performed. If $filter=namespace eq '{value}' is provided, the returned list only includes all data policy manifests that have a namespace matching the provided value.",
"x-ms-skip-url-encoding": true,
"x-ms-parameter-location": "method"
}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,69 @@
{
"parameters": {
"api-version": "2020-09-01",
"policyMode": "Microsoft.KeyVault.Data"
},
"responses": {
"200": {
"headers": {},
"body": {
"id": "/providers/Microsoft.Authorization/dataPolicyManifests/Microsoft.KeyVault.Data",
"type": "Microsoft.Authorization/dataPolicyManifests",
"name": "Microsoft.KeyVault.Data",
"properties": {
"namespaces": [
"Microsoft.KeyVault"
],
"policyMode": "Microsoft.KeyVault.Data",
"isBuiltInOnly": true,
"resourceTypeAliases": [
{
"resourceType": "vaults/certificates",
"aliases": [
{
"name": "Microsoft.KeyVault.Data/vaults/certificates/keyProperties.keyType",
"paths": [
{
feruilob marked this conversation as resolved.
Show resolved Hide resolved
"path": "keyProperties.keyType",
"apiVersions": [
"2019-01-01"
]
}
]
}
]
}
],
"effects": [
{
"name": "Audit"
},
{
"name": "Deny"
}
],
"fieldValues": [
"type"
],
"resourceFunctions": {
"standard": [
"subscription",
"resourceGroup"
],
"custom": [
{
"name": "vault",
"fullyQualifiedResourceType": "Microsoft.KeyVault/vaults",
"defaultProperties": [
"location",
"tags"
],
"allowCustomProperties": false
}
]
}
}
}
}
}
}
Loading