-
Notifications
You must be signed in to change notification settings - Fork 5.6k
[NetAppFiles] Update to 2025-09-01 #38406
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[NetAppFiles] Update to 2025-09-01 #38406
Conversation
Next Steps to Merge✅ All automated merging requirements have been met! To get your PR merged, see aka.ms/azsdk/specreview/merge.Comment generated by summarize-checks workflow run. |
API Change CheckAPIView identified API level changes in this PR and created the following API reviews
|
|
Please fix Swagger LintDiff , Swagger PrettierCheck and TypeSpec Validation / TypeSpec Validation (pull_request) On it, thanks. |
e069dac to
099c8f0
Compare
|
Check error from TypeSpec Validation / TypeSpec Validation (pull_request) |
| */ | ||
| Succeeded: "Succeeded", | ||
| } | ||
|
|
||
| // /** |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: is the commented out section needed or it can be removed?
| * The 2025-09-01-preview API version. | ||
| */ | ||
| @previewVersion | ||
| v2025_09_01_preview: "2025-09-01-preview", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why are you adding two versions?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We are relesing stable and preview at the same time, with minimal changes in stable and new public preview features in preview.
Thought it would save time to do both in one PR.
If needed can create new pr for stable lt me know
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@raych1 , for this case, is it possible to let SDK automation to run twice on each of the added api version?
So we could better detect the SDK generation & breaking change related issues for this PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@lirenhe: Would it be easier to instead enforce "only add one API version per PR"? My understanding, this was always the recommendation, it just wasn't enforced. Otherwise, we'd need to look at every PR check, and make sure it can handle multiple new API versions in a single PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
With the new proposal of supporting preview version in TypeSpec, adding stable along with a new preview will be a common scenario. I don't know if @markcowl has discussed with you about the tooling support for new preview guide?
| ...ResourceNameParameter< | ||
| Resource = RansomwareReport, | ||
| KeyName = "ransomwareReportName", | ||
| SegmentName = "ransomwarereports", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
shouldn be ransomwareReports to be camel case
| * Suspect File extension | ||
| */ | ||
| @visibility(Lifecycle.Read) | ||
| extension?: string; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
will the suspectFiles array contain only files with this extension? cant be a mixed list? #Resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It returns a list of suspect extensions, each suspect has a separate list of files.
| /** | ||
| * The resource ID of private endpoint for KeyVault. It must reside in the same VNET as the volume. Only applicable if encryptionKeySource = 'Microsoft.KeyVault'. | ||
| */ | ||
| keyVaultPrivateEndpointResourceId?: string; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
cant this be also an armResourceIdentifier?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes, updating
| * The mount target's IPv4 address, used to mount the cache. | ||
| */ | ||
| @visibility(Lifecycle.Read) | ||
| ipAddress?: string; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if it is only ipv4 the you could use the ipv4 scalar
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated
| userName?: string; | ||
|
|
||
| /** An array of DNS server IP addresses(IPv4 only) for the Active Directory */ | ||
| dns?: string[]; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
you could use ipv4 scalar
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated
| /** Identity used to authenticate with key vault. */ | ||
| @added(Versions.v2025_09_01_preview) | ||
| model SecretPasswordIdentity { | ||
| /** The principal ID (object ID) of the identity used to authenticate with key vault. Read-only. */ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i see this is used also for patch so is this field read-only as described? or add @visibility(Lifecycle.Read)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Patchmodel was to avoid requred fields in patch request, that is not needed for SecretPasswordIdentity since there is no requred filed in that model.
| principalId?: string; | ||
|
|
||
| /** The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities. */ | ||
| userAssignedIdentity?: Azure.Core.armResourceIdentifier<[ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
in other places you set it like a string, can you update also to be like this? or use the definition from common-types
…into release-Microsoft.NetApp-2025-09-01
…into release-Microsoft.NetApp-2025-09-01
|
After sync with main we now get an lintDiff issue with an old api-verison |
…into release-Microsoft.NetApp-2025-09-01
* Update to 2025-09-01 * VolumeQuotaRulesProperties provisioningState * VolumeQuotaRulesProperties provisioningState * Pretty, elastic snapshotpolicy fix * elastic volum patch fix * example * volume fix * lindiff fixes * format * principal string * ElasticSnapshotPolicies_ListVolumes * ElasticSnapshotPolicies_ListVolumes * ElasticSnapshotPolicies_ListVolumes * format * example filepath * client rename * client rename * review comments * review comments * rebase refactor folder structure * readme * readme * format * patch fixes * patch properties * read-create * remove max min on list * rename service folder * Revert "rename service folder" This reverts commit 45ca15f. * rename service folder * Revert "rename service folder" This reverts commit b2e2352. * Fixes * Fixes 2 * Fixes 3 * Fixes 4 * Fixes 5 * tsv fix * TSP fix * clean temp file * example * example * TSP fix * TSP fix * TSP fix * TSP fix * name --------- Co-authored-by: Daniel Jurek <djurek@microsoft.com> Co-authored-by: Mike Harder <mharder@microsoft.com>
|
@markcowl @mikeharder This is an example of service adding stable and preview at the same time. With current SDK automation logic, we could only generate SDK with the latest preview version, so the SDK breaking changes could not be detected (preview version could accept breaking changes, so no label is added). Do we have plan to update the tool? cc: @lirenhe |
@tadelesh: Is the problem having a stable and preview with the same date ( The former could be detected by tool The latter would need to be detected by tool For either tool, you can open an issue in the corresponding repo. If you'd like the issue fixed with priority, you can also open a PR adding the feature. |
ARM (Control Plane) API Specification Update Pull Request
Tip
Overwhelmed by all this guidance? See the
Getting helpsection at the bottom of this PR description.PR review workflow diagram
Please understand this diagram before proceeding. It explains how to get your PR approved & merged.
Purpose of this PR
What's the purpose of this PR? Check the specific option that applies. This is mandatory!
Due diligence checklist
To merge this PR, you must go through the following checklist and confirm you understood
and followed the instructions by checking all the boxes:
ARM resource provider contract and
REST guidelines (estimated time: 4 hours).
I understand this is required before I can proceed to the diagram Step 2, "ARM API changes review", for this PR.
Additional information
Viewing API changes
For convenient view of the API changes made by this PR, refer to the URLs provided in the table
in the
Generated ApiViewcomment added to this PR. You can use ApiView to show API versions diff.Suppressing failures
If one or multiple validation error/warning suppression(s) is detected in your PR, please follow the
suppressions guide to get approval.
Getting help
Purpose of this PRandDue diligence checklist.write accessper aka.ms/azsdk/access#request-access-to-rest-api-or-sdk-repositoriesNext Steps to Mergecomment. It will appear within few minutes of submitting this PR and will continue to be up-to-date with current PR state.and https://aka.ms/ci-fix.
queuedstate, please add a comment with contents/azp run.This should result in a new comment denoting a
PR validation pipelinehas started and the checks should be updated after few minutes.