Skip to content

Commit ca2e197

Browse files
shimonar1171Ahmad Abas
andauthored
Add new Sql VA API (#18804)
* Add new Sql VA API * Update server level API * Update API attributes * Update controlers * Add missing examples * Fix examples * Format JSON file * Update examples * Updae scan record API * Add ref to README file * Update version * Update enums * Add SystemData * add systemData * sort readme files * Update examples * Update remove baseline API * Add 204 respond to delete API * Add 204 error * Fixed error * Update description * Update swagger * fix PR comments, seperated baseline operations to /baselines/default/rules/ruleid * fix validations errors Co-authored-by: Ahmad Abas <[email protected]>
1 parent c432a92 commit ca2e197

File tree

45 files changed

+5874
-1
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+5874
-1
lines changed

specification/sql/resource-manager/Microsoft.Sql/preview/2022-02-01-preview/DatabaseSqlVulnerabilityAssessmentBaselines.json

Lines changed: 371 additions & 0 deletions
Large diffs are not rendered by default.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
{
2+
"swagger": "2.0",
3+
"info": {
4+
"version": "2022-02-01-preview",
5+
"title": "SqlManagementClient",
6+
"description": "The Azure SQL Database management API provides a RESTful set of web APIs that interact with Azure SQL Database services to manage your databases. The API enables users to create, retrieve, update, and delete databases, servers, and other entities."
7+
},
8+
"host": "management.azure.com",
9+
"schemes": [
10+
"https"
11+
],
12+
"consumes": [
13+
"application/json"
14+
],
15+
"produces": [
16+
"application/json"
17+
],
18+
"paths": {
19+
"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}/sqlVulnerabilityAssessments/{vulnerabilityAssessmentName}/initiateScan": {
20+
"post": {
21+
"tags": [
22+
"DatabaseSqlVulnerabilityAssessmentExecuteScan"
23+
],
24+
"description": "Executes a Vulnerability Assessment database scan.",
25+
"operationId": "DatabaseSqlVulnerabilityAssessmentExecuteScan_Execute",
26+
"parameters": [
27+
{
28+
"$ref": "../../../common/v1/types.json#/parameters/ResourceGroupParameter"
29+
},
30+
{
31+
"$ref": "#/parameters/ServerNameParameter"
32+
},
33+
{
34+
"$ref": "#/parameters/DatabaseNameParameter"
35+
},
36+
{
37+
"name": "vulnerabilityAssessmentName",
38+
"in": "path",
39+
"description": "The name of the vulnerability assessment.",
40+
"required": true,
41+
"type": "string",
42+
"enum": [
43+
"default"
44+
],
45+
"x-ms-enum": {
46+
"name": "VulnerabilityAssessmentName",
47+
"modelAsString": true
48+
}
49+
},
50+
{
51+
"$ref": "../../../common/v1/types.json#/parameters/SubscriptionIdParameter"
52+
},
53+
{
54+
"$ref": "../../../common/v1/types.json#/parameters/ApiVersionParameter"
55+
}
56+
],
57+
"responses": {
58+
"200": {
59+
"description": "Successfully executed a Vulnerability Assessment database scan."
60+
},
61+
"default": {
62+
"description": "*** Error Responses: ***\n\n * 400 SqlVulnerabilityAssessmentIsDisabled - SQL vulnerability assessment feature is disabled. please enable the feature before executing other SQL vulnerability assessment operations.\n\n * 400 InvalidVulnerabilityAssessmentOperationRequest - The vulnerability assessment operation request does not exist or has no properties object.\n\n * 400 DataSecurityInvalidUserSuppliedParameter - An invalid parameter value was provided by the client.\n\n * 404 SubscriptionDoesNotHaveServer - The requested server was not found\n\n * 404 SourceDatabaseNotFound - The source database does not exist.\n\n * 404 DatabaseDoesNotExist - User has specified a database name that does not exist on this server instance.\n\n * 409 DatabaseVulnerabilityAssessmentScanIsAlreadyInProgress - SQL Vulnerability Assessment scan is already in progress\n\n * 500 DatabaseIsUnavailable - Loading failed. Please try again later."
63+
},
64+
"202": {
65+
"description": "Successfully started a Vulnerability Assessment database scan."
66+
}
67+
},
68+
"x-ms-long-running-operation": true,
69+
"x-ms-examples": {
70+
"Executes a database's vulnerability assessment scan.": {
71+
"$ref": "./examples/DatabaseSqlVulnerabilityAssessmentScansExecute.json"
72+
}
73+
}
74+
}
75+
}
76+
},
77+
"definitions": {},
78+
"parameters": {
79+
"DatabaseNameParameter": {
80+
"name": "databaseName",
81+
"in": "path",
82+
"description": "The name of the database.",
83+
"required": true,
84+
"type": "string",
85+
"x-ms-parameter-location": "method"
86+
},
87+
"ServerNameParameter": {
88+
"name": "serverName",
89+
"in": "path",
90+
"description": "The name of the server.",
91+
"required": true,
92+
"type": "string",
93+
"x-ms-parameter-location": "method"
94+
}
95+
},
96+
"securityDefinitions": {
97+
"azure_auth": {
98+
"type": "oauth2",
99+
"description": "Azure Active Directory OAuth2 Flow",
100+
"flow": "implicit",
101+
"authorizationUrl": "https://login.microsoftonline.com/common/oauth2/authorize",
102+
"scopes": {
103+
"user_impersonation": "impersonate your user account"
104+
}
105+
}
106+
}
107+
}

specification/sql/resource-manager/Microsoft.Sql/preview/2022-02-01-preview/DatabaseSqlVulnerabilityAssessmentRuleBaselines.json

Lines changed: 460 additions & 0 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)