diff --git a/specification/batch/Azure.Batch/examples/2025-06-01/Pools_CreatePool_ConfidentialDiskEncryptionSet_ForUserSubscriptionAccounts.json b/specification/batch/Azure.Batch/examples/2025-06-01/Pools_CreatePool_ConfidentialDiskEncryptionSet_ForUserSubscriptionAccounts.json index 786fe09ae70c..c7290276a3aa 100644 --- a/specification/batch/Azure.Batch/examples/2025-06-01/Pools_CreatePool_ConfidentialDiskEncryptionSet_ForUserSubscriptionAccounts.json +++ b/specification/batch/Azure.Batch/examples/2025-06-01/Pools_CreatePool_ConfidentialDiskEncryptionSet_ForUserSubscriptionAccounts.json @@ -40,7 +40,7 @@ } ], "securityProfile": { - "securityType": "confidentialVM", + "securityType": "confidentialvm", "uefiSettings": { "vTpmEnabled": true, "secureBootEnabled": true diff --git a/specification/batch/Azure.Batch/examples/2025-06-01/Pools_GetPool_ConfidentialDiskEncryptionSet.json b/specification/batch/Azure.Batch/examples/2025-06-01/Pools_GetPool_ConfidentialDiskEncryptionSet.json index f70c1550c035..ac470d9717e5 100644 --- a/specification/batch/Azure.Batch/examples/2025-06-01/Pools_GetPool_ConfidentialDiskEncryptionSet.json +++ b/specification/batch/Azure.Batch/examples/2025-06-01/Pools_GetPool_ConfidentialDiskEncryptionSet.json @@ -68,7 +68,7 @@ } ], "securityProfile": { - "securityType": "confidentialVM", + "securityType": "confidentialvm", "uefiSettings": { "secureBootEnabled": true, "vTpmEnabled": true diff --git a/specification/batch/Azure.Batch/models.tsp b/specification/batch/Azure.Batch/models.tsp index 2e1e76e59d22..34d3ced0c33a 100644 --- a/specification/batch/Azure.Batch/models.tsp +++ b/specification/batch/Azure.Batch/models.tsp @@ -134,9 +134,11 @@ union IPFamily { string, @doc("IPv4 is available to the pool.") + @clientName("ipv4", "python") IPv4: "IPv4", @doc("IPv6 is available to the pool.") + @clientName("ipv6", "python") IPv6: "IPv6", } @@ -732,7 +734,7 @@ union SecurityTypes { "trustedLaunch", @doc("Azure confidential computing offers confidential VMs are for tenants with high security and confidentiality requirements. These VMs provide a strong, hardware-enforced boundary to help meet your security needs. You can use confidential VMs for migrations without making changes to your code, with the platform protecting your VM's state from being read or modified.") - "confidentialVM", + confidentialVM: "confidentialvm", } @doc("The result of listing the applications available in an Account.") @@ -3862,7 +3864,7 @@ model BatchNode { @clientName("uri", "csharp") url: url; - @doc("The current state of the Compute Node. The Spot/Low-priority Compute Node has been preempted. Tasks which were running on the Compute Node when it was preempted will be rescheduled when another Compute Node becomes available.") + @doc("The current state of the Compute Node.") @visibility(Lifecycle.Read) state: BatchNodeState; diff --git a/specification/batch/cspell.yaml b/specification/batch/cspell.yaml index 8ca15d49e76a..e67e90b994cb 100644 --- a/specification/batch/cspell.yaml +++ b/specification/batch/cspell.yaml @@ -34,6 +34,7 @@ words: - vtpm - IMDS - imds + - confidentialvm overrides: - filename: '**/specification/batch/Azure.Batch/tspconfig.yaml' words: diff --git a/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/BatchService.json b/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/BatchService.json index 1f5bdc94e868..e99fd5858cfb 100644 --- a/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/BatchService.json +++ b/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/BatchService.json @@ -11434,7 +11434,7 @@ }, "state": { "$ref": "#/definitions/BatchNodeState", - "description": "The current state of the Compute Node. The Spot/Low-priority Compute Node has been preempted. Tasks which were running on the Compute Node when it was preempted will be rescheduled when another Compute Node becomes available.", + "description": "The current state of the Compute Node.", "readOnly": true }, "schedulingState": { @@ -16265,7 +16265,7 @@ "description": "Specifies the SecurityType of the virtual machine. It has to be set to any specified value to enable UefiSettings.", "enum": [ "trustedLaunch", - "confidentialVM" + "confidentialvm" ], "x-ms-enum": { "name": "SecurityTypes", @@ -16278,7 +16278,7 @@ }, { "name": "confidentialVM", - "value": "confidentialVM", + "value": "confidentialvm", "description": "Azure confidential computing offers confidential VMs are for tenants with high security and confidentiality requirements. These VMs provide a strong, hardware-enforced boundary to help meet your security needs. You can use confidential VMs for migrations without making changes to your code, with the platform protecting your VM's state from being read or modified." } ] diff --git a/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/examples/Pools_CreatePool_ConfidentialDiskEncryptionSet_ForUserSubscriptionAccounts.json b/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/examples/Pools_CreatePool_ConfidentialDiskEncryptionSet_ForUserSubscriptionAccounts.json index 786fe09ae70c..c7290276a3aa 100644 --- a/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/examples/Pools_CreatePool_ConfidentialDiskEncryptionSet_ForUserSubscriptionAccounts.json +++ b/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/examples/Pools_CreatePool_ConfidentialDiskEncryptionSet_ForUserSubscriptionAccounts.json @@ -40,7 +40,7 @@ } ], "securityProfile": { - "securityType": "confidentialVM", + "securityType": "confidentialvm", "uefiSettings": { "vTpmEnabled": true, "secureBootEnabled": true diff --git a/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/examples/Pools_GetPool_ConfidentialDiskEncryptionSet.json b/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/examples/Pools_GetPool_ConfidentialDiskEncryptionSet.json index f70c1550c035..ac470d9717e5 100644 --- a/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/examples/Pools_GetPool_ConfidentialDiskEncryptionSet.json +++ b/specification/batch/data-plane/Azure.Batch/stable/2025-06-01/examples/Pools_GetPool_ConfidentialDiskEncryptionSet.json @@ -68,7 +68,7 @@ } ], "securityProfile": { - "securityType": "confidentialVM", + "securityType": "confidentialvm", "uefiSettings": { "secureBootEnabled": true, "vTpmEnabled": true