Skip to content

Commit c8e87e9

Browse files
author
SDKAuto
committed
CodeGen from PR 18459 in Azure/azure-rest-api-specs
Merge 01575f1a9430751c5318295e9f00d5fe4c655dad into b6a78456cab458910378135995f1d019765ccec3
1 parent ccae39e commit c8e87e9

File tree

340 files changed

+36467
-19811
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

340 files changed

+36467
-19811
lines changed
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
2-
"autorest": "3.4.5",
2+
"autorest": "3.7.2",
33
"use": [
4-
"@autorest/python@5.8.4",
5-
"@autorest/[email protected].2"
4+
"@autorest/python@5.12.0",
5+
"@autorest/[email protected].3"
66
],
7-
"commit": "ac1c84fa8c897975b88a38a66dd64d54312a1422",
7+
"commit": "fc0d3c9fea51016d05952fa655eaf6ed90c0324e",
88
"repository_url": "https://github.com/Azure/azure-rest-api-specs",
9-
"autorest_command": "autorest specification/authorization/resource-manager/readme.md --multiapi --python --python-mode=update --python-sdks-folder=/home/vsts/work/1/s/azure-sdk-for-python/sdk --track2 --use=@autorest/python@5.8.4 --use=@autorest/[email protected].2 --version=3.4.5",
9+
"autorest_command": "autorest specification/authorization/resource-manager/readme.md --multiapi --python --python-sdks-folder=/mnt/vss/_work/1/s/azure-sdk-for-python/sdk --python3-only --use=@autorest/python@5.12.0 --use=@autorest/[email protected].3 --version=3.7.2",
1010
"readme": "specification/authorization/resource-manager/readme.md"
1111
}

sdk/authorization/azure-mgmt-authorization/azure/mgmt/authorization/_authorization_management_client.py

Lines changed: 109 additions & 19 deletions
Large diffs are not rendered by default.

sdk/authorization/azure-mgmt-authorization/azure/mgmt/authorization/_configuration.py

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212

1313
from azure.core.configuration import Configuration
1414
from azure.core.pipeline import policies
15-
from azure.mgmt.core.policies import ARMHttpLoggingPolicy
15+
from azure.mgmt.core.policies import ARMChallengeAuthenticationPolicy, ARMHttpLoggingPolicy
1616

1717
from ._version import VERSION
1818

@@ -30,25 +30,19 @@ class AuthorizationManagementClientConfiguration(Configuration):
3030
3131
:param credential: Credential needed for the client to connect to Azure.
3232
:type credential: ~azure.core.credentials.TokenCredential
33-
:param subscription_id: The ID of the target subscription.
34-
:type subscription_id: str
3533
"""
3634

3735
def __init__(
3836
self,
3937
credential, # type: "TokenCredential"
40-
subscription_id, # type: str
4138
**kwargs # type: Any
4239
):
4340
# type: (...) -> None
4441
if credential is None:
4542
raise ValueError("Parameter 'credential' must not be None.")
46-
if subscription_id is None:
47-
raise ValueError("Parameter 'subscription_id' must not be None.")
4843
super(AuthorizationManagementClientConfiguration, self).__init__(**kwargs)
4944

5045
self.credential = credential
51-
self.subscription_id = subscription_id
5246
self.credential_scopes = kwargs.pop('credential_scopes', ['https://management.azure.com/.default'])
5347
kwargs.setdefault('sdk_moniker', 'azure-mgmt-authorization/{}'.format(VERSION))
5448
self._configure(**kwargs)
@@ -68,4 +62,4 @@ def _configure(
6862
self.redirect_policy = kwargs.get('redirect_policy') or policies.RedirectPolicy(**kwargs)
6963
self.authentication_policy = kwargs.get('authentication_policy')
7064
if self.credential and not self.authentication_policy:
71-
self.authentication_policy = policies.BearerTokenCredentialPolicy(self.credential, *self.credential_scopes, **kwargs)
65+
self.authentication_policy = ARMChallengeAuthenticationPolicy(self.credential, *self.credential_scopes, **kwargs)

sdk/authorization/azure-mgmt-authorization/azure/mgmt/authorization/aio/_authorization_management_client.py

Lines changed: 110 additions & 19 deletions
Large diffs are not rendered by default.

sdk/authorization/azure-mgmt-authorization/azure/mgmt/authorization/aio/_configuration.py

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212

1313
from azure.core.configuration import Configuration
1414
from azure.core.pipeline import policies
15-
from azure.mgmt.core.policies import ARMHttpLoggingPolicy
15+
from azure.mgmt.core.policies import ARMHttpLoggingPolicy, AsyncARMChallengeAuthenticationPolicy
1616

1717
from .._version import VERSION
1818

@@ -28,24 +28,18 @@ class AuthorizationManagementClientConfiguration(Configuration):
2828
2929
:param credential: Credential needed for the client to connect to Azure.
3030
:type credential: ~azure.core.credentials_async.AsyncTokenCredential
31-
:param subscription_id: The ID of the target subscription.
32-
:type subscription_id: str
3331
"""
3432

3533
def __init__(
3634
self,
3735
credential: "AsyncTokenCredential",
38-
subscription_id: str,
3936
**kwargs # type: Any
4037
) -> None:
4138
if credential is None:
4239
raise ValueError("Parameter 'credential' must not be None.")
43-
if subscription_id is None:
44-
raise ValueError("Parameter 'subscription_id' must not be None.")
4540
super(AuthorizationManagementClientConfiguration, self).__init__(**kwargs)
4641

4742
self.credential = credential
48-
self.subscription_id = subscription_id
4943
self.credential_scopes = kwargs.pop('credential_scopes', ['https://management.azure.com/.default'])
5044
kwargs.setdefault('sdk_moniker', 'azure-mgmt-authorization/{}'.format(VERSION))
5145
self._configure(**kwargs)
@@ -64,4 +58,4 @@ def _configure(
6458
self.redirect_policy = kwargs.get('redirect_policy') or policies.AsyncRedirectPolicy(**kwargs)
6559
self.authentication_policy = kwargs.get('authentication_policy')
6660
if self.credential and not self.authentication_policy:
67-
self.authentication_policy = policies.AsyncBearerTokenCredentialPolicy(self.credential, *self.credential_scopes, **kwargs)
61+
self.authentication_policy = AsyncARMChallengeAuthenticationPolicy(self.credential, *self.credential_scopes, **kwargs)

sdk/authorization/azure-mgmt-authorization/azure/mgmt/authorization/models.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,6 @@
55
# license information.
66
# --------------------------------------------------------------------------
77
from .v2015_07_01.models import *
8+
from .v2018_07_01_preview.models import *
9+
from .v2019_08_01_preview.models import *
10+
from .v2020_10_01.models import *

sdk/authorization/azure-mgmt-authorization/azure/mgmt/authorization/v2015_06_01/__init__.py

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,7 @@
1212
__version__ = VERSION
1313
__all__ = ['AuthorizationManagementClient']
1414

15-
try:
16-
from ._patch import patch_sdk # type: ignore
17-
patch_sdk()
18-
except ImportError:
19-
pass
15+
# `._patch.py` is used for handwritten extensions to the generated code
16+
# Example: https://github.com/Azure/azure-sdk-for-python/blob/main/doc/dev/customize_code/how-to-patch-sdk-code.md
17+
from ._patch import patch_sdk
18+
patch_sdk()

sdk/authorization/azure-mgmt-authorization/azure/mgmt/authorization/v2015_06_01/_authorization_management_client.py

Lines changed: 41 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -6,73 +6,77 @@
66
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
77
# --------------------------------------------------------------------------
88

9-
from typing import TYPE_CHECKING
9+
from copy import deepcopy
10+
from typing import Any, Optional, TYPE_CHECKING
1011

12+
from azure.core.rest import HttpRequest, HttpResponse
1113
from azure.mgmt.core import ARMPipelineClient
1214
from msrest import Deserializer, Serializer
1315

14-
if TYPE_CHECKING:
15-
# pylint: disable=unused-import,ungrouped-imports
16-
from typing import Any, Optional
17-
18-
from azure.core.credentials import TokenCredential
19-
from azure.core.pipeline.transport import HttpRequest, HttpResponse
20-
16+
from . import models
2117
from ._configuration import AuthorizationManagementClientConfiguration
2218
from .operations import ClassicAdministratorsOperations
23-
from . import models
2419

20+
if TYPE_CHECKING:
21+
# pylint: disable=unused-import,ungrouped-imports
22+
from azure.core.credentials import TokenCredential
2523

26-
class AuthorizationManagementClient(object):
24+
class AuthorizationManagementClient:
2725
"""Role based access control provides you a way to apply granular level policy administration down to individual resources or resource groups. These operations enable you to manage role definitions and role assignments. A role definition describes the set of actions that can be performed on resources. A role assignment grants access to Azure Active Directory users.
2826
2927
:ivar classic_administrators: ClassicAdministratorsOperations operations
30-
:vartype classic_administrators: azure.mgmt.authorization.v2015_06_01.operations.ClassicAdministratorsOperations
28+
:vartype classic_administrators:
29+
azure.mgmt.authorization.v2015_06_01.operations.ClassicAdministratorsOperations
3130
:param credential: Credential needed for the client to connect to Azure.
3231
:type credential: ~azure.core.credentials.TokenCredential
3332
:param subscription_id: The ID of the target subscription.
3433
:type subscription_id: str
35-
:param str base_url: Service URL
34+
:param base_url: Service URL. Default value is 'https://management.azure.com'.
35+
:type base_url: str
3636
"""
3737

3838
def __init__(
3939
self,
40-
credential, # type: "TokenCredential"
41-
subscription_id, # type: str
42-
base_url=None, # type: Optional[str]
43-
**kwargs # type: Any
44-
):
45-
# type: (...) -> None
46-
if not base_url:
47-
base_url = 'https://management.azure.com'
48-
self._config = AuthorizationManagementClientConfiguration(credential, subscription_id, **kwargs)
40+
credential: "TokenCredential",
41+
subscription_id: str,
42+
base_url: str = "https://management.azure.com",
43+
**kwargs: Any
44+
) -> None:
45+
self._config = AuthorizationManagementClientConfiguration(credential=credential, subscription_id=subscription_id, **kwargs)
4946
self._client = ARMPipelineClient(base_url=base_url, config=self._config, **kwargs)
5047

5148
client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)}
5249
self._serialize = Serializer(client_models)
53-
self._serialize.client_side_validation = False
5450
self._deserialize = Deserializer(client_models)
51+
self._serialize.client_side_validation = False
52+
self.classic_administrators = ClassicAdministratorsOperations(self._client, self._config, self._serialize, self._deserialize)
5553

56-
self.classic_administrators = ClassicAdministratorsOperations(
57-
self._client, self._config, self._serialize, self._deserialize)
5854

59-
def _send_request(self, http_request, **kwargs):
60-
# type: (HttpRequest, Any) -> HttpResponse
55+
def _send_request(
56+
self,
57+
request, # type: HttpRequest
58+
**kwargs: Any
59+
) -> HttpResponse:
6160
"""Runs the network request through the client's chained policies.
6261
63-
:param http_request: The network request you want to make. Required.
64-
:type http_request: ~azure.core.pipeline.transport.HttpRequest
65-
:keyword bool stream: Whether the response payload will be streamed. Defaults to True.
62+
>>> from azure.core.rest import HttpRequest
63+
>>> request = HttpRequest("GET", "https://www.example.org/")
64+
<HttpRequest [GET], url: 'https://www.example.org/'>
65+
>>> response = client._send_request(request)
66+
<HttpResponse: 200 OK>
67+
68+
For more information on this code flow, see https://aka.ms/azsdk/python/protocol/quickstart
69+
70+
:param request: The network request you want to make. Required.
71+
:type request: ~azure.core.rest.HttpRequest
72+
:keyword bool stream: Whether the response payload will be streamed. Defaults to False.
6673
:return: The response of your network call. Does not do error handling on your response.
67-
:rtype: ~azure.core.pipeline.transport.HttpResponse
74+
:rtype: ~azure.core.rest.HttpResponse
6875
"""
69-
path_format_arguments = {
70-
'subscriptionId': self._serialize.url("self._config.subscription_id", self._config.subscription_id, 'str', min_length=1),
71-
}
72-
http_request.url = self._client.format_url(http_request.url, **path_format_arguments)
73-
stream = kwargs.pop("stream", True)
74-
pipeline_response = self._client._pipeline.run(http_request, stream=stream, **kwargs)
75-
return pipeline_response.http_response
76+
77+
request_copy = deepcopy(request)
78+
request_copy.url = self._client.format_url(request_copy.url)
79+
return self._client.send_request(request_copy, **kwargs)
7680

7781
def close(self):
7882
# type: () -> None

sdk/authorization/azure-mgmt-authorization/azure/mgmt/authorization/v2015_06_01/_configuration.py

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,16 @@
66
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
77
# --------------------------------------------------------------------------
88

9-
from typing import TYPE_CHECKING
9+
from typing import Any, TYPE_CHECKING
1010

1111
from azure.core.configuration import Configuration
1212
from azure.core.pipeline import policies
13-
from azure.mgmt.core.policies import ARMHttpLoggingPolicy
13+
from azure.mgmt.core.policies import ARMChallengeAuthenticationPolicy, ARMHttpLoggingPolicy
1414

1515
from ._version import VERSION
1616

1717
if TYPE_CHECKING:
1818
# pylint: disable=unused-import,ungrouped-imports
19-
from typing import Any
20-
2119
from azure.core.credentials import TokenCredential
2220

2321

@@ -35,16 +33,15 @@ class AuthorizationManagementClientConfiguration(Configuration):
3533

3634
def __init__(
3735
self,
38-
credential, # type: "TokenCredential"
39-
subscription_id, # type: str
40-
**kwargs # type: Any
41-
):
42-
# type: (...) -> None
36+
credential: "TokenCredential",
37+
subscription_id: str,
38+
**kwargs: Any
39+
) -> None:
40+
super(AuthorizationManagementClientConfiguration, self).__init__(**kwargs)
4341
if credential is None:
4442
raise ValueError("Parameter 'credential' must not be None.")
4543
if subscription_id is None:
4644
raise ValueError("Parameter 'subscription_id' must not be None.")
47-
super(AuthorizationManagementClientConfiguration, self).__init__(**kwargs)
4845

4946
self.credential = credential
5047
self.subscription_id = subscription_id
@@ -68,4 +65,4 @@ def _configure(
6865
self.redirect_policy = kwargs.get('redirect_policy') or policies.RedirectPolicy(**kwargs)
6966
self.authentication_policy = kwargs.get('authentication_policy')
7067
if self.credential and not self.authentication_policy:
71-
self.authentication_policy = policies.BearerTokenCredentialPolicy(self.credential, *self.credential_scopes, **kwargs)
68+
self.authentication_policy = ARMChallengeAuthenticationPolicy(self.credential, *self.credential_scopes, **kwargs)

sdk/authorization/azure-mgmt-authorization/azure/mgmt/authorization/v2015_06_01/_metadata.json

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@
55
"name": "AuthorizationManagementClient",
66
"filename": "_authorization_management_client",
77
"description": "Role based access control provides you a way to apply granular level policy administration down to individual resources or resource groups. These operations enable you to manage role definitions and role assignments. A role definition describes the set of actions that can be performed on resources. A role assignment grants access to Azure Active Directory users.",
8-
"base_url": "\u0027https://management.azure.com\u0027",
9-
"custom_base_url": null,
8+
"host_value": "\"https://management.azure.com\"",
9+
"parameterized_host_template": null,
1010
"azure_arm": true,
1111
"has_lro_operations": false,
1212
"client_side_validation": false,
13-
"sync_imports": "{\"typing\": {\"azurecore\": {\"azure.core.credentials\": [\"TokenCredential\"]}}, \"regular\": {\"azurecore\": {\"azure.profiles\": [\"KnownProfiles\", \"ProfileDefinition\"], \"azure.profiles.multiapiclient\": [\"MultiApiClientMixin\"], \"msrest\": [\"Deserializer\", \"Serializer\"], \"azure.mgmt.core\": [\"ARMPipelineClient\"]}, \"local\": {\"._configuration\": [\"AuthorizationManagementClientConfiguration\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\", \"Optional\"]}, \"azurecore\": {\"azure.core.pipeline.transport\": [\"HttpRequest\", \"HttpResponse\"]}}}",
14-
"async_imports": "{\"typing\": {\"azurecore\": {\"azure.core.credentials_async\": [\"AsyncTokenCredential\"]}}, \"regular\": {\"azurecore\": {\"azure.profiles\": [\"KnownProfiles\", \"ProfileDefinition\"], \"azure.profiles.multiapiclient\": [\"MultiApiClientMixin\"], \"msrest\": [\"Deserializer\", \"Serializer\"], \"azure.mgmt.core\": [\"AsyncARMPipelineClient\"]}, \"local\": {\"._configuration\": [\"AuthorizationManagementClientConfiguration\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\", \"Optional\"]}, \"azurecore\": {\"azure.core.pipeline.transport\": [\"AsyncHttpResponse\", \"HttpRequest\"]}}}"
13+
"sync_imports": "{\"typing\": {\"azurecore\": {\"azure.core.credentials\": [\"TokenCredential\"]}}, \"regular\": {\"azurecore\": {\"azure.profiles\": [\"KnownProfiles\", \"ProfileDefinition\"], \"azure.profiles.multiapiclient\": [\"MultiApiClientMixin\"], \"msrest\": [\"Deserializer\", \"Serializer\"], \"azure.mgmt.core\": [\"ARMPipelineClient\"]}, \"local\": {\"._configuration\": [\"AuthorizationManagementClientConfiguration\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\", \"Optional\"]}}}",
14+
"async_imports": "{\"typing\": {\"azurecore\": {\"azure.core.credentials_async\": [\"AsyncTokenCredential\"], \"azure.core.credentials\": [\"TokenCredential\"]}}, \"regular\": {\"azurecore\": {\"azure.profiles\": [\"KnownProfiles\", \"ProfileDefinition\"], \"azure.profiles.multiapiclient\": [\"MultiApiClientMixin\"], \"msrest\": [\"Deserializer\", \"Serializer\"], \"azure.mgmt.core\": [\"AsyncARMPipelineClient\"]}, \"local\": {\"._configuration\": [\"AuthorizationManagementClientConfiguration\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\", \"Optional\"]}}}"
1515
},
1616
"global_parameters": {
1717
"sync": {
@@ -54,7 +54,7 @@
5454
"required": false
5555
},
5656
"base_url": {
57-
"signature": "base_url=None, # type: Optional[str]",
57+
"signature": "base_url=\"https://management.azure.com\", # type: str",
5858
"description": "Service URL",
5959
"docstring_type": "str",
6060
"required": false
@@ -74,7 +74,7 @@
7474
"required": false
7575
},
7676
"base_url": {
77-
"signature": "base_url: Optional[str] = None,",
77+
"signature": "base_url: str = \"https://management.azure.com\",",
7878
"description": "Service URL",
7979
"docstring_type": "str",
8080
"required": false
@@ -91,11 +91,10 @@
9191
"config": {
9292
"credential": true,
9393
"credential_scopes": ["https://management.azure.com/.default"],
94-
"credential_default_policy_type": "BearerTokenCredentialPolicy",
95-
"credential_default_policy_type_has_async_version": true,
96-
"credential_key_header_name": null,
97-
"sync_imports": "{\"regular\": {\"azurecore\": {\"azure.core.configuration\": [\"Configuration\"], \"azure.core.pipeline\": [\"policies\"], \"azure.mgmt.core.policies\": [\"ARMHttpLoggingPolicy\"]}, \"local\": {\"._version\": [\"VERSION\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\"]}}, \"typing\": {\"azurecore\": {\"azure.core.credentials\": [\"TokenCredential\"]}}}",
98-
"async_imports": "{\"regular\": {\"azurecore\": {\"azure.core.configuration\": [\"Configuration\"], \"azure.core.pipeline\": [\"policies\"], \"azure.mgmt.core.policies\": [\"ARMHttpLoggingPolicy\"]}, \"local\": {\".._version\": [\"VERSION\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\"]}}, \"typing\": {\"azurecore\": {\"azure.core.credentials_async\": [\"AsyncTokenCredential\"]}}}"
94+
"credential_call_sync": "ARMChallengeAuthenticationPolicy(self.credential, *self.credential_scopes, **kwargs)",
95+
"credential_call_async": "AsyncARMChallengeAuthenticationPolicy(self.credential, *self.credential_scopes, **kwargs)",
96+
"sync_imports": "{\"regular\": {\"azurecore\": {\"azure.core.configuration\": [\"Configuration\"], \"azure.core.pipeline\": [\"policies\"], \"azure.mgmt.core.policies\": [\"ARMChallengeAuthenticationPolicy\", \"ARMHttpLoggingPolicy\"]}, \"local\": {\"._version\": [\"VERSION\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\"]}}, \"typing\": {\"azurecore\": {\"azure.core.credentials\": [\"TokenCredential\"]}}}",
97+
"async_imports": "{\"regular\": {\"azurecore\": {\"azure.core.configuration\": [\"Configuration\"], \"azure.core.pipeline\": [\"policies\"], \"azure.mgmt.core.policies\": [\"ARMHttpLoggingPolicy\", \"AsyncARMChallengeAuthenticationPolicy\"]}, \"local\": {\".._version\": [\"VERSION\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\"]}}, \"typing\": {\"azurecore\": {\"azure.core.credentials_async\": [\"AsyncTokenCredential\"]}}}"
9998
},
10099
"operation_groups": {
101100
"classic_administrators": "ClassicAdministratorsOperations"

0 commit comments

Comments
 (0)