diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/_meta.json b/sdk/trustedsigning/azure-mgmt-trustedsigning/_meta.json index fde7aa5f8cd8..4e3c33804d2a 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/_meta.json +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/_meta.json @@ -1,6 +1,6 @@ { - "commit": "e6fde2ac19d0202f0e72217a3e0f9edb63dba273", + "commit": "bf769c40da6f81caee348c6bfcb4eae2331b3296", "repository_url": "https://github.com/Azure/azure-rest-api-specs", "typespec_src": "specification/codesigning/CodeSigning.Management", - "@azure-tools/typespec-python": "0.33.0" + "@azure-tools/typespec-python": "0.35.1" } \ No newline at end of file diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_client.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_client.py index cfda86b3c57a..b2783fd2248f 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_client.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_client.py @@ -20,11 +20,10 @@ from .operations import CertificateProfilesOperations, CodeSigningAccountsOperations, Operations if TYPE_CHECKING: - # pylint: disable=unused-import,ungrouped-imports from azure.core.credentials import TokenCredential -class TrustedSigningMgmtClient: # pylint: disable=client-accepts-api-version-keyword +class TrustedSigningMgmtClient: """Code Signing resource provider api. :ivar operations: Operations operations @@ -41,9 +40,8 @@ class TrustedSigningMgmtClient: # pylint: disable=client-accepts-api-version-ke :type subscription_id: str :param base_url: Service host. Default value is "https://management.azure.com". :type base_url: str - :keyword api_version: The API version to use for this operation. Default value is - "2024-02-05-preview". Note that overriding this default value may result in unsupported - behavior. + :keyword api_version: The API version to use for this operation. Default value is "2024-11-15". + Note that overriding this default value may result in unsupported behavior. :paramtype api_version: str :keyword int polling_interval: Default waiting time between two polls for LRO operations if no Retry-After header is present. diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_configuration.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_configuration.py index d9b0d50c2869..6257ff8ee27e 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_configuration.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_configuration.py @@ -14,11 +14,10 @@ from ._version import VERSION if TYPE_CHECKING: - # pylint: disable=unused-import,ungrouped-imports from azure.core.credentials import TokenCredential -class TrustedSigningMgmtClientConfiguration: # pylint: disable=too-many-instance-attributes,name-too-long +class TrustedSigningMgmtClientConfiguration: # pylint: disable=too-many-instance-attributes """Configuration for TrustedSigningMgmtClient. Note that all parameters used to create this instance are saved as instance @@ -30,9 +29,8 @@ class TrustedSigningMgmtClientConfiguration: # pylint: disable=too-many-instanc :type subscription_id: str :param base_url: Service host. Default value is "https://management.azure.com". :type base_url: str - :keyword api_version: The API version to use for this operation. Default value is - "2024-02-05-preview". Note that overriding this default value may result in unsupported - behavior. + :keyword api_version: The API version to use for this operation. Default value is "2024-11-15". + Note that overriding this default value may result in unsupported behavior. :paramtype api_version: str """ @@ -43,7 +41,7 @@ def __init__( base_url: str = "https://management.azure.com", **kwargs: Any ) -> None: - api_version: str = kwargs.pop("api_version", "2024-02-05-preview") + api_version: str = kwargs.pop("api_version", "2024-11-15") if credential is None: raise ValueError("Parameter 'credential' must not be None.") diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_model_base.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_model_base.py index 12ad7f29c71e..9d401b0cf012 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_model_base.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_model_base.py @@ -1,3 +1,4 @@ +# pylint: disable=too-many-lines # coding=utf-8 # -------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. @@ -636,7 +637,7 @@ def _deserialize(cls, data, exist_discriminators): return mapped_cls._deserialize(data, exist_discriminators) def as_dict(self, *, exclude_readonly: bool = False) -> typing.Dict[str, typing.Any]: - """Return a dict that can be JSONify using json.dump. + """Return a dict that can be turned into json using json.dump. :keyword bool exclude_readonly: Whether to remove the readonly properties. :returns: A dict JSON compatible object @@ -733,7 +734,7 @@ def _sorted_annotations(types: typing.List[typing.Any]) -> typing.List[typing.An ) -def _get_deserialize_callable_from_annotation( # pylint: disable=R0911, R0915, R0912 +def _get_deserialize_callable_from_annotation( # pylint: disable=too-many-return-statements, too-many-branches annotation: typing.Any, module: typing.Optional[str], rf: typing.Optional["_RestField"] = None, diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_serialization.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_serialization.py index 01a226bd7f14..7b3074215a30 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_serialization.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/_serialization.py @@ -1,4 +1,3 @@ -# pylint: disable=too-many-lines # -------------------------------------------------------------------------- # # Copyright (c) Microsoft Corporation. All rights reserved. diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/_client.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/_client.py index 30a4f46b28d5..94d9b3a7ed97 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/_client.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/_client.py @@ -20,11 +20,10 @@ from .operations import CertificateProfilesOperations, CodeSigningAccountsOperations, Operations if TYPE_CHECKING: - # pylint: disable=unused-import,ungrouped-imports from azure.core.credentials_async import AsyncTokenCredential -class TrustedSigningMgmtClient: # pylint: disable=client-accepts-api-version-keyword +class TrustedSigningMgmtClient: """Code Signing resource provider api. :ivar operations: Operations operations @@ -41,9 +40,8 @@ class TrustedSigningMgmtClient: # pylint: disable=client-accepts-api-version-ke :type subscription_id: str :param base_url: Service host. Default value is "https://management.azure.com". :type base_url: str - :keyword api_version: The API version to use for this operation. Default value is - "2024-02-05-preview". Note that overriding this default value may result in unsupported - behavior. + :keyword api_version: The API version to use for this operation. Default value is "2024-11-15". + Note that overriding this default value may result in unsupported behavior. :paramtype api_version: str :keyword int polling_interval: Default waiting time between two polls for LRO operations if no Retry-After header is present. diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/_configuration.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/_configuration.py index 5eedbe25918c..692a1160ac8e 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/_configuration.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/_configuration.py @@ -14,11 +14,10 @@ from .._version import VERSION if TYPE_CHECKING: - # pylint: disable=unused-import,ungrouped-imports from azure.core.credentials_async import AsyncTokenCredential -class TrustedSigningMgmtClientConfiguration: # pylint: disable=too-many-instance-attributes,name-too-long +class TrustedSigningMgmtClientConfiguration: # pylint: disable=too-many-instance-attributes """Configuration for TrustedSigningMgmtClient. Note that all parameters used to create this instance are saved as instance @@ -30,9 +29,8 @@ class TrustedSigningMgmtClientConfiguration: # pylint: disable=too-many-instanc :type subscription_id: str :param base_url: Service host. Default value is "https://management.azure.com". :type base_url: str - :keyword api_version: The API version to use for this operation. Default value is - "2024-02-05-preview". Note that overriding this default value may result in unsupported - behavior. + :keyword api_version: The API version to use for this operation. Default value is "2024-11-15". + Note that overriding this default value may result in unsupported behavior. :paramtype api_version: str """ @@ -43,7 +41,7 @@ def __init__( base_url: str = "https://management.azure.com", **kwargs: Any ) -> None: - api_version: str = kwargs.pop("api_version", "2024-02-05-preview") + api_version: str = kwargs.pop("api_version", "2024-11-15") if credential is None: raise ValueError("Parameter 'credential' must not be None.") diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/operations/_operations.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/operations/_operations.py index a79891ffb7f6..58a14e90c120 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/operations/_operations.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/aio/operations/_operations.py @@ -1,4 +1,4 @@ -# pylint: disable=too-many-lines,too-many-statements +# pylint: disable=too-many-lines # coding=utf-8 # -------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. @@ -9,21 +9,7 @@ from io import IOBase import json import sys -from typing import ( - Any, - AsyncIterable, - AsyncIterator, - Callable, - Dict, - IO, - List, - Optional, - Type, - TypeVar, - Union, - cast, - overload, -) +from typing import Any, AsyncIterable, AsyncIterator, Callable, Dict, IO, List, Optional, TypeVar, Union, cast, overload import urllib.parse from azure.core.async_paging import AsyncItemPaged, AsyncList @@ -67,7 +53,7 @@ if sys.version_info >= (3, 9): from collections.abc import MutableMapping else: - from typing import MutableMapping # type: ignore # pylint: disable=ungrouped-imports + from typing import MutableMapping # type: ignore T = TypeVar("T") ClsType = Optional[Callable[[PipelineResponse[HttpRequest, AsyncHttpResponse], T, Dict[str, Any]], Any]] JSON = MutableMapping[str, Any] # pylint: disable=unsubscriptable-object @@ -103,7 +89,7 @@ def list(self, **kwargs: Any) -> AsyncIterable["_models.Operation"]: cls: ClsType[List[_models.Operation]] = kwargs.pop("cls", None) - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -204,7 +190,7 @@ async def get(self, resource_group_name: str, account_name: str, **kwargs: Any) :rtype: ~azure.mgmt.trustedsigning.models.CodeSigningAccount :raises ~azure.core.exceptions.HttpResponseError: """ - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -264,7 +250,7 @@ async def _create_initial( resource: Union[_models.CodeSigningAccount, JSON, IO[bytes]], **kwargs: Any ) -> AsyncIterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -497,7 +483,7 @@ async def _update_initial( properties: Union[_models.CodeSigningAccountPatch, JSON, IO[bytes]], **kwargs: Any ) -> AsyncIterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -726,7 +712,7 @@ def get_long_running_output(pipeline_response): ) async def _delete_initial(self, resource_group_name: str, account_name: str, **kwargs: Any) -> AsyncIterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -856,7 +842,7 @@ def list_by_resource_group( cls: ClsType[List[_models.CodeSigningAccount]] = kwargs.pop("cls", None) - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -942,7 +928,7 @@ def list_by_subscription(self, **kwargs: Any) -> AsyncIterable["_models.CodeSign cls: ClsType[List[_models.CodeSigningAccount]] = kwargs.pop("cls", None) - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1078,7 +1064,7 @@ async def check_name_availability( :rtype: ~azure.mgmt.trustedsigning.models.CheckNameAvailabilityResult :raises ~azure.core.exceptions.HttpResponseError: """ - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1174,7 +1160,7 @@ async def get( :rtype: ~azure.mgmt.trustedsigning.models.CertificateProfile :raises ~azure.core.exceptions.HttpResponseError: """ - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1236,7 +1222,7 @@ async def _create_initial( resource: Union[_models.CertificateProfile, JSON, IO[bytes]], **kwargs: Any ) -> AsyncIterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1479,7 +1465,7 @@ def get_long_running_output(pipeline_response): async def _delete_initial( self, resource_group_name: str, account_name: str, profile_name: str, **kwargs: Any ) -> AsyncIterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1617,7 +1603,7 @@ def list_by_code_signing_account( cls: ClsType[List[_models.CertificateProfile]] = kwargs.pop("cls", None) - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1691,7 +1677,7 @@ async def get_next(next_link=None): return AsyncItemPaged(get_next, extract_data) @overload - async def revoke_certificate( # pylint: disable=inconsistent-return-statements + async def revoke_certificate( self, resource_group_name: str, account_name: str, @@ -1721,7 +1707,7 @@ async def revoke_certificate( # pylint: disable=inconsistent-return-statements """ @overload - async def revoke_certificate( # pylint: disable=inconsistent-return-statements + async def revoke_certificate( self, resource_group_name: str, account_name: str, @@ -1751,7 +1737,7 @@ async def revoke_certificate( # pylint: disable=inconsistent-return-statements """ @overload - async def revoke_certificate( # pylint: disable=inconsistent-return-statements + async def revoke_certificate( self, resource_group_name: str, account_name: str, @@ -1781,7 +1767,7 @@ async def revoke_certificate( # pylint: disable=inconsistent-return-statements """ @distributed_trace_async - async def revoke_certificate( # pylint: disable=inconsistent-return-statements + async def revoke_certificate( self, resource_group_name: str, account_name: str, @@ -1805,7 +1791,7 @@ async def revoke_certificate( # pylint: disable=inconsistent-return-statements :rtype: None :raises ~azure.core.exceptions.HttpResponseError: """ - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/models/__init__.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/models/__init__.py index 242fee9abd41..7a26b75ab84c 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/models/__init__.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/models/__init__.py @@ -7,6 +7,7 @@ # -------------------------------------------------------------------------- from ._models import AccountSku +from ._models import AccountSkuPatch from ._models import Certificate from ._models import CertificateProfile from ._models import CertificateProfileProperties @@ -44,6 +45,7 @@ __all__ = [ "AccountSku", + "AccountSkuPatch", "Certificate", "CertificateProfile", "CertificateProfileProperties", diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/models/_models.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/models/_models.py index 9c3e111c0a60..29c6bbb89009 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/models/_models.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/models/_models.py @@ -1,5 +1,4 @@ # coding=utf-8 -# pylint: disable=too-many-lines # -------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for license information. @@ -14,7 +13,6 @@ from .._model_base import rest_field if TYPE_CHECKING: - # pylint: disable=unused-import,ungrouped-imports from .. import models as _models @@ -47,11 +45,41 @@ def __init__(self, *args: Any, **kwargs: Any) -> None: # pylint: disable=useles super().__init__(*args, **kwargs) +class AccountSkuPatch(_model_base.Model): + """SKU of the trusted signing account. + + :ivar name: Name of the SKU. Known values are: "Basic" and "Premium". + :vartype name: str or ~azure.mgmt.trustedsigning.models.SkuName + """ + + name: Optional[Union[str, "_models.SkuName"]] = rest_field() + """Name of the SKU. Known values are: \"Basic\" and \"Premium\".""" + + @overload + def __init__( + self, + *, + name: Optional[Union[str, "_models.SkuName"]] = None, + ): ... + + @overload + def __init__(self, mapping: Mapping[str, Any]): + """ + :param mapping: raw JSON to initialize the model. + :type mapping: Mapping[str, Any] + """ + + def __init__(self, *args: Any, **kwargs: Any) -> None: # pylint: disable=useless-super-delegation + super().__init__(*args, **kwargs) + + class Certificate(_model_base.Model): """Properties of the certificate. :ivar serial_number: Serial number of the certificate. :vartype serial_number: str + :ivar enhanced_key_usage: Enhanced key usage of the certificate. + :vartype enhanced_key_usage: str :ivar subject_name: Subject name of the certificate. :vartype subject_name: str :ivar thumbprint: Thumbprint of the certificate. @@ -68,6 +96,8 @@ class Certificate(_model_base.Model): serial_number: Optional[str] = rest_field(name="serialNumber") """Serial number of the certificate.""" + enhanced_key_usage: Optional[str] = rest_field(name="enhancedKeyUsage") + """Enhanced key usage of the certificate.""" subject_name: Optional[str] = rest_field(name="subjectName") """Subject name of the certificate.""" thumbprint: Optional[str] = rest_field() @@ -88,6 +118,7 @@ def __init__( self, *, serial_number: Optional[str] = None, + enhanced_key_usage: Optional[str] = None, subject_name: Optional[str] = None, thumbprint: Optional[str] = None, created_date: Optional[str] = None, @@ -216,7 +247,7 @@ def __init__(self, *args: Any, **kwargs: Any) -> None: # pylint: disable=useles super().__init__(*args, **kwargs) -class CertificateProfileProperties(_model_base.Model): # pylint: disable=too-many-instance-attributes +class CertificateProfileProperties(_model_base.Model): """Properties of the certificate profile. Readonly variables are only populated by the server, and will be ignored when sending a request. @@ -225,38 +256,21 @@ class CertificateProfileProperties(_model_base.Model): # pylint: disable=too-ma :ivar profile_type: Profile type of the certificate. Required. Known values are: "PublicTrust", "PrivateTrust", "PrivateTrustCIPolicy", "VBSEnclave", and "PublicTrustTest". :vartype profile_type: str or ~azure.mgmt.trustedsigning.models.ProfileType - :ivar common_name: Used as CN in the certificate subject name. - :vartype common_name: str - :ivar organization: Used as O in the certificate subject name. - :vartype organization: str - :ivar organization_unit: Used as OU in the private trust certificate subject name. - :vartype organization_unit: str - :ivar street_address: Used as STREET in the certificate subject name. - :vartype street_address: str :ivar include_street_address: Whether to include STREET in the certificate subject name. :vartype include_street_address: bool - :ivar city: Used as L in the certificate subject name. - :vartype city: str :ivar include_city: Whether to include L in the certificate subject name. Applicable only for private trust, private trust ci profile types. :vartype include_city: bool - :ivar state: Used as S in the certificate subject name. - :vartype state: str :ivar include_state: Whether to include S in the certificate subject name. Applicable only for private trust, private trust ci profile types. :vartype include_state: bool - :ivar country: Used as C in the certificate subject name. - :vartype country: str :ivar include_country: Whether to include C in the certificate subject name. Applicable only for private trust, private trust ci profile types. :vartype include_country: bool - :ivar postal_code: Used as PC in the certificate subject name. - :vartype postal_code: str :ivar include_postal_code: Whether to include PC in the certificate subject name. :vartype include_postal_code: bool - :ivar enhanced_key_usage: Enhanced key usage of the certificate. - :vartype enhanced_key_usage: str :ivar identity_validation_id: Identity validation id used for the certificate subject name. + Required. :vartype identity_validation_id: str :ivar provisioning_state: Status of the current operation on certificate profile. Known values are: "Succeeded", "Failed", "Canceled", "Updating", "Deleting", and "Accepted". @@ -271,39 +285,21 @@ class CertificateProfileProperties(_model_base.Model): # pylint: disable=too-ma profile_type: Union[str, "_models.ProfileType"] = rest_field(name="profileType") """Profile type of the certificate. Required. Known values are: \"PublicTrust\", \"PrivateTrust\", \"PrivateTrustCIPolicy\", \"VBSEnclave\", and \"PublicTrustTest\".""" - common_name: Optional[str] = rest_field(name="commonName", visibility=["read"]) - """Used as CN in the certificate subject name.""" - organization: Optional[str] = rest_field(visibility=["read"]) - """Used as O in the certificate subject name.""" - organization_unit: Optional[str] = rest_field(name="organizationUnit", visibility=["read"]) - """Used as OU in the private trust certificate subject name.""" - street_address: Optional[str] = rest_field(name="streetAddress", visibility=["read"]) - """Used as STREET in the certificate subject name.""" include_street_address: Optional[bool] = rest_field(name="includeStreetAddress") """Whether to include STREET in the certificate subject name.""" - city: Optional[str] = rest_field(visibility=["read"]) - """Used as L in the certificate subject name.""" include_city: Optional[bool] = rest_field(name="includeCity") """Whether to include L in the certificate subject name. Applicable only for private trust, private trust ci profile types.""" - state: Optional[str] = rest_field(visibility=["read"]) - """Used as S in the certificate subject name.""" include_state: Optional[bool] = rest_field(name="includeState") """Whether to include S in the certificate subject name. Applicable only for private trust, private trust ci profile types.""" - country: Optional[str] = rest_field(visibility=["read"]) - """Used as C in the certificate subject name.""" include_country: Optional[bool] = rest_field(name="includeCountry") """Whether to include C in the certificate subject name. Applicable only for private trust, private trust ci profile types.""" - postal_code: Optional[str] = rest_field(name="postalCode", visibility=["read"]) - """Used as PC in the certificate subject name.""" include_postal_code: Optional[bool] = rest_field(name="includePostalCode") """Whether to include PC in the certificate subject name.""" - enhanced_key_usage: Optional[str] = rest_field(name="enhancedKeyUsage", visibility=["read"]) - """Enhanced key usage of the certificate.""" - identity_validation_id: Optional[str] = rest_field(name="identityValidationId") - """Identity validation id used for the certificate subject name.""" + identity_validation_id: str = rest_field(name="identityValidationId") + """Identity validation id used for the certificate subject name. Required.""" provisioning_state: Optional[Union[str, "_models.ProvisioningState"]] = rest_field( name="provisioningState", visibility=["read"] ) @@ -322,12 +318,12 @@ def __init__( self, *, profile_type: Union[str, "_models.ProfileType"], + identity_validation_id: str, include_street_address: Optional[bool] = None, include_city: Optional[bool] = None, include_state: Optional[bool] = None, include_country: Optional[bool] = None, include_postal_code: Optional[bool] = None, - identity_validation_id: Optional[str] = None, ): ... @overload @@ -570,17 +566,17 @@ class CodeSigningAccountPatchProperties(_model_base.Model): """Properties of the trusted signing account. :ivar sku: SKU of the trusted signing account. - :vartype sku: ~azure.mgmt.trustedsigning.models.AccountSku + :vartype sku: ~azure.mgmt.trustedsigning.models.AccountSkuPatch """ - sku: Optional["_models.AccountSku"] = rest_field() + sku: Optional["_models.AccountSkuPatch"] = rest_field() """SKU of the trusted signing account.""" @overload def __init__( self, *, - sku: Optional["_models.AccountSku"] = None, + sku: Optional["_models.AccountSkuPatch"] = None, ): ... @overload diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/operations/_operations.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/operations/_operations.py index b2b4ecd86433..6a1091118c87 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/operations/_operations.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/azure/mgmt/trustedsigning/operations/_operations.py @@ -1,4 +1,4 @@ -# pylint: disable=too-many-lines,too-many-statements +# pylint: disable=too-many-lines # coding=utf-8 # -------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. @@ -9,7 +9,7 @@ from io import IOBase import json import sys -from typing import Any, Callable, Dict, IO, Iterable, Iterator, List, Optional, Type, TypeVar, Union, cast, overload +from typing import Any, Callable, Dict, IO, Iterable, Iterator, List, Optional, TypeVar, Union, cast, overload import urllib.parse from azure.core.exceptions import ( @@ -38,7 +38,7 @@ if sys.version_info >= (3, 9): from collections.abc import MutableMapping else: - from typing import MutableMapping # type: ignore # pylint: disable=ungrouped-imports + from typing import MutableMapping # type: ignore T = TypeVar("T") ClsType = Optional[Callable[[PipelineResponse[HttpRequest, HttpResponse], T, Dict[str, Any]], Any]] JSON = MutableMapping[str, Any] # pylint: disable=unsubscriptable-object @@ -51,7 +51,7 @@ def build_operations_list_request(**kwargs: Any) -> HttpRequest: _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -72,7 +72,7 @@ def build_code_signing_accounts_get_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -101,7 +101,7 @@ def build_code_signing_accounts_create_request( # pylint: disable=name-too-long _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -132,7 +132,7 @@ def build_code_signing_accounts_update_request( # pylint: disable=name-too-long _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -162,7 +162,7 @@ def build_code_signing_accounts_delete_request( # pylint: disable=name-too-long _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -190,7 +190,7 @@ def build_code_signing_accounts_list_by_resource_group_request( # pylint: disab _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -217,7 +217,7 @@ def build_code_signing_accounts_list_by_subscription_request( # pylint: disable _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -244,7 +244,7 @@ def build_code_signing_accounts_check_name_availability_request( # pylint: disa _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -272,7 +272,7 @@ def build_certificate_profiles_get_request( _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -302,7 +302,7 @@ def build_certificate_profiles_create_request( # pylint: disable=name-too-long _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -333,7 +333,7 @@ def build_certificate_profiles_delete_request( # pylint: disable=name-too-long _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -362,7 +362,7 @@ def build_certificate_profiles_list_by_code_signing_account_request( # pylint: _headers = case_insensitive_dict(kwargs.pop("headers", {}) or {}) _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -391,7 +391,7 @@ def build_certificate_profiles_revoke_certificate_request( # pylint: disable=na _params = case_insensitive_dict(kwargs.pop("params", {}) or {}) content_type: Optional[str] = kwargs.pop("content_type", _headers.pop("Content-Type", None)) - api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-02-05-preview")) + api_version: str = kwargs.pop("api_version", _params.pop("api-version", "2024-11-15")) accept = _headers.pop("Accept", "application/json") # Construct URL @@ -446,7 +446,7 @@ def list(self, **kwargs: Any) -> Iterable["_models.Operation"]: cls: ClsType[List[_models.Operation]] = kwargs.pop("cls", None) - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -547,7 +547,7 @@ def get(self, resource_group_name: str, account_name: str, **kwargs: Any) -> _mo :rtype: ~azure.mgmt.trustedsigning.models.CodeSigningAccount :raises ~azure.core.exceptions.HttpResponseError: """ - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -607,7 +607,7 @@ def _create_initial( resource: Union[_models.CodeSigningAccount, JSON, IO[bytes]], **kwargs: Any ) -> Iterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -836,7 +836,7 @@ def _update_initial( properties: Union[_models.CodeSigningAccountPatch, JSON, IO[bytes]], **kwargs: Any ) -> Iterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1061,7 +1061,7 @@ def get_long_running_output(pipeline_response): ) def _delete_initial(self, resource_group_name: str, account_name: str, **kwargs: Any) -> Iterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1188,7 +1188,7 @@ def list_by_resource_group(self, resource_group_name: str, **kwargs: Any) -> Ite cls: ClsType[List[_models.CodeSigningAccount]] = kwargs.pop("cls", None) - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1273,7 +1273,7 @@ def list_by_subscription(self, **kwargs: Any) -> Iterable["_models.CodeSigningAc cls: ClsType[List[_models.CodeSigningAccount]] = kwargs.pop("cls", None) - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1409,7 +1409,7 @@ def check_name_availability( :rtype: ~azure.mgmt.trustedsigning.models.CheckNameAvailabilityResult :raises ~azure.core.exceptions.HttpResponseError: """ - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1505,7 +1505,7 @@ def get( :rtype: ~azure.mgmt.trustedsigning.models.CertificateProfile :raises ~azure.core.exceptions.HttpResponseError: """ - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1567,7 +1567,7 @@ def _create_initial( resource: Union[_models.CertificateProfile, JSON, IO[bytes]], **kwargs: Any ) -> Iterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1806,7 +1806,7 @@ def get_long_running_output(pipeline_response): def _delete_initial( self, resource_group_name: str, account_name: str, profile_name: str, **kwargs: Any ) -> Iterator[bytes]: - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -1943,7 +1943,7 @@ def list_by_code_signing_account( cls: ClsType[List[_models.CertificateProfile]] = kwargs.pop("cls", None) - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, @@ -2017,7 +2017,7 @@ def get_next(next_link=None): return ItemPaged(get_next, extract_data) @overload - def revoke_certificate( # pylint: disable=inconsistent-return-statements + def revoke_certificate( self, resource_group_name: str, account_name: str, @@ -2047,7 +2047,7 @@ def revoke_certificate( # pylint: disable=inconsistent-return-statements """ @overload - def revoke_certificate( # pylint: disable=inconsistent-return-statements + def revoke_certificate( self, resource_group_name: str, account_name: str, @@ -2077,7 +2077,7 @@ def revoke_certificate( # pylint: disable=inconsistent-return-statements """ @overload - def revoke_certificate( # pylint: disable=inconsistent-return-statements + def revoke_certificate( self, resource_group_name: str, account_name: str, @@ -2131,7 +2131,7 @@ def revoke_certificate( # pylint: disable=inconsistent-return-statements :rtype: None :raises ~azure.core.exceptions.HttpResponseError: """ - error_map: MutableMapping[int, Type[HttpResponseError]] = { # pylint: disable=unsubscriptable-object + error_map: MutableMapping = { 401: ClientAuthenticationError, 404: ResourceNotFoundError, 409: ResourceExistsError, diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_create.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_create.py index 452f46c609b7..40344a080f63 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_create.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_create.py @@ -46,6 +46,6 @@ def main(): print(response) -# x-ms-original-file: 2024-02-05-preview/CertificateProfiles_Create.json +# x-ms-original-file: 2024-11-15/CertificateProfiles_Create.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_delete.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_delete.py index 5bcb4e7ac485..131809f8ba0b 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_delete.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_delete.py @@ -37,6 +37,6 @@ def main(): ).result() -# x-ms-original-file: 2024-02-05-preview/CertificateProfiles_Delete.json +# x-ms-original-file: 2024-11-15/CertificateProfiles_Delete.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_get.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_get.py index 0095591c96fd..fc959d45b9bb 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_get.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_get.py @@ -38,6 +38,6 @@ def main(): print(response) -# x-ms-original-file: 2024-02-05-preview/CertificateProfiles_Get.json +# x-ms-original-file: 2024-11-15/CertificateProfiles_Get.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_list_by_code_signing_account.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_list_by_code_signing_account.py index 823435168cdd..7740ee672fe8 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_list_by_code_signing_account.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_list_by_code_signing_account.py @@ -38,6 +38,6 @@ def main(): print(item) -# x-ms-original-file: 2024-02-05-preview/CertificateProfiles_ListByCodeSigningAccount.json +# x-ms-original-file: 2024-11-15/CertificateProfiles_ListByCodeSigningAccount.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_revoke_certificate.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_revoke_certificate.py index c107c8a0f788..e58a15cda93a 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_revoke_certificate.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/certificate_profiles_revoke_certificate.py @@ -44,6 +44,6 @@ def main(): ) -# x-ms-original-file: 2024-02-05-preview/CertificateProfiles_RevokeCertificate.json +# x-ms-original-file: 2024-11-15/CertificateProfiles_RevokeCertificate.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_check_name_availability.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_check_name_availability.py index 550c3cc0d816..7aaa10310772 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_check_name_availability.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_check_name_availability.py @@ -36,6 +36,6 @@ def main(): print(response) -# x-ms-original-file: 2024-02-05-preview/CodeSigningAccounts_CheckNameAvailability.json +# x-ms-original-file: 2024-11-15/CodeSigningAccounts_CheckNameAvailability.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_create.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_create.py index d6893a999864..268fc4947bc1 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_create.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_create.py @@ -38,6 +38,6 @@ def main(): print(response) -# x-ms-original-file: 2024-02-05-preview/CodeSigningAccounts_Create.json +# x-ms-original-file: 2024-11-15/CodeSigningAccounts_Create.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_delete.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_delete.py index feea1b78a65d..ce78032e1ff7 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_delete.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_delete.py @@ -36,6 +36,6 @@ def main(): ).result() -# x-ms-original-file: 2024-02-05-preview/CodeSigningAccounts_Delete.json +# x-ms-original-file: 2024-11-15/CodeSigningAccounts_Delete.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_get.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_get.py index 9bb3b124c18b..632280ee74f7 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_get.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_get.py @@ -37,6 +37,6 @@ def main(): print(response) -# x-ms-original-file: 2024-02-05-preview/CodeSigningAccounts_Get.json +# x-ms-original-file: 2024-11-15/CodeSigningAccounts_Get.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_list_by_resource_group.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_list_by_resource_group.py index f9980b3f150e..bba46d87311a 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_list_by_resource_group.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_list_by_resource_group.py @@ -37,6 +37,6 @@ def main(): print(item) -# x-ms-original-file: 2024-02-05-preview/CodeSigningAccounts_ListByResourceGroup.json +# x-ms-original-file: 2024-11-15/CodeSigningAccounts_ListByResourceGroup.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_list_by_subscription.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_list_by_subscription.py index 6be993764b5e..5f0c3d3aaf18 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_list_by_subscription.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_list_by_subscription.py @@ -35,6 +35,6 @@ def main(): print(item) -# x-ms-original-file: 2024-02-05-preview/CodeSigningAccounts_ListBySubscription.json +# x-ms-original-file: 2024-11-15/CodeSigningAccounts_ListBySubscription.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_update.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_update.py index 59c51a2706b7..86ac2f05c476 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_update.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/code_signing_accounts_update.py @@ -38,6 +38,6 @@ def main(): print(response) -# x-ms-original-file: 2024-02-05-preview/CodeSigningAccounts_Update.json +# x-ms-original-file: 2024-11-15/CodeSigningAccounts_Update.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/operations_list.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/operations_list.py index 0a3aa8c103c2..2fd64846d08f 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/operations_list.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_samples/operations_list.py @@ -35,6 +35,6 @@ def main(): print(item) -# x-ms-original-file: 2024-02-05-preview/Operations_List.json +# x-ms-original-file: 2024-11-15/Operations_List.json if __name__ == "__main__": main() diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_tests/test_trusted_signing_mgmt_certificate_profiles_operations.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_tests/test_trusted_signing_mgmt_certificate_profiles_operations.py index ff713fa8d97e..dabdfc944a48 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_tests/test_trusted_signing_mgmt_certificate_profiles_operations.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_tests/test_trusted_signing_mgmt_certificate_profiles_operations.py @@ -41,10 +41,12 @@ def test_certificate_profiles_begin_create(self, resource_group): "id": "str", "name": "str", "properties": { + "identityValidationId": "str", "profileType": "str", "certificates": [ { "createdDate": "str", + "enhancedKeyUsage": "str", "expiryDate": "str", "revocation": { "effectiveAt": "2020-02-20 00:00:00", @@ -60,23 +62,13 @@ def test_certificate_profiles_begin_create(self, resource_group): "thumbprint": "str", } ], - "city": "str", - "commonName": "str", - "country": "str", - "enhancedKeyUsage": "str", - "identityValidationId": "str", "includeCity": bool, "includeCountry": bool, "includePostalCode": bool, "includeState": bool, "includeStreetAddress": bool, - "organization": "str", - "organizationUnit": "str", - "postalCode": "str", "provisioningState": "str", - "state": "str", "status": "str", - "streetAddress": "str", }, "systemData": { "createdAt": "2020-02-20 00:00:00", diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_tests/test_trusted_signing_mgmt_certificate_profiles_operations_async.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_tests/test_trusted_signing_mgmt_certificate_profiles_operations_async.py index c22949336676..b00ef3d2f86c 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_tests/test_trusted_signing_mgmt_certificate_profiles_operations_async.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/generated_tests/test_trusted_signing_mgmt_certificate_profiles_operations_async.py @@ -43,10 +43,12 @@ async def test_certificate_profiles_begin_create(self, resource_group): "id": "str", "name": "str", "properties": { + "identityValidationId": "str", "profileType": "str", "certificates": [ { "createdDate": "str", + "enhancedKeyUsage": "str", "expiryDate": "str", "revocation": { "effectiveAt": "2020-02-20 00:00:00", @@ -62,23 +64,13 @@ async def test_certificate_profiles_begin_create(self, resource_group): "thumbprint": "str", } ], - "city": "str", - "commonName": "str", - "country": "str", - "enhancedKeyUsage": "str", - "identityValidationId": "str", "includeCity": bool, "includeCountry": bool, "includePostalCode": bool, "includeState": bool, "includeStreetAddress": bool, - "organization": "str", - "organizationUnit": "str", - "postalCode": "str", "provisioningState": "str", - "state": "str", "status": "str", - "streetAddress": "str", }, "systemData": { "createdAt": "2020-02-20 00:00:00", diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_code_signing_accounts_operations_async_test.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_code_signing_accounts_operations_async_test.py index cf1fc68ae9d5..bc951803a0a7 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_code_signing_accounts_operations_async_test.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_code_signing_accounts_operations_async_test.py @@ -27,7 +27,6 @@ async def test_code_signing_accounts_list_by_resource_group(self, resource_group ) result = [r async for r in response] assert result == [] - @RandomNameResourceGroupPreparer(location=AZURE_LOCATION) @recorded_by_proxy_async diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_code_signing_accounts_operations_test.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_code_signing_accounts_operations_test.py index c43053671d30..208341a6b20f 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_code_signing_accounts_operations_test.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_code_signing_accounts_operations_test.py @@ -26,7 +26,6 @@ def test_code_signing_accounts_list_by_resource_group(self, resource_group): ) result = [r for r in response] assert result == [] - @RandomNameResourceGroupPreparer(location=AZURE_LOCATION) @recorded_by_proxy @@ -34,4 +33,3 @@ def test_code_signing_accounts_list_by_subscription(self, resource_group): response = self.client.code_signing_accounts.list_by_subscription() result = [r for r in response] assert response - \ No newline at end of file diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_operations_async_test.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_operations_async_test.py index 9a1e504e192f..3c2ea6c7a829 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_operations_async_test.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_operations_async_test.py @@ -25,4 +25,3 @@ async def test_operations_list(self, resource_group): response = self.client.operations.list() result = [r async for r in response] assert result - diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_operations_test.py b/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_operations_test.py index da6e33b7236d..d70823986d33 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_operations_test.py +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/tests/test_trusted_signing_mgmt_operations_test.py @@ -24,4 +24,3 @@ def test_operations_list(self, resource_group): response = self.client.operations.list() result = [r for r in response] assert result - diff --git a/sdk/trustedsigning/azure-mgmt-trustedsigning/tsp-location.yaml b/sdk/trustedsigning/azure-mgmt-trustedsigning/tsp-location.yaml index 5b1fd4dd2136..7b0ec52a1fe4 100644 --- a/sdk/trustedsigning/azure-mgmt-trustedsigning/tsp-location.yaml +++ b/sdk/trustedsigning/azure-mgmt-trustedsigning/tsp-location.yaml @@ -1,4 +1,4 @@ directory: specification/codesigning/CodeSigning.Management -commit: e6fde2ac19d0202f0e72217a3e0f9edb63dba273 +commit: bf769c40da6f81caee348c6bfcb4eae2331b3296 repo: Azure/azure-rest-api-specs additionalDirectories: