Skip to content

Commit 318a0bd

Browse files
authored
Auto generation supports inheritance by base type in metadata (#89)
* Auto generation supports inheritance by base type in metadata * cleanup
1 parent 35a17ba commit 318a0bd

File tree

24 files changed

+3258
-2927
lines changed

24 files changed

+3258
-2927
lines changed

generated/microsoftgraph/microsoft.graph/beta/types.json

Lines changed: 49 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,6 @@
1414
"$type": "ObjectType",
1515
"name": "Microsoft.Graph/groups",
1616
"properties": {
17-
"id": {
18-
"type": {
19-
"$ref": "#/0"
20-
},
21-
"flags": 10,
22-
"description": "The resource id"
23-
},
2417
"type": {
2518
"type": {
2619
"$ref": "#/1"
@@ -286,13 +279,6 @@
286279
"flags": 0,
287280
"description": "Specifies whether or not a group is configured to write back group object properties to on-premises Active Directory. These properties are used when group writeback is configured in the Microsoft Entra Connect sync client."
288281
},
289-
"deletedDateTime": {
290-
"type": {
291-
"$ref": "#/0"
292-
},
293-
"flags": 2,
294-
"description": "Date and time when this object was deleted. Always null when the object hasn't been deleted."
295-
},
296282
"members": {
297283
"type": {
298284
"$ref": "#/15"
@@ -306,6 +292,20 @@
306292
},
307293
"flags": 0,
308294
"description": "The owners of the group who can be users or service principals. Nullable. If this property isn't specified when creating a Microsoft 365 group, the calling user is automatically assigned as the group owner"
295+
},
296+
"deletedDateTime": {
297+
"type": {
298+
"$ref": "#/0"
299+
},
300+
"flags": 2,
301+
"description": "Date and time when this object was deleted. Always null when the object hasn't been deleted."
302+
},
303+
"id": {
304+
"type": {
305+
"$ref": "#/0"
306+
},
307+
"flags": 2,
308+
"description": "The unique identifier for an entity. Read-only."
309309
}
310310
}
311311
},
@@ -468,13 +468,6 @@
468468
"$type": "ObjectType",
469469
"name": "Microsoft.Graph/applications",
470470
"properties": {
471-
"id": {
472-
"type": {
473-
"$ref": "#/0"
474-
},
475-
"flags": 10,
476-
"description": "The resource id"
477-
},
478471
"type": {
479472
"type": {
480473
"$ref": "#/18"
@@ -747,6 +740,13 @@
747740
},
748741
"flags": 2,
749742
"description": "Date and time when this object was deleted. Always null when the object hasn't been deleted."
743+
},
744+
"id": {
745+
"type": {
746+
"$ref": "#/0"
747+
},
748+
"flags": 2,
749+
"description": "The unique identifier for an entity. Read-only."
750750
}
751751
}
752752
},
@@ -1671,13 +1671,6 @@
16711671
"$type": "ObjectType",
16721672
"name": "Microsoft.Graph/servicePrincipals",
16731673
"properties": {
1674-
"id": {
1675-
"type": {
1676-
"$ref": "#/0"
1677-
},
1678-
"flags": 10,
1679-
"description": "The resource id"
1680-
},
16811674
"type": {
16821675
"type": {
16831676
"$ref": "#/71"
@@ -1943,6 +1936,13 @@
19431936
},
19441937
"flags": 2,
19451938
"description": "Date and time when this object was deleted. Always null when the object hasn't been deleted."
1939+
},
1940+
"id": {
1941+
"type": {
1942+
"$ref": "#/0"
1943+
},
1944+
"flags": 2,
1945+
"description": "The unique identifier for an entity. Read-only."
19461946
}
19471947
}
19481948
},
@@ -2090,13 +2090,6 @@
20902090
"$type": "ObjectType",
20912091
"name": "Microsoft.Graph/applications/federatedIdentityCredentials",
20922092
"properties": {
2093-
"id": {
2094-
"type": {
2095-
"$ref": "#/0"
2096-
},
2097-
"flags": 10,
2098-
"description": "The resource id"
2099-
},
21002093
"type": {
21012094
"type": {
21022095
"$ref": "#/89"
@@ -2145,6 +2138,13 @@
21452138
},
21462139
"flags": 1,
21472140
"description": "Required. The identifier of the external software workload within the external identity provider. Like the audience value, it has no fixed format, as each identity provider uses their own - sometimes a GUID, sometimes a colon delimited identifier, sometimes arbitrary strings. The value here must match the sub claim within the token presented to Microsoft Entra ID. The combination of issuer and subject must be unique on the app. It has a limit of 600 characters"
2141+
},
2142+
"id": {
2143+
"type": {
2144+
"$ref": "#/0"
2145+
},
2146+
"flags": 2,
2147+
"description": "The unique identifier for an entity. Read-only."
21482148
}
21492149
}
21502150
},
@@ -2175,13 +2175,6 @@
21752175
"$type": "ObjectType",
21762176
"name": "Microsoft.Graph/oauth2PermissionGrants",
21772177
"properties": {
2178-
"id": {
2179-
"type": {
2180-
"$ref": "#/0"
2181-
},
2182-
"flags": 10,
2183-
"description": "The resource id"
2184-
},
21852178
"type": {
21862179
"type": {
21872180
"$ref": "#/94"
@@ -2230,6 +2223,13 @@
22302223
},
22312224
"flags": 0,
22322225
"description": "A space-separated list of the claim values for delegated permissions that should be included in access tokens for the resource application (the API). For example, openid User.Read GroupMember.Read.All. Each claim value should match the value field of one of the delegated permissions defined by the API, listed in the publishedPermissionScopes property of the resource service principal. Must not exceed 3850 characters in length."
2226+
},
2227+
"id": {
2228+
"type": {
2229+
"$ref": "#/0"
2230+
},
2231+
"flags": 2,
2232+
"description": "The unique identifier for an entity. Read-only."
22332233
}
22342234
}
22352235
},
@@ -2254,13 +2254,6 @@
22542254
"$type": "ObjectType",
22552255
"name": "Microsoft.Graph/appRoleAssignedTo",
22562256
"properties": {
2257-
"id": {
2258-
"type": {
2259-
"$ref": "#/0"
2260-
},
2261-
"flags": 10,
2262-
"description": "The resource id"
2263-
},
22642257
"type": {
22652258
"type": {
22662259
"$ref": "#/98"
@@ -2323,6 +2316,13 @@
23232316
},
23242317
"flags": 1,
23252318
"description": "The unique identifier (id) for the resource service principal for which the assignment is made. Required on create"
2319+
},
2320+
"id": {
2321+
"type": {
2322+
"$ref": "#/0"
2323+
},
2324+
"flags": 2,
2325+
"description": "The unique identifier for an entity. Read-only."
23262326
}
23272327
}
23282328
},

generated/microsoftgraph/microsoft.graph/beta/types.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
* **disabledByMicrosoftStatus**: string: Specifies whether Microsoft has disabled the registered application. Possible values are: null (default value), NotDisabled, and DisabledDueToViolationOfServicesAgreement (reasons may include suspicious, abusive, or malicious activity, or a violation of the Microsoft Services Agreement)
1717
* **displayName**: string (Required): The display name for the application
1818
* **groupMembershipClaims**: string: Configures the groups claim issued in a user or OAuth 2.0 access token that the application expects. To set this attribute, use one of the following string values: None, SecurityGroup (for security groups and Microsoft Entra roles), All (this gets all security groups, distribution groups, and Microsoft Entra directory roles that the signed-in user is a member of).
19-
* **id**: string (ReadOnly, DeployTimeConstant): The resource id
19+
* **id**: string (ReadOnly): The unique identifier for an entity. Read-only.
2020
* **identifierUris**: string[]: Also known as App ID URI, this value is set when an application is used as a resource app. The identifierUris acts as the prefix for the scopes you reference in your API's code, and it must be globally unique. You can use the default value provided, which is in the form api://<application-client-id>, or specify a more readable URI like https://contoso.com/api. For more information on valid identifierUris patterns and best practices, see Microsoft Entra application registration security best practices. Not nullable
2121
* **info**: [MicrosoftGraphInformationalUrl](#microsoftgraphinformationalurl): Basic profile information of the application, such as it's marketing, support, terms of service, and privacy statement URLs. The terms of service and privacy statement are surfaced to users through the user consent experience. For more information, see How to: Add Terms of service and privacy statement for registered Microsoft Entra apps
2222
* **isDeviceOnlyAuthSupported**: bool: Specifies whether this application supports device authentication without a user. The default is false.
@@ -50,7 +50,7 @@
5050
* **apiVersion**: 'beta' (ReadOnly, DeployTimeConstant): The resource api version
5151
* **audiences**: string[] (Required): The audience that can appear in the external token. This field is mandatory and should be set to api://AzureADTokenExchange for Microsoft Entra ID. It says what Microsoft identity platform should accept in the aud claim in the incoming token. This value represents Microsoft Entra ID in your external identity provider and has no fixed value across identity providers - you may need to create a new application registration in your identity provider to serve as the audience of this token. This field can only accept a single value and has a limit of 600 characters. Required.
5252
* **description**: string: The un-validated, user-provided description of the federated identity credential. It has a limit of 600 characters. Optional.
53-
* **id**: string (ReadOnly, DeployTimeConstant): The resource id
53+
* **id**: string (ReadOnly): The unique identifier for an entity. Read-only.
5454
* **issuer**: string (Required): The URL of the external identity provider and must match the issuer claim of the external token being exchanged. The combination of the values of issuer and subject must be unique on the app. It has a limit of 600 characters. Required.
5555
* **name**: string (Required): The unique identifier for the federated identity credential, which has a limit of 120 characters and must be URL friendly. It is immutable once created. Alternate key. Required. Not nullable
5656
* **subject**: string (Required): Required. The identifier of the external software workload within the external identity provider. Like the audience value, it has no fixed format, as each identity provider uses their own - sometimes a GUID, sometimes a colon delimited identifier, sometimes arbitrary strings. The value here must match the sub claim within the token presented to Microsoft Entra ID. The combination of issuer and subject must be unique on the app. It has a limit of 600 characters
@@ -62,7 +62,7 @@
6262
* **apiVersion**: 'beta' (ReadOnly, DeployTimeConstant): The resource api version
6363
* **appRoleId**: string {minLength: 36, maxLength: 36, pattern: "^[0-9a-fA-F]{8}-([0-9a-fA-F]{4}-){3}[0-9a-fA-F]{12}$"} (Required): The identifier (id) for the app role which is assigned to the principal. This app role must be exposed in the appRoles property on the resource application's service principal (resourceId). If the resource application has not declared any app roles, a default app role ID of 00000000-0000-0000-0000-000000000000 can be specified to signal that the principal is assigned to the resource app without any specific app roles. Required on create.
6464
* **creationTimestamp**: string (ReadOnly): The time when the app role assignment was created. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Read-only.
65-
* **id**: string (ReadOnly, DeployTimeConstant): The resource id
65+
* **id**: string (ReadOnly): The unique identifier for an entity. Read-only.
6666
* **principalDisplayName**: string (ReadOnly): The display name of the user, group, or service principal that was granted the app role assignment. Read-only
6767
* **principalId**: string {minLength: 36, maxLength: 36, pattern: "^[0-9a-fA-F]{8}-([0-9a-fA-F]{4}-){3}[0-9a-fA-F]{12}$"} (Required): The unique identifier (id) for the user, security group, or service principal being granted the app role. Security groups with dynamic memberships are supported. Required on create.
6868
* **principalType**: string (ReadOnly): The type of the assigned principal. This can either be User, Group, or ServicePrincipal. Read-only.
@@ -82,7 +82,7 @@
8282
* **displayName**: string (Required): The display name for the group. Required. Maximum length is 256 characters
8383
* **expirationDateTime**: string (ReadOnly): Timestamp of when the group is set to expire. It is null for security groups, but for Microsoft 365 groups, it represents when the group is set to expire as defined in the groupLifecyclePolicy. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Read-only.
8484
* **groupTypes**: string[]: Specifies the group type and its membership. If the collection contains Unified, the group is a Microsoft 365 group; otherwise, it's either a security group or a distribution group. For details, see groups overview.If the collection includes DynamicMembership, the group has dynamic membership; otherwise, membership is static
85-
* **id**: string (ReadOnly, DeployTimeConstant): The resource id
85+
* **id**: string (ReadOnly): The unique identifier for an entity. Read-only.
8686
* **infoCatalogs**: string[]: Identifies the info segments assigned to the group
8787
* **isAssignableToRole**: bool: Indicates whether this group can be assigned to a Microsoft Entra role. Optional. This property can only be set while creating the group and is immutable. If set to true, the securityEnabled property must also be set to true, visibility must be Hidden, and the group cannot be a dynamic group (that is, groupTypes can't contain DynamicMembership). Only callers in Global Administrator and Privileged Role Administrator roles can set this property. The caller must also be assigned the RoleManagement.ReadWrite.Directory permission to set this property or update the membership of such groups. For more, see Using a group to manage Microsoft Entra role assignmentsUsing this feature requires a Microsoft Entra ID P1 license
8888
* **isManagementRestricted**: bool (ReadOnly): Indicates whether the group is a member of a restricted management administrative unit, in which case it requires a role scoped to the restricted administrative unit to manage. The default value is false. Read-only. To manage a group member of a restricted administrative unit, the calling app must be assigned the Directory.Write.Restricted permission. For delegated scenarios, the administrators must also be explicitly assigned supported roles at the restricted administrative unit scope.
@@ -122,7 +122,7 @@
122122
* **apiVersion**: 'beta' (ReadOnly, DeployTimeConstant): The resource api version
123123
* **clientId**: string (Required): The object id (not appId) of the client service principal for the application that is authorized to act on behalf of a signed-in user when accessing an API. Required
124124
* **consentType**: string (Required): Indicates whether authorization is granted for the client application to impersonate all users or only a specific user. AllPrincipals indicates authorization to impersonate all users. Principal indicates authorization to impersonate a specific user. Consent on behalf of all users can be granted by an administrator. Nonadmin users may be authorized to consent on behalf of themselves in some cases, for some delegated permissions. Required
125-
* **id**: string (ReadOnly, DeployTimeConstant): The resource id
125+
* **id**: string (ReadOnly): The unique identifier for an entity. Read-only.
126126
* **principalId**: string: The id of the user on behalf of whom the client is authorized to access the resource, when consentType is Principal. If consentType is AllPrincipals this value is null. Required when consentType is Principal
127127
* **resourceId**: string (Required): The id of the resource service principal to which access is authorized. This identifies the API that the client is authorized to attempt to call on behalf of a signed-in user
128128
* **scope**: string: A space-separated list of the claim values for delegated permissions that should be included in access tokens for the resource application (the API). For example, openid User.Read GroupMember.Read.All. Each claim value should match the value field of one of the delegated permissions defined by the API, listed in the publishedPermissionScopes property of the resource service principal. Must not exceed 3850 characters in length.
@@ -147,7 +147,7 @@
147147
* **disabledByMicrosoftStatus**: string: Specifies whether Microsoft has disabled the registered application. Possible values are: null (default value), NotDisabled, and DisabledDueToViolationOfServicesAgreement (reasons may include suspicious, abusive, or malicious activity, or a violation of the Microsoft Services Agreement)
148148
* **displayName**: string: The display name for the service principal
149149
* **homepage**: string: Home page or landing page of the application.
150-
* **id**: string (ReadOnly, DeployTimeConstant): The resource id
150+
* **id**: string (ReadOnly): The unique identifier for an entity. Read-only.
151151
* **info**: [MicrosoftGraphInformationalUrl](#microsoftgraphinformationalurl): Basic profile information of the acquired application such as app's marketing, support, terms of service and privacy statement URLs. The terms of service and privacy statement are surfaced to users through the user consent experience. For more info, see How to: Add Terms of service and privacy statement for registered Microsoft Entra apps
152152
* **keyCredentials**: [MicrosoftGraphKeyCredential](#microsoftgraphkeycredential)[]: The collection of key credentials associated with the service principal. Not nullable
153153
* **loginUrl**: string: Specifies the URL where the service provider redirects the user to Microsoft Entra ID to authenticate. Microsoft Entra ID uses the URL to launch the application from Microsoft 365 or the Microsoft Entra My Apps. When blank, Microsoft Entra ID performs IdP-initiated sign-on for applications configured with SAML-based single sign-on. The user launches the application from Microsoft 365, the Microsoft Entra My Apps, or the Microsoft Entra SSO URL.

0 commit comments

Comments
 (0)