Skip to content

Commit

Permalink
Fix ARM Errors and update the swagger files. (#12293)
Browse files Browse the repository at this point in the history
* Fix ARM Errors and update the swagger files.

* update

* update import export spec file.

* remove import/export from v2 and v1

in the original pr: 99b5b0c
the import export APIs were only added to v3.

* update import export spec file.

* separate db import export from this PR.

* revert importdatabases
  • Loading branch information
ericshape authored Jan 14, 2021
1 parent 3549ce3 commit 3ea560a
Show file tree
Hide file tree
Showing 41 changed files with 687 additions and 310 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -643,7 +643,7 @@
"type": "integer"
},
"state": {
"description": "Specifies the state of the policy. If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled are required.",
"description": "Specifies the state of the audit. If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled are required.",
"enum": [
"Enabled",
"Disabled"
Expand All @@ -661,6 +661,7 @@
"storageAccountAccessKey": {
"description": "Specifies the identifier key of the auditing storage account. \r\nIf state is Enabled and storageEndpoint is specified, not specifying the storageAccountAccessKey will use SQL server system-assigned managed identity to access the storage.\r\nPrerequisites for using managed identity authentication:\r\n1. Assign SQL Server a system-assigned managed identity in Azure Active Directory (AAD).\r\n2. Grant SQL Server identity access to the storage account by adding 'Storage Blob Data Contributor' RBAC role to the server identity.\r\nFor more information, see [Auditing to storage using Managed Identity authentication](https://go.microsoft.com/fwlink/?linkid=2114355)",
"type": "string",
"x-ms-secret": true,
"x-ms-mutability": [
"create",
"update"
Expand Down Expand Up @@ -749,7 +750,7 @@
"type": "integer"
},
"state": {
"description": "Specifies the state of the policy. If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled are required.",
"description": "Specifies the state of the audit. If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled are required.",
"enum": [
"Enabled",
"Disabled"
Expand All @@ -767,6 +768,7 @@
"storageAccountAccessKey": {
"description": "Specifies the identifier key of the auditing storage account. \r\nIf state is Enabled and storageEndpoint is specified, not specifying the storageAccountAccessKey will use SQL server system-assigned managed identity to access the storage.\r\nPrerequisites for using managed identity authentication:\r\n1. Assign SQL Server a system-assigned managed identity in Azure Active Directory (AAD).\r\n2. Grant SQL Server identity access to the storage account by adding 'Storage Blob Data Contributor' RBAC role to the server identity.\r\nFor more information, see [Auditing to storage using Managed Identity authentication](https://go.microsoft.com/fwlink/?linkid=2114355)",
"type": "string",
"x-ms-secret": true,
"x-ms-mutability": [
"create",
"update"
Expand Down Expand Up @@ -851,7 +853,7 @@
"type": "integer"
},
"state": {
"description": "Specifies the state of the policy. If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled are required.",
"description": "Specifies the state of the audit. If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled are required.",
"enum": [
"Enabled",
"Disabled"
Expand All @@ -869,6 +871,7 @@
"storageAccountAccessKey": {
"description": "Specifies the identifier key of the auditing storage account. \r\nIf state is Enabled and storageEndpoint is specified, not specifying the storageAccountAccessKey will use SQL server system-assigned managed identity to access the storage.\r\nPrerequisites for using managed identity authentication:\r\n1. Assign SQL Server a system-assigned managed identity in Azure Active Directory (AAD).\r\n2. Grant SQL Server identity access to the storage account by adding 'Storage Blob Data Contributor' RBAC role to the server identity.\r\nFor more information, see [Auditing to storage using Managed Identity authentication](https://go.microsoft.com/fwlink/?linkid=2114355)",
"type": "string",
"x-ms-secret": true,
"x-ms-mutability": [
"create",
"update"
Expand Down Expand Up @@ -949,7 +952,7 @@
"type": "integer"
},
"state": {
"description": "Specifies the state of the policy. If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled are required.",
"description": "Specifies the state of the audit. If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled are required.",
"enum": [
"Enabled",
"Disabled"
Expand All @@ -967,6 +970,7 @@
"storageAccountAccessKey": {
"description": "Specifies the identifier key of the auditing storage account. \r\nIf state is Enabled and storageEndpoint is specified, not specifying the storageAccountAccessKey will use SQL server system-assigned managed identity to access the storage.\r\nPrerequisites for using managed identity authentication:\r\n1. Assign SQL Server a system-assigned managed identity in Azure Active Directory (AAD).\r\n2. Grant SQL Server identity access to the storage account by adding 'Storage Blob Data Contributor' RBAC role to the server identity.\r\nFor more information, see [Auditing to storage using Managed Identity authentication](https://go.microsoft.com/fwlink/?linkid=2114355)",
"type": "string",
"x-ms-secret": true,
"x-ms-mutability": [
"create",
"update"
Expand Down

Large diffs are not rendered by default.

Loading

0 comments on commit 3ea560a

Please sign in to comment.