Skip to content

Commit

Permalink
Generated from 441e55a02c28c282d76dea99e191bd926d0811a2
Browse files Browse the repository at this point in the history
  • Loading branch information
SDK Automation committed Sep 21, 2020
1 parent 4df82e4 commit 3d7846e
Show file tree
Hide file tree
Showing 42 changed files with 3,440 additions and 270 deletions.
6 changes: 4 additions & 2 deletions sdk/sql/mgmt-v2015_05_01_preview/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -11,8 +11,8 @@
<parent>
<groupId>com.microsoft.azure</groupId>
<artifactId>azure-arm-parent</artifactId>
<version>1.2.0</version>
<relativePath>../../parents/azure-arm-parent</relativePath>
<version>1.1.0</version>
<relativePath>../../../pom.management.xml</relativePath>
</parent>
<artifactId>azure-mgmt-sql</artifactId>
<version>1.0.0-beta</version>
Expand Down Expand Up @@ -71,6 +71,8 @@
<artifactId>azure-arm-client-runtime</artifactId>
<type>test-jar</type>
<scope>test</scope>
<!--Below version for test jar needs to be removed, this will be done as part of v1-runtime 1.6.7-->
<version>1.6.5</version>
</dependency>
</dependencies>
<build>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,4 +28,15 @@ public interface DatabaseBlobAuditingPolicies extends SupportsCreating<DatabaseB
*/
Observable<DatabaseBlobAuditingPolicy> getAsync(String resourceGroupName, String serverName, String databaseName);

/**
* Lists auditing settings of a database.
*
* @param resourceGroupName The name of the resource group that contains the resource. You can obtain this value from the Azure Resource Manager API or the portal.
* @param serverName The name of the server.
* @param databaseName The name of the database.
* @throws IllegalArgumentException thrown if parameters fail the validation
* @return the observable for the request
*/
Observable<DatabaseBlobAuditingPolicy> listByDatabaseAsync(final String resourceGroupName, final String serverName, final String databaseName);

}
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,11 @@ public interface DatabaseBlobAuditingPolicy extends HasInner<DatabaseBlobAuditin
*/
String name();

/**
* @return the queueDelayMs value.
*/
Integer queueDelayMs();

/**
* @return the retentionDays value.
*/
Expand Down Expand Up @@ -189,7 +194,7 @@ interface WithIsAzureMonitorTargetEnabled {
/**
* Specifies isAzureMonitorTargetEnabled.
* @param isAzureMonitorTargetEnabled Specifies whether audit events are sent to Azure Monitor.
In order to send the events to Azure Monitor, specify 'State' as 'Enabled' and 'IsAzureMonitorTargetEnabled' as true.
In order to send the events to Azure Monitor, specify 'state' as 'Enabled' and 'isAzureMonitorTargetEnabled' as true.
When using REST API to configure auditing, Diagnostic Settings with 'SQLSecurityAuditEvents' diagnostic logs category on the database should be also created.
Note that for server level audit you should use the 'master' database as {databaseName}.
Diagnostic Settings URI format:
Expand All @@ -213,6 +218,19 @@ interface WithIsStorageSecondaryKeyInUse {
WithCreate withIsStorageSecondaryKeyInUse(Boolean isStorageSecondaryKeyInUse);
}

/**
* The stage of the databaseblobauditingpolicy definition allowing to specify QueueDelayMs.
*/
interface WithQueueDelayMs {
/**
* Specifies queueDelayMs.
* @param queueDelayMs Specifies the amount of time in milliseconds that can elapse before audit actions are forced to be processed.
The default minimum value is 1000 (1 second). The maximum is 2,147,483,647
* @return the next definition stage
*/
WithCreate withQueueDelayMs(Integer queueDelayMs);
}

/**
* The stage of the databaseblobauditingpolicy definition allowing to specify RetentionDays.
*/
Expand All @@ -231,7 +249,12 @@ interface WithRetentionDays {
interface WithStorageAccountAccessKey {
/**
* Specifies storageAccountAccessKey.
* @param storageAccountAccessKey Specifies the identifier key of the auditing storage account. If state is Enabled and storageEndpoint is specified, storageAccountAccessKey is required
* @param storageAccountAccessKey Specifies the identifier key of the auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the storageAccountAccessKey will use SQL server system-assigned managed identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding 'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
* @return the next definition stage
*/
WithCreate withStorageAccountAccessKey(String storageAccountAccessKey);
Expand All @@ -255,7 +278,7 @@ interface WithStorageAccountSubscriptionId {
interface WithStorageEndpoint {
/**
* Specifies storageEndpoint.
* @param storageEndpoint Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). If state is Enabled, storageEndpoint is required
* @param storageEndpoint Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled is required
* @return the next definition stage
*/
WithCreate withStorageEndpoint(String storageEndpoint);
Expand All @@ -266,13 +289,13 @@ interface WithStorageEndpoint {
* the resource to be created (via {@link WithCreate#create()}), but also allows
* for any other optional settings to be specified.
*/
interface WithCreate extends Creatable<DatabaseBlobAuditingPolicy>, DefinitionStages.WithAuditActionsAndGroups, DefinitionStages.WithIsAzureMonitorTargetEnabled, DefinitionStages.WithIsStorageSecondaryKeyInUse, DefinitionStages.WithRetentionDays, DefinitionStages.WithStorageAccountAccessKey, DefinitionStages.WithStorageAccountSubscriptionId, DefinitionStages.WithStorageEndpoint {
interface WithCreate extends Creatable<DatabaseBlobAuditingPolicy>, DefinitionStages.WithAuditActionsAndGroups, DefinitionStages.WithIsAzureMonitorTargetEnabled, DefinitionStages.WithIsStorageSecondaryKeyInUse, DefinitionStages.WithQueueDelayMs, DefinitionStages.WithRetentionDays, DefinitionStages.WithStorageAccountAccessKey, DefinitionStages.WithStorageAccountSubscriptionId, DefinitionStages.WithStorageEndpoint {
}
}
/**
* The template for a DatabaseBlobAuditingPolicy update operation, containing all the settings that can be modified.
*/
interface Update extends Appliable<DatabaseBlobAuditingPolicy>, UpdateStages.WithAuditActionsAndGroups, UpdateStages.WithIsAzureMonitorTargetEnabled, UpdateStages.WithIsStorageSecondaryKeyInUse, UpdateStages.WithRetentionDays, UpdateStages.WithStorageAccountAccessKey, UpdateStages.WithStorageAccountSubscriptionId, UpdateStages.WithStorageEndpoint {
interface Update extends Appliable<DatabaseBlobAuditingPolicy>, UpdateStages.WithAuditActionsAndGroups, UpdateStages.WithIsAzureMonitorTargetEnabled, UpdateStages.WithIsStorageSecondaryKeyInUse, UpdateStages.WithQueueDelayMs, UpdateStages.WithRetentionDays, UpdateStages.WithStorageAccountAccessKey, UpdateStages.WithStorageAccountSubscriptionId, UpdateStages.WithStorageEndpoint {
}

/**
Expand Down Expand Up @@ -342,7 +365,7 @@ interface WithIsAzureMonitorTargetEnabled {
/**
* Specifies isAzureMonitorTargetEnabled.
* @param isAzureMonitorTargetEnabled Specifies whether audit events are sent to Azure Monitor.
In order to send the events to Azure Monitor, specify 'State' as 'Enabled' and 'IsAzureMonitorTargetEnabled' as true.
In order to send the events to Azure Monitor, specify 'state' as 'Enabled' and 'isAzureMonitorTargetEnabled' as true.
When using REST API to configure auditing, Diagnostic Settings with 'SQLSecurityAuditEvents' diagnostic logs category on the database should be also created.
Note that for server level audit you should use the 'master' database as {databaseName}.
Diagnostic Settings URI format:
Expand All @@ -366,6 +389,19 @@ interface WithIsStorageSecondaryKeyInUse {
Update withIsStorageSecondaryKeyInUse(Boolean isStorageSecondaryKeyInUse);
}

/**
* The stage of the databaseblobauditingpolicy update allowing to specify QueueDelayMs.
*/
interface WithQueueDelayMs {
/**
* Specifies queueDelayMs.
* @param queueDelayMs Specifies the amount of time in milliseconds that can elapse before audit actions are forced to be processed.
The default minimum value is 1000 (1 second). The maximum is 2,147,483,647
* @return the next update stage
*/
Update withQueueDelayMs(Integer queueDelayMs);
}

/**
* The stage of the databaseblobauditingpolicy update allowing to specify RetentionDays.
*/
Expand All @@ -384,7 +420,12 @@ interface WithRetentionDays {
interface WithStorageAccountAccessKey {
/**
* Specifies storageAccountAccessKey.
* @param storageAccountAccessKey Specifies the identifier key of the auditing storage account. If state is Enabled and storageEndpoint is specified, storageAccountAccessKey is required
* @param storageAccountAccessKey Specifies the identifier key of the auditing storage account.
If state is Enabled and storageEndpoint is specified, not specifying the storageAccountAccessKey will use SQL server system-assigned managed identity to access the storage.
Prerequisites for using managed identity authentication:
1. Assign SQL Server a system-assigned managed identity in Azure Active Directory (AAD).
2. Grant SQL Server identity access to the storage account by adding 'Storage Blob Data Contributor' RBAC role to the server identity.
For more information, see [Auditing to storage using Managed Identity authentication](https://go.microsoft.com/fwlink/?linkid=2114355)
* @return the next update stage
*/
Update withStorageAccountAccessKey(String storageAccountAccessKey);
Expand All @@ -408,7 +449,7 @@ interface WithStorageAccountSubscriptionId {
interface WithStorageEndpoint {
/**
* Specifies storageEndpoint.
* @param storageEndpoint Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). If state is Enabled, storageEndpoint is required
* @param storageEndpoint Specifies the blob storage endpoint (e.g. https://MyAccount.blob.core.windows.net). If state is Enabled, storageEndpoint or isAzureMonitorTargetEnabled is required
* @return the next update stage
*/
Update withStorageEndpoint(String storageEndpoint);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@

package com.microsoft.azure.management.sql.v2015_05_01_preview;

import rx.Completable;
import rx.Observable;
import com.microsoft.azure.management.sql.v2015_05_01_preview.implementation.EncryptionProtectorInner;
import com.microsoft.azure.management.sql.v2015_05_01_preview.implementation.EncryptionProtectorsInner;
Expand All @@ -17,6 +18,16 @@
* Type representing EncryptionProtectors.
*/
public interface EncryptionProtectors extends HasInner<EncryptionProtectorsInner> {
/**
* Revalidates an existing encryption protector.
*
* @param resourceGroupName The name of the resource group that contains the resource. You can obtain this value from the Azure Resource Manager API or the portal.
* @param serverName The name of the server.
* @throws IllegalArgumentException thrown if parameters fail the validation
* @return the observable for the request
*/
Completable revalidateAsync(String resourceGroupName, String serverName);

/**
* Gets a list of server encryption protectors.
*
Expand Down
Loading

0 comments on commit 3d7846e

Please sign in to comment.