Skip to content

Commit

Permalink
Dev search microsoft.search 2022 09 01 (#21964)
Browse files Browse the repository at this point in the history
* Adds base for updating Microsoft.Search from version stable/2020-08-01 to version 2022-09-01

* Updates readme

* Updates API version in new specs and examples

* Add missing private endpoint connection properties (#21629)

* add missing private endpoint connection properties

* fix errors

* Adding delegated identities to data plane

* Revert "Adding delegated identities to data plane"

This reverts commit def1bd3.

* Fix Lint ProvisioningStateValidation Error

* Applying prettier changes
npm run prettier -- --write

Co-authored-by: Enrique Jaimes <enjaimes@microsoft.com>

* Satumkur/new api ver 20220901 (#21922)

* semantic updates

* Add Dataplane RBAC related changes + examples

* Prettier fixes

* Fix LintDiff errors

* Update SearchUpdateServiceDisableLocalAuth.json

update erroneous api version param

Co-authored-by: Samartha Tumkur Vani <satumkur@microsoft.com>
Co-authored-by: Enrique Jaimes <enjaimes@microsoft.com>

* Add CMK Enforcement policy support (#21996)

* Add CMK Enforcement policy support

* Update api-version

* Remove unused properties

* Remove bypass property

Co-authored-by: satumkurmsft <72990508+satumkurmsft@users.noreply.github.com>
Co-authored-by: Matt <57731498+mattmsft@users.noreply.github.com>
Co-authored-by: Samartha Tumkur Vani <satumkur@microsoft.com>
  • Loading branch information
4 people authored Jan 16, 2023
1 parent 269c77b commit 20450db
Show file tree
Hide file tree
Showing 36 changed files with 4,254 additions and 8 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid",
"sharedPrivateLinkResourceName": "testResource",
"sharedPrivateLinkResource": {
"properties": {
"requestMessage": "please approve",
"groupId": "blob",
"privateLinkResourceId": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Storage/storageAccounts/storageAccountName",
"resourceRegion": null
}
}
},
"responses": {
"202": {
"headers": {
"Location": "https://management.azure.com/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchService/sharedPrivateLinkResources/testResource/operationStatuses/08586060559526078782?api-version=2022-09-01",
"Azure-AsyncOperation": "https://management.azure.com/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchService/sharedPrivateLinkResources/testResource/operationStatuses/08586060559526078782?api-version=2022-09-01"
}
},
"200": {
"body": {
"name": "testResource",
"type": "Microsoft.Search/searchServices/sharedPrivateLinkResources",
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice/sharedPrivateLinkResources/testResource",
"properties": {
"requestMessage": "please approve",
"groupId": "blob",
"privateLinkResourceId": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Storage/storageAccounts/storageAccountName",
"status": "Pending",
"resourceRegion": null
}
}
}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid",
"privateEndpointConnectionName": "testEndpoint.50bf4fbe-d7c1-4b48-a642-4f5892642546"
},
"responses": {
"200": {
"body": {
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice/privateEndpointConnections/testEndpoint.50bf4fbe-d7c1-4b48-a642-4f5892642546",
"name": "testEndpoint.50bf4fbe-d7c1-4b48-a642-4f5892642546",
"type": "Microsoft.Search/searchServices/privateEndpointConnections",
"properties": {
"privateEndpoint": {
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/privateEndpoints/testEndpoint"
},
"privateLinkServiceConnectionState": {
"status": "Disconnected",
"description": "",
"actionsRequired": "None"
}
}
}
},
"404": {}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid",
"sharedPrivateLinkResourceName": "testResource"
},
"responses": {
"202": {
"headers": {
"Location": "https://management.azure.com/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchService/sharedPrivateLinkResources/testResource/operationStatuses/159c5e07-c829-4896-8aba-a1d4fcc7c89c?api-version=2022-09-01",
"Azure-AsyncOperation": "https://management.azure.com/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchService/sharedPrivateLinkResources/testResource/operationStatuses/159c5e07-c829-4896-8aba-a1d4fcc7c89c?api-version=2022-09-01"
}
},
"204": {},
"404": {}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid",
"privateEndpointConnectionName": "testEndpoint.50bf4fbe-d7c1-4b48-a642-4f5892642546"
},
"responses": {
"200": {
"body": {
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice/privateEndpointConnections/testEndpoint.50bf4fbe-d7c1-4b48-a642-4f5892642546",
"name": "testEndpoint.50bf4fbe-d7c1-4b48-a642-4f5892642546",
"type": "Microsoft.Search/searchServices/privateEndpointConnections",
"properties": {
"privateEndpoint": {
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/privateEndpoints/testEndpoint"
},
"privateLinkServiceConnectionState": {
"status": "Approved",
"description": "",
"actionsRequired": "None"
}
}
}
}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid",
"sharedPrivateLinkResourceName": "testResource"
},
"responses": {
"200": {
"body": {
"name": "testResource",
"type": "Microsoft.Search/searchServices/sharedPrivateLinkResources",
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice/sharedPrivateLinkResources/testResource",
"properties": {
"requestMessage": "please approve",
"groupId": "blob",
"privateLinkResourceId": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Storage/storageAccounts/storageAccountName",
"status": "Pending",
"resourceRegion": null
}
}
}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid"
},
"responses": {
"200": {
"body": {
"value": [
{
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice/privateEndpointConnections/testEndpoint.50bf4fbe-d7c1-4b48-a642-4f5892642546",
"name": "testEndpoint.50bf4fbe-d7c1-4b48-a642-4f5892642546",
"type": "Microsoft.Search/searchServices/privateEndpointConnections",
"properties": {
"privateEndpoint": {
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/privateEndpoints/testEndpoint"
},
"privateLinkServiceConnectionState": {
"status": "Approved",
"description": "",
"actionsRequired": "None"
}
}
}
]
}
}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid"
},
"responses": {
"200": {
"body": {
"value": [
{
"name": "testResource",
"type": "Microsoft.Search/searchServices/sharedPrivateLinkResources",
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice/sharedPrivateLinkResources/testResource",
"properties": {
"requestMessage": "please approve",
"groupId": "blob",
"privateLinkResourceId": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Storage/storageAccounts/storageAccountName",
"status": "Pending",
"resourceRegion": null
}
}
]
}
}
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,88 @@
{
"parameters": {
"searchServiceName": "mysearchservice",
"resourceGroupName": "rg1",
"api-version": "2022-09-01",
"subscriptionId": "subid"
},
"responses": {
"200": {
"body": {
"value": [
{
"id": "/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Search/searchServices/mysearchservice/privateLinkResources/searchService",
"name": "searchService",
"type": "Microsoft.Search/searchServices/privateLinkResources",
"properties": {
"groupId": "searchService",
"requiredMembers": [
"searchService"
],
"requiredZoneNames": [
"privatelink.search.windows.net"
],
"shareablePrivateLinkResourceTypes": [
{
"name": "blob",
"properties": {
"type": "Microsoft.Storage/storageAccounts",
"groupId": "blob",
"description": "Azure Cognitive Search indexers can connect to blobs in Azure Storage for reading data (data source), for writing intermediate results of indexer execution (annotation cache, preview) or for storing any knowledge store projections (preview)"
}
},
{
"name": "table",
"properties": {
"type": "Microsoft.Storage/storageAccounts",
"groupId": "table",
"description": "Azure Cognitive Search indexers can connect to tables in Azure Storage for reading data (data source), for writing book-keeping information about intermediate results of indexer execution (annotation cache, preview) or for storing any knowledge store projections (preview)"
}
},
{
"name": "Sql",
"properties": {
"type": "Microsoft.DocumentDB/databaseAccounts",
"groupId": "Sql",
"description": "Azure Cognitive Search indexers can connect to CosmosDB using the SQL head for reading data (data source)."
}
},
{
"name": "plr",
"properties": {
"type": "Microsoft.Sql/servers",
"groupId": "sqlServer",
"description": "Azure Cognitive Search indexers can connect to AzureSQL databases in a SQL server for reading data (data source)."
}
},
{
"name": "vault",
"properties": {
"type": "Microsoft.KeyVault/vaults",
"groupId": "vault",
"description": "Azure Cognitive Search can access keys in Azure Key Vault to encrypt search index and synonym map data"
}
},
{
"name": "plr",
"properties": {
"type": "Microsoft.DBforMySQL/servers",
"groupId": "mysqlServer",
"description": "Azure Cognitive Search indexers can connect to MySQL databases for reading data (data source, preview)."
}
},
{
"name": "site",
"properties": {
"type": "Microsoft.Web/sites",
"groupId": "sites",
"description": "Azure Cognitive Search indexers can connect to App Services when executing custom web api skills that can be present in a skillset (optional) attached to the indexer."
}
}
]
}
}
]
}
}
}
}
Loading

0 comments on commit 20450db

Please sign in to comment.