Skip to content
This repository has been archived by the owner on May 5, 2023. It is now read-only.

Commit

Permalink
[AutoPR sql/resource-manager] Adding Swagger for POST APIs used to up…
Browse files Browse the repository at this point in the history
…load a customer TDE certificates (#3013)

* Generated from e3529a46fd8d20ae6db5a542fe9762a365879439

Adding Swagger for POST APIs used to upload a customer TDE certificate in CMS

* Generated from 9f0ba3d29675d6160b4cd881c52991fef58e0927

Addressing Jared's comment on PR
- Remove certificateName property
- Remove Resource and ProxyResource manually
- Edit TdeCertificate to reference "../../../common/v1/types.json#/definitions/ProxyResource"

* Generated from 8a72b9ba5c2b5c8621cd628c62702a0bd4933259

Adding to all package-composite-v* and package-pure of appropriate version
  • Loading branch information
AutorestCI authored Jun 21, 2018
1 parent 404474d commit 36e907d
Show file tree
Hide file tree
Showing 13 changed files with 1,638 additions and 3,626 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -32,82 +32,12 @@ class DatabaseBlobAuditingPolicy extends models['ProxyResource'] {
* is required.
* @member {number} [retentionDays] Specifies the number of days to keep in
* the audit logs.
* @member {array} [auditActionsAndGroups] Specifies the Actions-Groups and
* Actions to audit.
*
* The recommended set of action groups to use is the following combination -
* this will audit all the queries and stored procedures executed against the
* database, as well as successful and failed logins:
*
* BATCH_COMPLETED_GROUP,
* SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP,
* FAILED_DATABASE_AUTHENTICATION_GROUP.
*
* This above combination is also the set that is configured by default when
* enabling auditing from the Azure portal.
*
* The supported action groups to audit are (note: choose only specific
* groups that cover your auditing needs. Using unnecessary groups could lead
* to very large quantities of audit records):
*
* APPLICATION_ROLE_CHANGE_PASSWORD_GROUP
* BACKUP_RESTORE_GROUP
* DATABASE_LOGOUT_GROUP
* DATABASE_OBJECT_CHANGE_GROUP
* DATABASE_OBJECT_OWNERSHIP_CHANGE_GROUP
* DATABASE_OBJECT_PERMISSION_CHANGE_GROUP
* DATABASE_OPERATION_GROUP
* DATABASE_PERMISSION_CHANGE_GROUP
* DATABASE_PRINCIPAL_CHANGE_GROUP
* DATABASE_PRINCIPAL_IMPERSONATION_GROUP
* DATABASE_ROLE_MEMBER_CHANGE_GROUP
* FAILED_DATABASE_AUTHENTICATION_GROUP
* SCHEMA_OBJECT_ACCESS_GROUP
* SCHEMA_OBJECT_CHANGE_GROUP
* SCHEMA_OBJECT_OWNERSHIP_CHANGE_GROUP
* SCHEMA_OBJECT_PERMISSION_CHANGE_GROUP
* SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP
* USER_CHANGE_PASSWORD_GROUP
* BATCH_STARTED_GROUP
* BATCH_COMPLETED_GROUP
*
* These are groups that cover all sql statements and stored procedures
* executed against the database, and should not be used in combination with
* other groups as this will result in duplicate audit logs.
*
* For more information, see [Database-Level Audit Action
* Groups](https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/sql-server-audit-action-groups-and-actions#database-level-audit-action-groups).
*
* For Database auditing policy, specific Actions can also be specified (note
* that Actions cannot be specified for Server auditing policy). The
* supported actions to audit are:
* SELECT
* UPDATE
* INSERT
* DELETE
* EXECUTE
* RECEIVE
* REFERENCES
*
* The general form for defining an action to be audited is:
* <action> ON <object> BY <principal>
*
* Note that <object> in the above format can refer to an object like a
* table, view, or stored procedure, or an entire database or schema. For the
* latter cases, the forms DATABASE::<db_name> and SCHEMA::<schema_name> are
* used, respectively.
*
* For example:
* SELECT on dbo.myTable by public
* SELECT on DATABASE::myDatabase by public
* SELECT on SCHEMA::mySchema by public
*
* For more information, see [Database-Level Audit
* Actions](https://docs.microsoft.com/en-us/sql/relational-databases/security/auditing/sql-server-audit-action-groups-and-actions#database-level-audit-actions)
* @member {array} [auditActionsAndGroups] Specifies the Actions and
* Actions-Groups to audit.
* @member {uuid} [storageAccountSubscriptionId] Specifies the blob storage
* subscription Id.
* @member {boolean} [isStorageSecondaryKeyInUse] Specifies whether
* storageAccountAccessKey value is the storage's secondary key.
* storageAccountAccessKey value is the storages secondary key.
*/
constructor() {
super();
Expand Down
Loading

0 comments on commit 36e907d

Please sign in to comment.