@@ -41,6 +41,83 @@ def __init__(self, client, config, serializer, deserializer):
41
41
42
42
self .config = config
43
43
44
+ def list_by_database (
45
+ self , resource_group_name , server_name , database_name , custom_headers = None , raw = False , ** operation_config ):
46
+ """Lists the vulnerability assessment scans of a database.
47
+
48
+ :param resource_group_name: The name of the resource group that
49
+ contains the resource. You can obtain this value from the Azure
50
+ Resource Manager API or the portal.
51
+ :type resource_group_name: str
52
+ :param server_name: The name of the server.
53
+ :type server_name: str
54
+ :param database_name: The name of the database.
55
+ :type database_name: str
56
+ :param dict custom_headers: headers that will be added to the request
57
+ :param bool raw: returns the direct response alongside the
58
+ deserialized response
59
+ :param operation_config: :ref:`Operation configuration
60
+ overrides<msrest:optionsforoperations>`.
61
+ :return: An iterator like instance of
62
+ VulnerabilityAssessmentScanRecord
63
+ :rtype:
64
+ ~azure.mgmt.sql.models.VulnerabilityAssessmentScanRecordPaged[~azure.mgmt.sql.models.VulnerabilityAssessmentScanRecord]
65
+ :raises: :class:`CloudError<msrestazure.azure_exceptions.CloudError>`
66
+ """
67
+ def internal_paging (next_link = None , raw = False ):
68
+
69
+ if not next_link :
70
+ # Construct URL
71
+ url = self .list_by_database .metadata ['url' ]
72
+ path_format_arguments = {
73
+ 'resourceGroupName' : self ._serialize .url ("resource_group_name" , resource_group_name , 'str' ),
74
+ 'serverName' : self ._serialize .url ("server_name" , server_name , 'str' ),
75
+ 'databaseName' : self ._serialize .url ("database_name" , database_name , 'str' ),
76
+ 'vulnerabilityAssessmentName' : self ._serialize .url ("self.vulnerability_assessment_name" , self .vulnerability_assessment_name , 'str' ),
77
+ 'subscriptionId' : self ._serialize .url ("self.config.subscription_id" , self .config .subscription_id , 'str' )
78
+ }
79
+ url = self ._client .format_url (url , ** path_format_arguments )
80
+
81
+ # Construct parameters
82
+ query_parameters = {}
83
+ query_parameters ['api-version' ] = self ._serialize .query ("self.api_version" , self .api_version , 'str' )
84
+
85
+ else :
86
+ url = next_link
87
+ query_parameters = {}
88
+
89
+ # Construct headers
90
+ header_parameters = {}
91
+ header_parameters ['Accept' ] = 'application/json'
92
+ if self .config .generate_client_request_id :
93
+ header_parameters ['x-ms-client-request-id' ] = str (uuid .uuid1 ())
94
+ if custom_headers :
95
+ header_parameters .update (custom_headers )
96
+ if self .config .accept_language is not None :
97
+ header_parameters ['accept-language' ] = self ._serialize .header ("self.config.accept_language" , self .config .accept_language , 'str' )
98
+
99
+ # Construct and send request
100
+ request = self ._client .get (url , query_parameters , header_parameters )
101
+ response = self ._client .send (request , stream = False , ** operation_config )
102
+
103
+ if response .status_code not in [200 ]:
104
+ exp = CloudError (response )
105
+ exp .request_id = response .headers .get ('x-ms-request-id' )
106
+ raise exp
107
+
108
+ return response
109
+
110
+ # Deserialize response
111
+ deserialized = models .VulnerabilityAssessmentScanRecordPaged (internal_paging , self ._deserialize .dependencies )
112
+
113
+ if raw :
114
+ header_dict = {}
115
+ client_raw_response = models .VulnerabilityAssessmentScanRecordPaged (internal_paging , self ._deserialize .dependencies , header_dict )
116
+ return client_raw_response
117
+
118
+ return deserialized
119
+ list_by_database .metadata = {'url' : '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}/vulnerabilityAssessments/{vulnerabilityAssessmentName}/scans' }
120
+
44
121
def get (
45
122
self , resource_group_name , server_name , database_name , scan_id , custom_headers = None , raw = False , ** operation_config ):
46
123
"""Gets a vulnerability assessment scan record of a database.
@@ -205,83 +282,6 @@ def get_long_running_output(response):
205
282
return LROPoller (self ._client , raw_result , get_long_running_output , polling_method )
206
283
initiate_scan .metadata = {'url' : '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}/vulnerabilityAssessments/{vulnerabilityAssessmentName}/scans/{scanId}/initiateScan' }
207
284
208
- def list_by_database (
209
- self , resource_group_name , server_name , database_name , custom_headers = None , raw = False , ** operation_config ):
210
- """Lists the vulnerability assessment scans of a database.
211
-
212
- :param resource_group_name: The name of the resource group that
213
- contains the resource. You can obtain this value from the Azure
214
- Resource Manager API or the portal.
215
- :type resource_group_name: str
216
- :param server_name: The name of the server.
217
- :type server_name: str
218
- :param database_name: The name of the database.
219
- :type database_name: str
220
- :param dict custom_headers: headers that will be added to the request
221
- :param bool raw: returns the direct response alongside the
222
- deserialized response
223
- :param operation_config: :ref:`Operation configuration
224
- overrides<msrest:optionsforoperations>`.
225
- :return: An iterator like instance of
226
- VulnerabilityAssessmentScanRecord
227
- :rtype:
228
- ~azure.mgmt.sql.models.VulnerabilityAssessmentScanRecordPaged[~azure.mgmt.sql.models.VulnerabilityAssessmentScanRecord]
229
- :raises: :class:`CloudError<msrestazure.azure_exceptions.CloudError>`
230
- """
231
- def internal_paging (next_link = None , raw = False ):
232
-
233
- if not next_link :
234
- # Construct URL
235
- url = self .list_by_database .metadata ['url' ]
236
- path_format_arguments = {
237
- 'resourceGroupName' : self ._serialize .url ("resource_group_name" , resource_group_name , 'str' ),
238
- 'serverName' : self ._serialize .url ("server_name" , server_name , 'str' ),
239
- 'databaseName' : self ._serialize .url ("database_name" , database_name , 'str' ),
240
- 'vulnerabilityAssessmentName' : self ._serialize .url ("self.vulnerability_assessment_name" , self .vulnerability_assessment_name , 'str' ),
241
- 'subscriptionId' : self ._serialize .url ("self.config.subscription_id" , self .config .subscription_id , 'str' )
242
- }
243
- url = self ._client .format_url (url , ** path_format_arguments )
244
-
245
- # Construct parameters
246
- query_parameters = {}
247
- query_parameters ['api-version' ] = self ._serialize .query ("self.api_version" , self .api_version , 'str' )
248
-
249
- else :
250
- url = next_link
251
- query_parameters = {}
252
-
253
- # Construct headers
254
- header_parameters = {}
255
- header_parameters ['Accept' ] = 'application/json'
256
- if self .config .generate_client_request_id :
257
- header_parameters ['x-ms-client-request-id' ] = str (uuid .uuid1 ())
258
- if custom_headers :
259
- header_parameters .update (custom_headers )
260
- if self .config .accept_language is not None :
261
- header_parameters ['accept-language' ] = self ._serialize .header ("self.config.accept_language" , self .config .accept_language , 'str' )
262
-
263
- # Construct and send request
264
- request = self ._client .get (url , query_parameters , header_parameters )
265
- response = self ._client .send (request , stream = False , ** operation_config )
266
-
267
- if response .status_code not in [200 ]:
268
- exp = CloudError (response )
269
- exp .request_id = response .headers .get ('x-ms-request-id' )
270
- raise exp
271
-
272
- return response
273
-
274
- # Deserialize response
275
- deserialized = models .VulnerabilityAssessmentScanRecordPaged (internal_paging , self ._deserialize .dependencies )
276
-
277
- if raw :
278
- header_dict = {}
279
- client_raw_response = models .VulnerabilityAssessmentScanRecordPaged (internal_paging , self ._deserialize .dependencies , header_dict )
280
- return client_raw_response
281
-
282
- return deserialized
283
- list_by_database .metadata = {'url' : '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}/vulnerabilityAssessments/{vulnerabilityAssessmentName}/scans' }
284
-
285
285
def export (
286
286
self , resource_group_name , server_name , database_name , scan_id , custom_headers = None , raw = False , ** operation_config ):
287
287
"""Convert an existing scan result to a human readable format. If already
0 commit comments