Commit b8148fb
SRP Jan25 [2025-01-01] API Version Swagger Changes (#33529)
* Copy latest API version 2024 without any change to new API version 2025 folder, change the API version 2024-01-01 in the new API version 2025-01-01
* SMB OAuth property swagger changes
* Repair item] Fix required properties in activeDirectoryProperties swagger, improve descriptions
* Zonal placement swagger changes for 2025-01-01 API
* Create swagger for restore storage account Api
* Swagger for Encryption in transit file service property for SMB & NFS in 2025-01-01
**Code Review Checklist**
*Code Style/Hygiene*
- [ ] Is the change self-contained ? If not, can this be broken to separate PRs ?
- [ ] If this is a new feature, is the entire feature behind a config or allow-listed subscription or AFEC ? Ensure that the feature is turned off by default and enabled only for a select set of subscriptions.
- [ ] If a new feature, and AFEC/subscription opt-in is not feasible, can this change be limited to stage/canaries and phased open in a future rollout ?
- [ ] Are configs/DCs included for variable limits, settings and to disable the feature off as a whole ?
- [ ] If a bug is being fixed that impacts written KVS state, is there a backfill (backfill job) plan in place to repair existing KVS records with bad data ? If not, is the bug fix backward compatible with existing data ?
*API versioning*
- [ ] Are new customer facing APIs or properties being introduced ? Should this change be introduced in a new API version ?
- [ ] Is any existing KVS schema being modified ? If yes, this change should be introduced in a new API version.
- [ ] If KVS schema is being modified for persistent state, is there a backfill (backfill job) plan in place to repair existing KVS records with the old schema ? If not, is the change backward compatible with existing KVS data ?
*Logging*
- [ ] Do any of the log messages include PII or sensitive information eg. keys (account/encryption), customer data (tags) ?
- [ ] Are appropriate verbose logs included to diagnose customer issues when this change is deployed ? i.e. are we able to describe a timeline of what happened to a customer request while triggering the new code path ?
*Exception/Error Handling*
- [ ] Are all non-recoverable errors handled and logged ? Is a user-friendly/actionable error code returned to the user ?
- [ ] If non-recoverable error are seen, is the transaction unwound to a clean state to avoid orphaned metadata ?
- [ ] If recoverable, are the retries bounded for non-transactional ?
- [ ] If recoverable, are the retries unbounded for transactional ?
*Memory*
- [ ] Are there any unbounded KVS reads eg. list entire KVS tables ? Consider pointed reads by key or paged reads.
- [ ] Does the change introduce an increased memory footprint to RSRP replicas ? Do we require memory profiling in preprod/test ?
*Performance*
- [ ] KVS writes cost 5-15ms. Are there any redundant KVS reads/writes ?
- [ ] Do we need to consider secondary indexes to improve operation performance ?
*Unit Test Coverage*
- [ ] Do unit tests cover all happy path & failure scenarios ?
- [ ] Do any of the unit tests introduced rely on randomness or prone to transient failures eg. time skew, randomly selecting account type or request parameter etc ?
- [ ] Do the Unit tests take less than 100ms(each) to execute when the test suite is run?
- [ ] Do any of the unit tests take a dependency on time, I/O, network call, disks etc?
*Monitoring*
- [ ] Are metrics created for outbound/inbound external dependenc...
* Merged PR 11577981: Swagger for Encryption in transit file service property for SMB & NFS in 2025-01-01
**Objective**: To add the swagger for a new file service property - 'EncryptionInTransit' for SMB & NFS, for service version '2026-02-06' .
- The example is added in a new file S:\Azure\Storage\Storage-SRP\src\Swagger\Microsoft.Storage\stable\2026-02-06\examples\FileServicesPut_EncryptionInTransitRequired.json
**Code Review Checklist**
*Code Style/Hygiene*
- [ ] Is the change self-contained ? If not, can this be broken to separate PRs ?
- [ ] If this is a new feature, is the entire feature behind a config or allow-listed subscription or AFEC ? Ensure that the feature is turned off by default and enabled only for a select set of subscriptions.
- [ ] If a new feature, and AFEC/subscription opt-in is not feasible, can this change be limited to stage/canaries and phased open in a future rollout ?
- [ ] Are configs/DCs included for variable limits, settings and to disable the feature off as a whole ?
- [ ] If a bug is being fixed that impacts written KVS state, is there a backfill (backfill job) plan in place to repair existing KVS records with bad data ? If not, is the bug fix backward compatible with existing data ?
*API versioning*
- [ ] Are new customer facing APIs or properties being introduced ? Should this change be introduced in a new API version ?
- [ ] Is any existing KVS schema being modified ? If yes, this change should be introduced in a new API version.
- [ ] If KVS schema is being modified for persistent state, is there a backfill (backfill job) plan in place to repair existing KVS records with the old schema ? If not, is the change backward compatible with existing KVS data ?
*Logging*
- [ ] Do any of the log messages include PII or sensitive information eg. keys (account/encryption), customer data (tags) ?
- [ ] Are appropriate verbose logs included to diagnose customer issues when this change is deployed ? i.e. are we able to describe a timeline of what happened to a customer request while triggering the new code path ?
*Exception/Error Handling*
- [ ] Are all non-recoverable errors handled and logged ? Is a user-friendly/actionable error code returned to the user ?
- [ ] If non-recoverable error are seen, is the transaction unwound to a clean state to avoid orphaned metadata ?
- [ ] If recoverable, are the retries bounded for non-transactional ?
- [ ] If recoverable, are the retries unbounded for transactional ?
*Memory*
- [ ] Are there any unbounded KVS reads eg. list entire KVS tables ? Consider pointed reads by key or paged reads.
- [ ] Does the change introduce an increased memory footprint to RSRP replicas ? Do we require memory profiling in preprod/test ?
*Performance*
- [ ] KVS writes cost 5-15ms. Are there any redundant KVS reads/writes ?
- [ ] Do we need to consider secondary indexes to improve operation performance ?
*Unit Test Coverage*
- [ ] Do unit tests cover all happy path & failure scenarios ?
- [ ] Do any of the unit tests introduced rely on randomness or prone to transient failures eg. time skew, ...
* Merged PR 12011805: Create swagger for restore storage account Api.
**Why do we need this change?**
We missed the chance to document restore storage account Api, though put storage account operation.
This is also causing challenge of build-in policy for related scenario.
Task 29330514: Build-in policy Storage_NetworkAcls_Audit.json should consider storage account recovery scenario
----
API change
This pull request updates the Swagger documentation to include the restore storage account scenario.
- Added `DeletedStorageAccountRestore.json` example for restoring a deleted storage account.
- Updated `storage.json` to include `deletedAccountCreationTime` property and reference the new restore example.
- Modified the description for the 202 response to include restore storage account requests.
<!-- GitOpsUserAgent=GitOps.Apps.Server.pullrequestcopilot -->
Related work items: #31884198
* suppress errors
* fix the api version in eample from 2025-05-01 to 2025-01-01
* fix comma syntax error
* Add the example refereces and model service
* format and storage account model fix
* Update DeletedStorageAccountRestore.json
* Update DeletedStorageAccountRestore.json
* fix the examples
* fix prettier code check
* Add type object to the "NfsSetting" and "EncryptionInTransit" in file.json
* Add additional property tag in SMB & NFS Setting in file.json
* Fix Auto REST exception file.json
* Fix file.json errors
* Fix reference definition for EncryptionInTransit in file.json
* Prettier check - FileServicesPut_EncryptionInTransitRequired.json
* Add suppression for BodyTopLevelProperties
* fix readme and prettier check
* more prettier fix
---------
Co-authored-by: Risheek Rajolu <[email protected]>
Co-authored-by: jliusan <[email protected]>
Co-authored-by: Kunyi Lin <[email protected]>
Co-authored-by: Radhika Gupta <[email protected]>
Co-authored-by: Elvis Shi <[email protected]>
Co-authored-by: Elvis Shi <[email protected]>1 parent 05ab2f3 commit b8148fb
File tree
198 files changed
+30658
-3
lines changed- specification/storage/resource-manager
- Microsoft.Storage/stable/2025-01-01
- examples
- storageTaskAssignmentsCrud
- storageTaskAssignmentsList
Some content is hidden
Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.
198 files changed
+30658
-3
lines changedLines changed: 1579 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 368 additions & 0 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
| 2 | + | |
| 3 | + | |
| 4 | + | |
| 5 | + | |
| 6 | + | |
| 7 | + | |
| 8 | + | |
| 9 | + | |
| 10 | + | |
| 11 | + | |
| 12 | + | |
| 13 | + | |
| 14 | + | |
| 15 | + | |
| 16 | + | |
| 17 | + | |
| 18 | + | |
| 19 | + | |
| 20 | + | |
| 21 | + | |
| 22 | + | |
| 23 | + | |
| 24 | + | |
| 25 | + | |
| 26 | + | |
| 27 | + | |
| 28 | + | |
| 29 | + | |
| 30 | + | |
| 31 | + | |
| 32 | + | |
| 33 | + | |
| 34 | + | |
| 35 | + | |
| 36 | + | |
| 37 | + | |
| 38 | + | |
| 39 | + | |
| 40 | + | |
| 41 | + | |
| 42 | + | |
| 43 | + | |
| 44 | + | |
| 45 | + | |
| 46 | + | |
| 47 | + | |
| 48 | + | |
| 49 | + | |
| 50 | + | |
| 51 | + | |
| 52 | + | |
| 53 | + | |
| 54 | + | |
| 55 | + | |
| 56 | + | |
| 57 | + | |
| 58 | + | |
| 59 | + | |
| 60 | + | |
| 61 | + | |
| 62 | + | |
| 63 | + | |
| 64 | + | |
| 65 | + | |
| 66 | + | |
| 67 | + | |
| 68 | + | |
| 69 | + | |
| 70 | + | |
| 71 | + | |
| 72 | + | |
| 73 | + | |
| 74 | + | |
| 75 | + | |
| 76 | + | |
| 77 | + | |
| 78 | + | |
| 79 | + | |
| 80 | + | |
| 81 | + | |
| 82 | + | |
| 83 | + | |
| 84 | + | |
| 85 | + | |
| 86 | + | |
| 87 | + | |
| 88 | + | |
| 89 | + | |
| 90 | + | |
| 91 | + | |
| 92 | + | |
| 93 | + | |
| 94 | + | |
| 95 | + | |
| 96 | + | |
| 97 | + | |
| 98 | + | |
| 99 | + | |
| 100 | + | |
| 101 | + | |
| 102 | + | |
| 103 | + | |
| 104 | + | |
| 105 | + | |
| 106 | + | |
| 107 | + | |
| 108 | + | |
| 109 | + | |
| 110 | + | |
| 111 | + | |
| 112 | + | |
| 113 | + | |
| 114 | + | |
| 115 | + | |
| 116 | + | |
| 117 | + | |
| 118 | + | |
| 119 | + | |
| 120 | + | |
| 121 | + | |
| 122 | + | |
| 123 | + | |
| 124 | + | |
| 125 | + | |
| 126 | + | |
| 127 | + | |
| 128 | + | |
| 129 | + | |
| 130 | + | |
| 131 | + | |
| 132 | + | |
| 133 | + | |
| 134 | + | |
| 135 | + | |
| 136 | + | |
| 137 | + | |
| 138 | + | |
| 139 | + | |
| 140 | + | |
| 141 | + | |
| 142 | + | |
| 143 | + | |
| 144 | + | |
| 145 | + | |
| 146 | + | |
| 147 | + | |
| 148 | + | |
| 149 | + | |
| 150 | + | |
| 151 | + | |
| 152 | + | |
| 153 | + | |
| 154 | + | |
| 155 | + | |
| 156 | + | |
| 157 | + | |
| 158 | + | |
| 159 | + | |
| 160 | + | |
| 161 | + | |
| 162 | + | |
| 163 | + | |
| 164 | + | |
| 165 | + | |
| 166 | + | |
| 167 | + | |
| 168 | + | |
| 169 | + | |
| 170 | + | |
| 171 | + | |
| 172 | + | |
| 173 | + | |
| 174 | + | |
| 175 | + | |
| 176 | + | |
| 177 | + | |
| 178 | + | |
| 179 | + | |
| 180 | + | |
| 181 | + | |
| 182 | + | |
| 183 | + | |
| 184 | + | |
| 185 | + | |
| 186 | + | |
| 187 | + | |
| 188 | + | |
| 189 | + | |
| 190 | + | |
| 191 | + | |
| 192 | + | |
| 193 | + | |
| 194 | + | |
| 195 | + | |
| 196 | + | |
| 197 | + | |
| 198 | + | |
| 199 | + | |
| 200 | + | |
| 201 | + | |
| 202 | + | |
| 203 | + | |
| 204 | + | |
| 205 | + | |
| 206 | + | |
| 207 | + | |
| 208 | + | |
| 209 | + | |
| 210 | + | |
| 211 | + | |
| 212 | + | |
| 213 | + | |
| 214 | + | |
| 215 | + | |
| 216 | + | |
| 217 | + | |
| 218 | + | |
| 219 | + | |
| 220 | + | |
| 221 | + | |
| 222 | + | |
| 223 | + | |
| 224 | + | |
| 225 | + | |
| 226 | + | |
| 227 | + | |
| 228 | + | |
| 229 | + | |
| 230 | + | |
| 231 | + | |
| 232 | + | |
| 233 | + | |
| 234 | + | |
| 235 | + | |
| 236 | + | |
| 237 | + | |
| 238 | + | |
| 239 | + | |
| 240 | + | |
| 241 | + | |
| 242 | + | |
| 243 | + | |
| 244 | + | |
| 245 | + | |
| 246 | + | |
| 247 | + | |
| 248 | + | |
| 249 | + | |
| 250 | + | |
| 251 | + | |
| 252 | + | |
| 253 | + | |
| 254 | + | |
| 255 | + | |
| 256 | + | |
| 257 | + | |
| 258 | + | |
| 259 | + | |
| 260 | + | |
| 261 | + | |
| 262 | + | |
| 263 | + | |
| 264 | + | |
| 265 | + | |
| 266 | + | |
| 267 | + | |
| 268 | + | |
| 269 | + | |
| 270 | + | |
| 271 | + | |
| 272 | + | |
| 273 | + | |
| 274 | + | |
| 275 | + | |
| 276 | + | |
| 277 | + | |
| 278 | + | |
| 279 | + | |
| 280 | + | |
| 281 | + | |
| 282 | + | |
| 283 | + | |
| 284 | + | |
| 285 | + | |
| 286 | + | |
| 287 | + | |
| 288 | + | |
| 289 | + | |
| 290 | + | |
| 291 | + | |
| 292 | + | |
| 293 | + | |
| 294 | + | |
| 295 | + | |
| 296 | + | |
| 297 | + | |
| 298 | + | |
| 299 | + | |
| 300 | + | |
| 301 | + | |
| 302 | + | |
| 303 | + | |
| 304 | + | |
| 305 | + | |
| 306 | + | |
| 307 | + | |
| 308 | + | |
| 309 | + | |
| 310 | + | |
| 311 | + | |
| 312 | + | |
| 313 | + | |
| 314 | + | |
| 315 | + | |
| 316 | + | |
| 317 | + | |
| 318 | + | |
| 319 | + | |
| 320 | + | |
| 321 | + | |
| 322 | + | |
| 323 | + | |
| 324 | + | |
| 325 | + | |
| 326 | + | |
| 327 | + | |
| 328 | + | |
| 329 | + | |
| 330 | + | |
| 331 | + | |
| 332 | + | |
| 333 | + | |
| 334 | + | |
| 335 | + | |
| 336 | + | |
| 337 | + | |
| 338 | + | |
| 339 | + | |
| 340 | + | |
| 341 | + | |
| 342 | + | |
| 343 | + | |
| 344 | + | |
| 345 | + | |
| 346 | + | |
| 347 | + | |
| 348 | + | |
| 349 | + | |
| 350 | + | |
| 351 | + | |
| 352 | + | |
| 353 | + | |
| 354 | + | |
| 355 | + | |
| 356 | + | |
| 357 | + | |
| 358 | + | |
| 359 | + | |
| 360 | + | |
| 361 | + | |
| 362 | + | |
| 363 | + | |
| 364 | + | |
| 365 | + | |
| 366 | + | |
| 367 | + | |
| 368 | + | |
Lines changed: 25 additions & 0 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
| 2 | + | |
| 3 | + | |
| 4 | + | |
| 5 | + | |
| 6 | + | |
| 7 | + | |
| 8 | + | |
| 9 | + | |
| 10 | + | |
| 11 | + | |
| 12 | + | |
| 13 | + | |
| 14 | + | |
| 15 | + | |
| 16 | + | |
| 17 | + | |
| 18 | + | |
| 19 | + | |
| 20 | + | |
| 21 | + | |
| 22 | + | |
| 23 | + | |
| 24 | + | |
| 25 | + | |
0 commit comments