@@ -321,6 +321,11 @@ class BackupShortTermRetentionPolicy(ProxyResource):
321321 :param retention_days: The backup retention period in days. This is how
322322 many days Point-in-Time Restore will be supported.
323323 :type retention_days: int
324+ :param diff_backup_interval_in_hours: The differential backup interval in
325+ hours. This is how many interval hours between each differential backup
326+ will be supported. This is only applicable to live databases but not
327+ dropped databases.
328+ :type diff_backup_interval_in_hours: int
324329 """
325330
326331 _validation = {
@@ -334,11 +339,13 @@ class BackupShortTermRetentionPolicy(ProxyResource):
334339 'name': {'key': 'name', 'type': 'str'},
335340 'type': {'key': 'type', 'type': 'str'},
336341 'retention_days': {'key': 'properties.retentionDays', 'type': 'int'},
342+ 'diff_backup_interval_in_hours': {'key': 'properties.diffBackupIntervalInHours', 'type': 'int'},
337343 }
338344
339345 def __init__(self, **kwargs):
340346 super(BackupShortTermRetentionPolicy, self).__init__(**kwargs)
341347 self.retention_days = kwargs.get('retention_days', None)
348+ self.diff_backup_interval_in_hours = kwargs.get('diff_backup_interval_in_hours', None)
342349
343350
344351class CheckNameAvailabilityRequest(Model):
@@ -9357,24 +9364,28 @@ class ReplicationLink(ProxyResource):
93579364 :vartype partner_database: str
93589365 :ivar partner_location: Resource partner location.
93599366 :vartype partner_location: str
9360- :ivar role: Local replication role.
9361- :vartype role: str
9362- :ivar partner_role: Partner replication role.
9363- :vartype partner_role: str
9367+ :ivar role: Local replication role. Possible values include: 'Primary',
9368+ 'Secondary', 'NonReadableSecondary', 'Source', 'Copy'
9369+ :vartype role: str or ~azure.mgmt.sql.models.ReplicationRole
9370+ :ivar partner_role: Partner replication role. Possible values include:
9371+ 'Primary', 'Secondary', 'NonReadableSecondary', 'Source', 'Copy'
9372+ :vartype partner_role: str or ~azure.mgmt.sql.models.ReplicationRole
93649373 :ivar replication_mode: Replication mode.
93659374 :vartype replication_mode: str
93669375 :ivar start_time: Time at which the link was created.
93679376 :vartype start_time: datetime
93689377 :ivar percent_complete: Seeding completion percentage for the link.
93699378 :vartype percent_complete: int
93709379 :ivar replication_state: Replication state (PENDING, SEEDING, CATCHUP,
9371- SUSPENDED).
9372- :vartype replication_state: str
9380+ SUSPENDED). Possible values include: 'PENDING', 'SEEDING', 'CATCH_UP',
9381+ 'SUSPENDED'
9382+ :vartype replication_state: str or ~azure.mgmt.sql.models.ReplicationState
93739383 :ivar is_termination_allowed: Whether the user is currently allowed to
93749384 terminate the link.
93759385 :vartype is_termination_allowed: bool
9376- :ivar link_type: Link type (GEO, NAMED).
9377- :vartype link_type: str
9386+ :ivar link_type: Link type (GEO, NAMED). Possible values include: 'GEO',
9387+ 'NAMED'
9388+ :vartype link_type: str or ~azure.mgmt.sql.models.ReplicationLinkType
93789389 """
93799390
93809391 _validation = {
@@ -9401,8 +9412,8 @@ class ReplicationLink(ProxyResource):
94019412 'partner_server': {'key': 'properties.partnerServer', 'type': 'str'},
94029413 'partner_database': {'key': 'properties.partnerDatabase', 'type': 'str'},
94039414 'partner_location': {'key': 'properties.partnerLocation', 'type': 'str'},
9404- 'role': {'key': 'properties.role', 'type': 'str '},
9405- 'partner_role': {'key': 'properties.partnerRole', 'type': 'str '},
9415+ 'role': {'key': 'properties.role', 'type': 'ReplicationRole '},
9416+ 'partner_role': {'key': 'properties.partnerRole', 'type': 'ReplicationRole '},
94069417 'replication_mode': {'key': 'properties.replicationMode', 'type': 'str'},
94079418 'start_time': {'key': 'properties.startTime', 'type': 'iso-8601'},
94089419 'percent_complete': {'key': 'properties.percentComplete', 'type': 'int'},
@@ -10081,7 +10092,7 @@ class Server(TrackedResource):
1008110092 allowed for this server. Value is optional but if passed in, must be
1008210093 'Enabled' or 'Disabled'. Possible values include: 'Enabled', 'Disabled'
1008310094 :type public_network_access: str or
10084- ~azure.mgmt.sql.models.ServerPublicNetworkAccess
10095+ ~azure.mgmt.sql.models.ServerNetworkAccessFlag
1008510096 :ivar workspace_feature: Whether or not existing server has a workspace
1008610097 created and if it allows connection from workspace. Possible values
1008710098 include: 'Connected', 'Disconnected'
@@ -10090,10 +10101,19 @@ class Server(TrackedResource):
1009010101 :param primary_user_assigned_identity_id: The resource id of a user
1009110102 assigned identity to be used by default.
1009210103 :type primary_user_assigned_identity_id: str
10104+ :param federated_client_id: The Client id used for cross tenant CMK
10105+ scenario
10106+ :type federated_client_id: str
1009310107 :param key_id: A CMK URI of the key to use for encryption.
1009410108 :type key_id: str
1009510109 :param administrators: The Azure Active Directory identity of the server.
1009610110 :type administrators: ~azure.mgmt.sql.models.ServerExternalAdministrator
10111+ :param restrict_outbound_network_access: Whether or not to restrict
10112+ outbound network access for this server. Value is optional but if passed
10113+ in, must be 'Enabled' or 'Disabled'. Possible values include: 'Enabled',
10114+ 'Disabled'
10115+ :type restrict_outbound_network_access: str or
10116+ ~azure.mgmt.sql.models.ServerNetworkAccessFlag
1009710117 """
1009810118
1009910119 _validation = {
@@ -10126,8 +10146,10 @@ class Server(TrackedResource):
1012610146 'public_network_access': {'key': 'properties.publicNetworkAccess', 'type': 'str'},
1012710147 'workspace_feature': {'key': 'properties.workspaceFeature', 'type': 'str'},
1012810148 'primary_user_assigned_identity_id': {'key': 'properties.primaryUserAssignedIdentityId', 'type': 'str'},
10149+ 'federated_client_id': {'key': 'properties.federatedClientId', 'type': 'str'},
1012910150 'key_id': {'key': 'properties.keyId', 'type': 'str'},
1013010151 'administrators': {'key': 'properties.administrators', 'type': 'ServerExternalAdministrator'},
10152+ 'restrict_outbound_network_access': {'key': 'properties.restrictOutboundNetworkAccess', 'type': 'str'},
1013110153 }
1013210154
1013310155 def __init__(self, **kwargs):
@@ -10144,8 +10166,10 @@ def __init__(self, **kwargs):
1014410166 self.public_network_access = kwargs.get('public_network_access', None)
1014510167 self.workspace_feature = None
1014610168 self.primary_user_assigned_identity_id = kwargs.get('primary_user_assigned_identity_id', None)
10169+ self.federated_client_id = kwargs.get('federated_client_id', None)
1014710170 self.key_id = kwargs.get('key_id', None)
1014810171 self.administrators = kwargs.get('administrators', None)
10172+ self.restrict_outbound_network_access = kwargs.get('restrict_outbound_network_access', None)
1014910173
1015010174
1015110175class ServerAutomaticTuning(ProxyResource):
@@ -11140,7 +11164,7 @@ class ServerUpdate(Model):
1114011164 allowed for this server. Value is optional but if passed in, must be
1114111165 'Enabled' or 'Disabled'. Possible values include: 'Enabled', 'Disabled'
1114211166 :type public_network_access: str or
11143- ~azure.mgmt.sql.models.ServerPublicNetworkAccess
11167+ ~azure.mgmt.sql.models.ServerNetworkAccessFlag
1114411168 :ivar workspace_feature: Whether or not existing server has a workspace
1114511169 created and if it allows connection from workspace. Possible values
1114611170 include: 'Connected', 'Disconnected'
@@ -11149,10 +11173,19 @@ class ServerUpdate(Model):
1114911173 :param primary_user_assigned_identity_id: The resource id of a user
1115011174 assigned identity to be used by default.
1115111175 :type primary_user_assigned_identity_id: str
11176+ :param federated_client_id: The Client id used for cross tenant CMK
11177+ scenario
11178+ :type federated_client_id: str
1115211179 :param key_id: A CMK URI of the key to use for encryption.
1115311180 :type key_id: str
1115411181 :param administrators: The Azure Active Directory identity of the server.
1115511182 :type administrators: ~azure.mgmt.sql.models.ServerExternalAdministrator
11183+ :param restrict_outbound_network_access: Whether or not to restrict
11184+ outbound network access for this server. Value is optional but if passed
11185+ in, must be 'Enabled' or 'Disabled'. Possible values include: 'Enabled',
11186+ 'Disabled'
11187+ :type restrict_outbound_network_access: str or
11188+ ~azure.mgmt.sql.models.ServerNetworkAccessFlag
1115611189 :param tags: Resource tags.
1115711190 :type tags: dict[str, str]
1115811191 """
@@ -11176,8 +11209,10 @@ class ServerUpdate(Model):
1117611209 'public_network_access': {'key': 'properties.publicNetworkAccess', 'type': 'str'},
1117711210 'workspace_feature': {'key': 'properties.workspaceFeature', 'type': 'str'},
1117811211 'primary_user_assigned_identity_id': {'key': 'properties.primaryUserAssignedIdentityId', 'type': 'str'},
11212+ 'federated_client_id': {'key': 'properties.federatedClientId', 'type': 'str'},
1117911213 'key_id': {'key': 'properties.keyId', 'type': 'str'},
1118011214 'administrators': {'key': 'properties.administrators', 'type': 'ServerExternalAdministrator'},
11215+ 'restrict_outbound_network_access': {'key': 'properties.restrictOutboundNetworkAccess', 'type': 'str'},
1118111216 'tags': {'key': 'tags', 'type': '{str}'},
1118211217 }
1118311218
@@ -11194,8 +11229,10 @@ def __init__(self, **kwargs):
1119411229 self.public_network_access = kwargs.get('public_network_access', None)
1119511230 self.workspace_feature = None
1119611231 self.primary_user_assigned_identity_id = kwargs.get('primary_user_assigned_identity_id', None)
11232+ self.federated_client_id = kwargs.get('federated_client_id', None)
1119711233 self.key_id = kwargs.get('key_id', None)
1119811234 self.administrators = kwargs.get('administrators', None)
11235+ self.restrict_outbound_network_access = kwargs.get('restrict_outbound_network_access', None)
1119911236 self.tags = kwargs.get('tags', None)
1120011237
1120111238
0 commit comments