Class: Azure::Synapse::Mgmt::V2019_06_01_preview::SqlPoolVulnerabilityAssessmentScans
- Inherits:
-
Object
- Object
- Azure::Synapse::Mgmt::V2019_06_01_preview::SqlPoolVulnerabilityAssessmentScans
- Includes:
- MsRestAzure
- Defined in:
- lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb
Overview
Azure Synapse Analytics Management Client
Instance Attribute Summary collapse
-
#client ⇒ SynapseManagementClient
readonly
Reference to the SynapseManagementClient.
Instance Method Summary collapse
-
#begin_initiate_scan(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Object
Executes a Vulnerability Assessment database scan.
-
#begin_initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Concurrent::Promise
Executes a Vulnerability Assessment database scan.
-
#begin_initiate_scan_with_http_info(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Executes a Vulnerability Assessment database scan.
-
#export(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ SqlPoolVulnerabilityAssessmentScansExport
Convert an existing scan result to a human readable format.
-
#export_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Concurrent::Promise
Convert an existing scan result to a human readable format.
-
#export_with_http_info(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Convert an existing scan result to a human readable format.
-
#get(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ VulnerabilityAssessmentScanRecord
Gets a vulnerability assessment scan record of a Sql pool.
-
#get_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Concurrent::Promise
Gets a vulnerability assessment scan record of a Sql pool.
-
#get_with_http_info(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Gets a vulnerability assessment scan record of a Sql pool.
-
#initialize(client) ⇒ SqlPoolVulnerabilityAssessmentScans
constructor
Creates and initializes a new instance of the SqlPoolVulnerabilityAssessmentScans class.
-
#initiate_scan(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Object
Executes a Vulnerability Assessment database scan.
-
#initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Concurrent::Promise
is case insensitive.
-
#list(resource_group_name, workspace_name, sql_pool_name, custom_headers: nil) ⇒ Array<VulnerabilityAssessmentScanRecord>
Lists the vulnerability assessment scans of a SQL pool.
-
#list_as_lazy(resource_group_name, workspace_name, sql_pool_name, custom_headers: nil) ⇒ VulnerabilityAssessmentScanRecordListResult
Lists the vulnerability assessment scans of a SQL pool.
-
#list_async(resource_group_name, workspace_name, sql_pool_name, custom_headers: nil) ⇒ Concurrent::Promise
Lists the vulnerability assessment scans of a SQL pool.
-
#list_next(next_page_link, custom_headers: nil) ⇒ VulnerabilityAssessmentScanRecordListResult
Lists the vulnerability assessment scans of a SQL pool.
-
#list_next_async(next_page_link, custom_headers: nil) ⇒ Concurrent::Promise
Lists the vulnerability assessment scans of a SQL pool.
-
#list_next_with_http_info(next_page_link, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Lists the vulnerability assessment scans of a SQL pool.
-
#list_with_http_info(resource_group_name, workspace_name, sql_pool_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Lists the vulnerability assessment scans of a SQL pool.
Constructor Details
#initialize(client) ⇒ SqlPoolVulnerabilityAssessmentScans
Creates and initializes a new instance of the SqlPoolVulnerabilityAssessmentScans class.
17 18 19 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 17 def initialize(client) @client = client end |
Instance Attribute Details
#client ⇒ SynapseManagementClient (readonly)
Returns reference to the SynapseManagementClient.
22 23 24 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 22 def client @client end |
Instance Method Details
#begin_initiate_scan(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Object
Executes a Vulnerability Assessment database scan.
is case insensitive. retrieve. will be added to the HTTP request.
437 438 439 440 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 437 def begin_initiate_scan(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) response = begin_initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:custom_headers).value! nil end |
#begin_initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Concurrent::Promise
Executes a Vulnerability Assessment database scan.
is case insensitive. retrieve. to the HTTP request.
474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 474 def begin_initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) fail ArgumentError, '@client.api_version is nil' if @client.api_version.nil? fail ArgumentError, "'@client.api_version' should satisfy the constraint - 'MinLength': '1'" if !@client.api_version.nil? && @client.api_version.length < 1 fail ArgumentError, '@client.subscription_id is nil' if @client.subscription_id.nil? fail ArgumentError, "'@client.subscription_id' should satisfy the constraint - 'MinLength': '1'" if !@client.subscription_id.nil? && @client.subscription_id.length < 1 fail ArgumentError, 'resource_group_name is nil' if resource_group_name.nil? fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MaxLength': '90'" if !resource_group_name.nil? && resource_group_name.length > 90 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MinLength': '1'" if !resource_group_name.nil? && resource_group_name.length < 1 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'Pattern': '^[-\w\._\(\)]+$'" if !resource_group_name.nil? && resource_group_name.match(Regexp.new('^^[-\w\._\(\)]+$$')).nil? fail ArgumentError, 'workspace_name is nil' if workspace_name.nil? fail ArgumentError, 'sql_pool_name is nil' if sql_pool_name.nil? vulnerability_assessment_name = 'default' fail ArgumentError, 'scan_id is nil' if scan_id.nil? request_headers = {} request_headers['Content-Type'] = 'application/json; charset=utf-8' # Set Headers request_headers['x-ms-client-request-id'] = SecureRandom.uuid request_headers['accept-language'] = @client.accept_language unless @client.accept_language.nil? path_template = 'subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Synapse/workspaces/{workspaceName}/sqlPools/{sqlPoolName}/vulnerabilityAssessments/{vulnerabilityAssessmentName}/scans/{scanId}/initiateScan' request_url = @base_url || @client.base_url = { middlewares: [[MsRest::RetryPolicyMiddleware, times: 3, retry: 0.02], [:cookie_jar]], path_params: {'subscriptionId' => @client.subscription_id,'resourceGroupName' => resource_group_name,'workspaceName' => workspace_name,'sqlPoolName' => sql_pool_name,'vulnerabilityAssessmentName' => vulnerability_assessment_name,'scanId' => scan_id}, query_params: {'api-version' => @client.api_version}, headers: request_headers.merge(custom_headers || {}), base_url: request_url } promise = @client.make_request_async(:post, path_template, ) promise = promise.then do |result| http_response = result.response status_code = http_response.status response_content = http_response.body unless status_code == 200 || status_code == 202 error_model = JSON.load(response_content) fail MsRestAzure::AzureOperationError.new(result.request, http_response, error_model) end result.request_id = http_response['x-ms-request-id'] unless http_response['x-ms-request-id'].nil? result.correlation_request_id = http_response['x-ms-correlation-request-id'] unless http_response['x-ms-correlation-request-id'].nil? result.client_request_id = http_response['x-ms-client-request-id'] unless http_response['x-ms-client-request-id'].nil? result end promise.execute end |
#begin_initiate_scan_with_http_info(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Executes a Vulnerability Assessment database scan.
is case insensitive. retrieve. will be added to the HTTP request.
456 457 458 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 456 def begin_initiate_scan_with_http_info(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) begin_initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:custom_headers).value! end |
#export(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ SqlPoolVulnerabilityAssessmentScansExport
Convert an existing scan result to a human readable format. If already exists nothing happens
is case insensitive. retrieve. will be added to the HTTP request.
198 199 200 201 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 198 def export(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) response = export_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:custom_headers).value! response.body unless response.nil? end |
#export_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Concurrent::Promise
Convert an existing scan result to a human readable format. If already exists nothing happens
is case insensitive. retrieve. to the HTTP request.
237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 237 def export_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) fail ArgumentError, '@client.api_version is nil' if @client.api_version.nil? fail ArgumentError, "'@client.api_version' should satisfy the constraint - 'MinLength': '1'" if !@client.api_version.nil? && @client.api_version.length < 1 fail ArgumentError, '@client.subscription_id is nil' if @client.subscription_id.nil? fail ArgumentError, "'@client.subscription_id' should satisfy the constraint - 'MinLength': '1'" if !@client.subscription_id.nil? && @client.subscription_id.length < 1 fail ArgumentError, 'resource_group_name is nil' if resource_group_name.nil? fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MaxLength': '90'" if !resource_group_name.nil? && resource_group_name.length > 90 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MinLength': '1'" if !resource_group_name.nil? && resource_group_name.length < 1 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'Pattern': '^[-\w\._\(\)]+$'" if !resource_group_name.nil? && resource_group_name.match(Regexp.new('^^[-\w\._\(\)]+$$')).nil? fail ArgumentError, 'workspace_name is nil' if workspace_name.nil? fail ArgumentError, 'sql_pool_name is nil' if sql_pool_name.nil? vulnerability_assessment_name = 'default' fail ArgumentError, 'scan_id is nil' if scan_id.nil? request_headers = {} request_headers['Content-Type'] = 'application/json; charset=utf-8' # Set Headers request_headers['x-ms-client-request-id'] = SecureRandom.uuid request_headers['accept-language'] = @client.accept_language unless @client.accept_language.nil? path_template = 'subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Synapse/workspaces/{workspaceName}/sqlPools/{sqlPoolName}/vulnerabilityAssessments/{vulnerabilityAssessmentName}/scans/{scanId}/export' request_url = @base_url || @client.base_url = { middlewares: [[MsRest::RetryPolicyMiddleware, times: 3, retry: 0.02], [:cookie_jar]], path_params: {'subscriptionId' => @client.subscription_id,'resourceGroupName' => resource_group_name,'workspaceName' => workspace_name,'sqlPoolName' => sql_pool_name,'vulnerabilityAssessmentName' => vulnerability_assessment_name,'scanId' => scan_id}, query_params: {'api-version' => @client.api_version}, headers: request_headers.merge(custom_headers || {}), base_url: request_url } promise = @client.make_request_async(:post, path_template, ) promise = promise.then do |result| http_response = result.response status_code = http_response.status response_content = http_response.body unless status_code == 200 || status_code == 201 error_model = JSON.load(response_content) fail MsRestAzure::AzureOperationError.new(result.request, http_response, error_model) end result.request_id = http_response['x-ms-request-id'] unless http_response['x-ms-request-id'].nil? result.correlation_request_id = http_response['x-ms-correlation-request-id'] unless http_response['x-ms-correlation-request-id'].nil? result.client_request_id = http_response['x-ms-client-request-id'] unless http_response['x-ms-client-request-id'].nil? # Deserialize Response if status_code == 200 begin parsed_response = response_content.to_s.empty? ? nil : JSON.load(response_content) result_mapper = Azure::Synapse::Mgmt::V2019_06_01_preview::Models::SqlPoolVulnerabilityAssessmentScansExport.mapper() result.body = @client.deserialize(result_mapper, parsed_response) rescue Exception => e fail MsRest::DeserializationError.new('Error occurred in deserializing the response', e., e.backtrace, result) end end # Deserialize Response if status_code == 201 begin parsed_response = response_content.to_s.empty? ? nil : JSON.load(response_content) result_mapper = Azure::Synapse::Mgmt::V2019_06_01_preview::Models::SqlPoolVulnerabilityAssessmentScansExport.mapper() result.body = @client.deserialize(result_mapper, parsed_response) rescue Exception => e fail MsRest::DeserializationError.new('Error occurred in deserializing the response', e., e.backtrace, result) end end result end promise.execute end |
#export_with_http_info(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Convert an existing scan result to a human readable format. If already exists nothing happens
is case insensitive. retrieve. will be added to the HTTP request.
218 219 220 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 218 def export_with_http_info(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) export_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:custom_headers).value! end |
#get(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ VulnerabilityAssessmentScanRecord
Gets a vulnerability assessment scan record of a Sql pool.
is case insensitive. retrieve. will be added to the HTTP request.
324 325 326 327 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 324 def get(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) response = get_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:custom_headers).value! response.body unless response.nil? end |
#get_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Concurrent::Promise
Gets a vulnerability assessment scan record of a Sql pool.
is case insensitive. retrieve. to the HTTP request.
361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 361 def get_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) fail ArgumentError, '@client.api_version is nil' if @client.api_version.nil? fail ArgumentError, "'@client.api_version' should satisfy the constraint - 'MinLength': '1'" if !@client.api_version.nil? && @client.api_version.length < 1 fail ArgumentError, '@client.subscription_id is nil' if @client.subscription_id.nil? fail ArgumentError, "'@client.subscription_id' should satisfy the constraint - 'MinLength': '1'" if !@client.subscription_id.nil? && @client.subscription_id.length < 1 fail ArgumentError, 'resource_group_name is nil' if resource_group_name.nil? fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MaxLength': '90'" if !resource_group_name.nil? && resource_group_name.length > 90 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MinLength': '1'" if !resource_group_name.nil? && resource_group_name.length < 1 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'Pattern': '^[-\w\._\(\)]+$'" if !resource_group_name.nil? && resource_group_name.match(Regexp.new('^^[-\w\._\(\)]+$$')).nil? fail ArgumentError, 'workspace_name is nil' if workspace_name.nil? fail ArgumentError, 'sql_pool_name is nil' if sql_pool_name.nil? vulnerability_assessment_name = 'default' fail ArgumentError, 'scan_id is nil' if scan_id.nil? request_headers = {} request_headers['Content-Type'] = 'application/json; charset=utf-8' # Set Headers request_headers['x-ms-client-request-id'] = SecureRandom.uuid request_headers['accept-language'] = @client.accept_language unless @client.accept_language.nil? path_template = 'subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Synapse/workspaces/{workspaceName}/sqlPools/{sqlPoolName}/vulnerabilityAssessments/{vulnerabilityAssessmentName}/scans/{scanId}' request_url = @base_url || @client.base_url = { middlewares: [[MsRest::RetryPolicyMiddleware, times: 3, retry: 0.02], [:cookie_jar]], path_params: {'subscriptionId' => @client.subscription_id,'resourceGroupName' => resource_group_name,'workspaceName' => workspace_name,'sqlPoolName' => sql_pool_name,'vulnerabilityAssessmentName' => vulnerability_assessment_name,'scanId' => scan_id}, query_params: {'api-version' => @client.api_version}, headers: request_headers.merge(custom_headers || {}), base_url: request_url } promise = @client.make_request_async(:get, path_template, ) promise = promise.then do |result| http_response = result.response status_code = http_response.status response_content = http_response.body unless status_code == 200 error_model = JSON.load(response_content) fail MsRestAzure::AzureOperationError.new(result.request, http_response, error_model) end result.request_id = http_response['x-ms-request-id'] unless http_response['x-ms-request-id'].nil? result.correlation_request_id = http_response['x-ms-correlation-request-id'] unless http_response['x-ms-correlation-request-id'].nil? result.client_request_id = http_response['x-ms-client-request-id'] unless http_response['x-ms-client-request-id'].nil? # Deserialize Response if status_code == 200 begin parsed_response = response_content.to_s.empty? ? nil : JSON.load(response_content) result_mapper = Azure::Synapse::Mgmt::V2019_06_01_preview::Models::VulnerabilityAssessmentScanRecord.mapper() result.body = @client.deserialize(result_mapper, parsed_response) rescue Exception => e fail MsRest::DeserializationError.new('Error occurred in deserializing the response', e., e.backtrace, result) end end result end promise.execute end |
#get_with_http_info(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Gets a vulnerability assessment scan record of a Sql pool.
is case insensitive. retrieve. will be added to the HTTP request.
343 344 345 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 343 def get_with_http_info(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) get_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:custom_headers).value! end |
#initiate_scan(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Object
Executes a Vulnerability Assessment database scan.
is case insensitive. retrieve. will be added to the HTTP request.
149 150 151 152 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 149 def initiate_scan(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) response = initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:custom_headers).value! nil end |
#initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers: nil) ⇒ Concurrent::Promise
is case insensitive. retrieve. will be added to the HTTP request.
response.
167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 167 def initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:nil) # Send request promise = begin_initiate_scan_async(resource_group_name, workspace_name, sql_pool_name, scan_id, custom_headers:custom_headers) promise = promise.then do |response| # Defining deserialization method. deserialize_method = lambda do |parsed_response| end # Waiting for response. @client.get_long_running_operation_result(response, deserialize_method) end promise end |
#list(resource_group_name, workspace_name, sql_pool_name, custom_headers: nil) ⇒ Array<VulnerabilityAssessmentScanRecord>
Lists the vulnerability assessment scans of a SQL pool
Lists the vulnerability assessment scans of a SQL pool.
is case insensitive. will be added to the HTTP request.
38 39 40 41 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 38 def list(resource_group_name, workspace_name, sql_pool_name, custom_headers:nil) first_page = list_as_lazy(resource_group_name, workspace_name, sql_pool_name, custom_headers:custom_headers) first_page.get_all_items end |
#list_as_lazy(resource_group_name, workspace_name, sql_pool_name, custom_headers: nil) ⇒ VulnerabilityAssessmentScanRecordListResult
Lists the vulnerability assessment scans of a SQL pool
Lists the vulnerability assessment scans of a SQL pool.
is case insensitive. will be added to the HTTP request.
access to pages of the response.
638 639 640 641 642 643 644 645 646 647 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 638 def list_as_lazy(resource_group_name, workspace_name, sql_pool_name, custom_headers:nil) response = list_async(resource_group_name, workspace_name, sql_pool_name, custom_headers:custom_headers).value! unless response.nil? page = response.body page.next_method = Proc.new do |next_page_link| list_next_async(next_page_link, custom_headers:custom_headers) end page end end |
#list_async(resource_group_name, workspace_name, sql_pool_name, custom_headers: nil) ⇒ Concurrent::Promise
Lists the vulnerability assessment scans of a SQL pool
Lists the vulnerability assessment scans of a SQL pool.
is case insensitive. to the HTTP request.
75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 75 def list_async(resource_group_name, workspace_name, sql_pool_name, custom_headers:nil) fail ArgumentError, '@client.api_version is nil' if @client.api_version.nil? fail ArgumentError, "'@client.api_version' should satisfy the constraint - 'MinLength': '1'" if !@client.api_version.nil? && @client.api_version.length < 1 fail ArgumentError, '@client.subscription_id is nil' if @client.subscription_id.nil? fail ArgumentError, "'@client.subscription_id' should satisfy the constraint - 'MinLength': '1'" if !@client.subscription_id.nil? && @client.subscription_id.length < 1 fail ArgumentError, 'resource_group_name is nil' if resource_group_name.nil? fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MaxLength': '90'" if !resource_group_name.nil? && resource_group_name.length > 90 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'MinLength': '1'" if !resource_group_name.nil? && resource_group_name.length < 1 fail ArgumentError, "'resource_group_name' should satisfy the constraint - 'Pattern': '^[-\w\._\(\)]+$'" if !resource_group_name.nil? && resource_group_name.match(Regexp.new('^^[-\w\._\(\)]+$$')).nil? fail ArgumentError, 'workspace_name is nil' if workspace_name.nil? fail ArgumentError, 'sql_pool_name is nil' if sql_pool_name.nil? vulnerability_assessment_name = 'default' request_headers = {} request_headers['Content-Type'] = 'application/json; charset=utf-8' # Set Headers request_headers['x-ms-client-request-id'] = SecureRandom.uuid request_headers['accept-language'] = @client.accept_language unless @client.accept_language.nil? path_template = 'subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Synapse/workspaces/{workspaceName}/sqlPools/{sqlPoolName}/vulnerabilityAssessments/{vulnerabilityAssessmentName}/scans' request_url = @base_url || @client.base_url = { middlewares: [[MsRest::RetryPolicyMiddleware, times: 3, retry: 0.02], [:cookie_jar]], path_params: {'subscriptionId' => @client.subscription_id,'resourceGroupName' => resource_group_name,'workspaceName' => workspace_name,'sqlPoolName' => sql_pool_name,'vulnerabilityAssessmentName' => vulnerability_assessment_name}, query_params: {'api-version' => @client.api_version}, headers: request_headers.merge(custom_headers || {}), base_url: request_url } promise = @client.make_request_async(:get, path_template, ) promise = promise.then do |result| http_response = result.response status_code = http_response.status response_content = http_response.body unless status_code == 200 error_model = JSON.load(response_content) fail MsRestAzure::AzureOperationError.new(result.request, http_response, error_model) end result.request_id = http_response['x-ms-request-id'] unless http_response['x-ms-request-id'].nil? result.correlation_request_id = http_response['x-ms-correlation-request-id'] unless http_response['x-ms-correlation-request-id'].nil? result.client_request_id = http_response['x-ms-client-request-id'] unless http_response['x-ms-client-request-id'].nil? # Deserialize Response if status_code == 200 begin parsed_response = response_content.to_s.empty? ? nil : JSON.load(response_content) result_mapper = Azure::Synapse::Mgmt::V2019_06_01_preview::Models::VulnerabilityAssessmentScanRecordListResult.mapper() result.body = @client.deserialize(result_mapper, parsed_response) rescue Exception => e fail MsRest::DeserializationError.new('Error occurred in deserializing the response', e., e.backtrace, result) end end result end promise.execute end |
#list_next(next_page_link, custom_headers: nil) ⇒ VulnerabilityAssessmentScanRecordListResult
Lists the vulnerability assessment scans of a SQL pool
Lists the vulnerability assessment scans of a SQL pool.
to List operation. will be added to the HTTP request.
539 540 541 542 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 539 def list_next(next_page_link, custom_headers:nil) response = list_next_async(next_page_link, custom_headers:custom_headers).value! response.body unless response.nil? end |
#list_next_async(next_page_link, custom_headers: nil) ⇒ Concurrent::Promise
Lists the vulnerability assessment scans of a SQL pool
Lists the vulnerability assessment scans of a SQL pool.
to List operation. to the HTTP request.
572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 572 def list_next_async(next_page_link, custom_headers:nil) fail ArgumentError, 'next_page_link is nil' if next_page_link.nil? request_headers = {} request_headers['Content-Type'] = 'application/json; charset=utf-8' # Set Headers request_headers['x-ms-client-request-id'] = SecureRandom.uuid request_headers['accept-language'] = @client.accept_language unless @client.accept_language.nil? path_template = '{nextLink}' request_url = @base_url || @client.base_url = { middlewares: [[MsRest::RetryPolicyMiddleware, times: 3, retry: 0.02], [:cookie_jar]], skip_encoding_path_params: {'nextLink' => next_page_link}, headers: request_headers.merge(custom_headers || {}), base_url: request_url } promise = @client.make_request_async(:get, path_template, ) promise = promise.then do |result| http_response = result.response status_code = http_response.status response_content = http_response.body unless status_code == 200 error_model = JSON.load(response_content) fail MsRestAzure::AzureOperationError.new(result.request, http_response, error_model) end result.request_id = http_response['x-ms-request-id'] unless http_response['x-ms-request-id'].nil? result.correlation_request_id = http_response['x-ms-correlation-request-id'] unless http_response['x-ms-correlation-request-id'].nil? result.client_request_id = http_response['x-ms-client-request-id'] unless http_response['x-ms-client-request-id'].nil? # Deserialize Response if status_code == 200 begin parsed_response = response_content.to_s.empty? ? nil : JSON.load(response_content) result_mapper = Azure::Synapse::Mgmt::V2019_06_01_preview::Models::VulnerabilityAssessmentScanRecordListResult.mapper() result.body = @client.deserialize(result_mapper, parsed_response) rescue Exception => e fail MsRest::DeserializationError.new('Error occurred in deserializing the response', e., e.backtrace, result) end end result end promise.execute end |
#list_next_with_http_info(next_page_link, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Lists the vulnerability assessment scans of a SQL pool
Lists the vulnerability assessment scans of a SQL pool.
to List operation. will be added to the HTTP request.
556 557 558 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 556 def list_next_with_http_info(next_page_link, custom_headers:nil) list_next_async(next_page_link, custom_headers:custom_headers).value! end |
#list_with_http_info(resource_group_name, workspace_name, sql_pool_name, custom_headers: nil) ⇒ MsRestAzure::AzureOperationResponse
Lists the vulnerability assessment scans of a SQL pool
Lists the vulnerability assessment scans of a SQL pool.
is case insensitive. will be added to the HTTP request.
57 58 59 |
# File 'lib/2019-06-01-preview/generated/azure_mgmt_synapse/sql_pool_vulnerability_assessment_scans.rb', line 57 def list_with_http_info(resource_group_name, workspace_name, sql_pool_name, custom_headers:nil) list_async(resource_group_name, workspace_name, sql_pool_name, custom_headers:custom_headers).value! end |