forked from Azure/azure-rest-api-specs
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Microsoft.Authorization 2020-09-01 policy entity APIs (Azure#11712)
* Copy old specs to new path * Add 2020-09-01 policy entities * Add description * Fix prettier * Fix schema and python * Remove preview API from stable tag * Fix go path * Small amount of swagger validation cleanup * Fix prettier violation * Remove obsolete sku property * Fix GO readme ordering * Partially revert GO ordering
- Loading branch information
Showing
47 changed files
with
5,077 additions
and
0 deletions.
There are no files selected for viewing
90 changes: 90 additions & 0 deletions
90
...er/Microsoft.Authorization/stable/2020-09-01/examples/createOrUpdatePolicyDefinition.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,90 @@ | ||
{ | ||
"parameters": { | ||
"subscriptionId": "ae640e6b-ba3e-4256-9d62-2993eecfa6f2", | ||
"policyDefinitionName": "ResourceNaming", | ||
"api-version": "2020-09-01", | ||
"parameters": { | ||
"properties": { | ||
"mode": "All", | ||
"displayName": "Enforce resource naming convention", | ||
"description": "Force resource names to begin with given 'prefix' and/or end with given 'suffix'", | ||
"metadata": { | ||
"category": "Naming" | ||
}, | ||
"policyRule": { | ||
"if": { | ||
"not": { | ||
"field": "name", | ||
"like": "[concat(parameters('prefix'), '*', parameters('suffix'))]" | ||
} | ||
}, | ||
"then": { | ||
"effect": "deny" | ||
} | ||
}, | ||
"parameters": { | ||
"prefix": { | ||
"type": "String", | ||
"metadata": { | ||
"displayName": "Prefix", | ||
"description": "Resource name prefix" | ||
} | ||
}, | ||
"suffix": { | ||
"type": "String", | ||
"metadata": { | ||
"displayName": "Suffix", | ||
"description": "Resource name suffix" | ||
} | ||
} | ||
} | ||
} | ||
} | ||
}, | ||
"responses": { | ||
"201": { | ||
"headers": {}, | ||
"body": { | ||
"id": "/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming", | ||
"type": "Microsoft.Authorization/policyDefinitions", | ||
"name": "ResourceNaming", | ||
"properties": { | ||
"mode": "All", | ||
"displayName": "Naming Convention", | ||
"description": "Force resource names to begin with 'prefix' and end with 'suffix'", | ||
"metadata": { | ||
"category": "Naming" | ||
}, | ||
"policyRule": { | ||
"if": { | ||
"not": { | ||
"field": "name", | ||
"like": "[concat(parameters('prefix'), '*', parameters('suffix'))]" | ||
} | ||
}, | ||
"then": { | ||
"effect": "deny" | ||
} | ||
}, | ||
"parameters": { | ||
"prefix": { | ||
"type": "String", | ||
"metadata": { | ||
"displayName": "Prefix", | ||
"description": "Resource name prefix" | ||
} | ||
}, | ||
"suffix": { | ||
"type": "String", | ||
"metadata": { | ||
"displayName": "Suffix", | ||
"description": "Resource name suffix" | ||
} | ||
} | ||
}, | ||
"policyType": "Custom" | ||
} | ||
} | ||
} | ||
} | ||
} |
117 changes: 117 additions & 0 deletions
117
...uthorization/stable/2020-09-01/examples/createOrUpdatePolicyDefinitionAdvancedParams.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,117 @@ | ||
{ | ||
"parameters": { | ||
"subscriptionId": "ae640e6b-ba3e-4256-9d62-2993eecfa6f2", | ||
"policyDefinitionName": "EventHubDiagnosticLogs", | ||
"api-version": "2020-09-01", | ||
"parameters": { | ||
"properties": { | ||
"mode": "Indexed", | ||
"displayName": "Event Hubs should have diagnostic logging enabled", | ||
"description": "Audit enabling of logs and retain them up to a year. This enables recreation of activity trails for investigation purposes when a security incident occurs or your network is compromised", | ||
"metadata": { | ||
"category": "Event Hub" | ||
}, | ||
"policyRule": { | ||
"if": { | ||
"field": "type", | ||
"equals": "Microsoft.EventHub/namespaces" | ||
}, | ||
"then": { | ||
"effect": "AuditIfNotExists", | ||
"details": { | ||
"type": "Microsoft.Insights/diagnosticSettings", | ||
"existenceCondition": { | ||
"allOf": [ | ||
{ | ||
"field": "Microsoft.Insights/diagnosticSettings/logs[*].retentionPolicy.enabled", | ||
"equals": "true" | ||
}, | ||
{ | ||
"field": "Microsoft.Insights/diagnosticSettings/logs[*].retentionPolicy.days", | ||
"equals": "[parameters('requiredRetentionDays')]" | ||
} | ||
] | ||
} | ||
} | ||
} | ||
}, | ||
"parameters": { | ||
"requiredRetentionDays": { | ||
"type": "Integer", | ||
"defaultValue": 365, | ||
"allowedValues": [ | ||
0, | ||
30, | ||
90, | ||
180, | ||
365 | ||
], | ||
"metadata": { | ||
"displayName": "Required retention (days)", | ||
"description": "The required diagnostic logs retention in days" | ||
} | ||
} | ||
} | ||
} | ||
} | ||
}, | ||
"responses": { | ||
"201": { | ||
"headers": {}, | ||
"body": { | ||
"id": "/subscriptions/ae640e6b-ba3e-4256-9d62-2993eecfa6f2/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming", | ||
"type": "Microsoft.Authorization/policyDefinitions", | ||
"name": "ResourceNaming", | ||
"properties": { | ||
"mode": "Indexed", | ||
"displayName": "Event Hubs should have diagnostic logging enabled", | ||
"description": "Audit enabling of logs and retain them up to a year. This enables recreation of activity trails for investigation purposes when a security incident occurs or your network is compromised", | ||
"metadata": { | ||
"category": "Event Hub" | ||
}, | ||
"policyRule": { | ||
"if": { | ||
"field": "type", | ||
"equals": "Microsoft.EventHub/namespaces" | ||
}, | ||
"then": { | ||
"effect": "AuditIfNotExists", | ||
"details": { | ||
"type": "Microsoft.Insights/diagnosticSettings", | ||
"existenceCondition": { | ||
"allOf": [ | ||
{ | ||
"field": "Microsoft.Insights/diagnosticSettings/logs[*].retentionPolicy.enabled", | ||
"equals": "true" | ||
}, | ||
{ | ||
"field": "Microsoft.Insights/diagnosticSettings/logs[*].retentionPolicy.days", | ||
"equals": "[parameters('requiredRetentionDays')]" | ||
} | ||
] | ||
} | ||
} | ||
} | ||
}, | ||
"parameters": { | ||
"requiredRetentionDays": { | ||
"type": "Integer", | ||
"defaultValue": 365, | ||
"allowedValues": [ | ||
0, | ||
30, | ||
90, | ||
180, | ||
365 | ||
], | ||
"metadata": { | ||
"displayName": "Required retention (days)", | ||
"description": "The required diagnostic logs retention in days" | ||
} | ||
} | ||
} | ||
} | ||
} | ||
} | ||
} | ||
} |
90 changes: 90 additions & 0 deletions
90
...orization/stable/2020-09-01/examples/createOrUpdatePolicyDefinitionAtManagementGroup.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,90 @@ | ||
{ | ||
"parameters": { | ||
"managementGroupId": "MyManagementGroup", | ||
"policyDefinitionName": "ResourceNaming", | ||
"api-version": "2020-09-01", | ||
"parameters": { | ||
"properties": { | ||
"mode": "All", | ||
"displayName": "Enforce resource naming convention", | ||
"description": "Force resource names to begin with given 'prefix' and/or end with given 'suffix'", | ||
"metadata": { | ||
"category": "Naming" | ||
}, | ||
"policyRule": { | ||
"if": { | ||
"not": { | ||
"field": "name", | ||
"like": "[concat(parameters('prefix'), '*', parameters('suffix'))]" | ||
} | ||
}, | ||
"then": { | ||
"effect": "deny" | ||
} | ||
}, | ||
"parameters": { | ||
"prefix": { | ||
"type": "String", | ||
"metadata": { | ||
"displayName": "Prefix", | ||
"description": "Resource name prefix" | ||
} | ||
}, | ||
"suffix": { | ||
"type": "String", | ||
"metadata": { | ||
"displayName": "Suffix", | ||
"description": "Resource name suffix" | ||
} | ||
} | ||
} | ||
} | ||
} | ||
}, | ||
"responses": { | ||
"201": { | ||
"headers": {}, | ||
"body": { | ||
"id": "/providers/Microsoft.Management/managementgroups/MyManagementGroup/providers/Microsoft.Authorization/policyDefinitions/ResourceNaming", | ||
"type": "Microsoft.Authorization/policyDefinitions", | ||
"name": "ResourceNaming", | ||
"properties": { | ||
"mode": "All", | ||
"displayName": "Naming Convention", | ||
"description": "Force resource names to begin with 'prefix' and end with 'suffix'", | ||
"metadata": { | ||
"category": "Naming" | ||
}, | ||
"policyRule": { | ||
"if": { | ||
"not": { | ||
"field": "name", | ||
"like": "[concat(parameters('prefix'), '*', parameters('suffix'))]" | ||
} | ||
}, | ||
"then": { | ||
"effect": "deny" | ||
} | ||
}, | ||
"parameters": { | ||
"prefix": { | ||
"type": "String", | ||
"metadata": { | ||
"displayName": "Prefix", | ||
"description": "Resource name prefix" | ||
} | ||
}, | ||
"suffix": { | ||
"type": "String", | ||
"metadata": { | ||
"displayName": "Suffix", | ||
"description": "Resource name suffix" | ||
} | ||
} | ||
}, | ||
"policyType": "Custom" | ||
} | ||
} | ||
} | ||
} | ||
} |
Oops, something went wrong.