1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95
|
# coding=utf-8
# --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# Code generated by Microsoft (R) Python Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# --------------------------------------------------------------------------
from azure.identity import DefaultAzureCredential
from azure.mgmt.recoveryservicesdatareplication import RecoveryServicesDataReplicationMgmtClient
"""
# PREREQUISITES
pip install azure-identity
pip install azure-mgmt-recoveryservicesdatareplication
# USAGE
python private_endpoint_connection_proxy_validate.py
Before run the sample, please set the values of the client ID, tenant ID and client secret
of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID,
AZURE_CLIENT_SECRET. For more info about how to get the value, please see:
https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal
"""
def main():
client = RecoveryServicesDataReplicationMgmtClient(
credential=DefaultAzureCredential(),
subscription_id="SUBSCRIPTION_ID",
)
response = client.private_endpoint_connection_proxies.validate(
resource_group_name="rgswagger_2024-09-01",
vault_name="4",
private_endpoint_connection_proxy_name="d",
body={
"etag": "hruibxrezstxroxrxweh",
"properties": {
"remotePrivateEndpoint": {
"connectionDetails": [
{
"groupId": "pjrlygpadir",
"id": "lenqkogzkes",
"linkIdentifier": "ravfufhkdowufd",
"memberName": "ybuysjrlfupewxe",
"privateIpAddress": "cyiacdzzyqmxjpijjbwgasegehtqe",
}
],
"id": "yipalno",
"manualPrivateLinkServiceConnections": [
{
"groupIds": ["hvejynjktikteipnioyeja"],
"name": "jqwntlzfsksl",
"requestMessage": "bukgzpkvcvfbmcdmpcbiigbvugicqa",
}
],
"privateLinkServiceConnections": [
{
"groupIds": ["hvejynjktikteipnioyeja"],
"name": "jqwntlzfsksl",
"requestMessage": "bukgzpkvcvfbmcdmpcbiigbvugicqa",
}
],
"privateLinkServiceProxies": [
{
"groupConnectivityInformation": [
{
"customerVisibleFqdns": ["vedcg"],
"groupId": "per",
"internalFqdn": "maqavwhxwzzhbzjbryyquvitmup",
"memberName": "ybptuypgdqoxkuwqx",
"privateLinkServiceArmRegion": "rerkqqxinteevmlbrdkktaqhcch",
"redirectMapId": "pezncxcq",
}
],
"id": "nzqxevuyqeedrqnkbnlcyrrrbzxvl",
"remotePrivateEndpointConnection": {"id": "ocunsgawjsqohkrcyxiv"},
"remotePrivateLinkServiceConnectionState": {
"actionsRequired": "afwbq",
"description": "y",
"status": "Approved",
},
}
],
}
},
},
)
print(response)
# x-ms-original-file: 2024-09-01/PrivateEndpointConnectionProxy_Validate.json
if __name__ == "__main__":
main()
|