1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163
|
# coding=utf-8
# --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# Code generated by Microsoft (R) AutoRest Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# --------------------------------------------------------------------------
from copy import deepcopy
from typing import Any, Optional, TYPE_CHECKING, cast
from typing_extensions import Self
from azure.core.pipeline import policies
from azure.core.rest import HttpRequest, HttpResponse
from azure.core.settings import settings
from azure.mgmt.core import ARMPipelineClient
from azure.mgmt.core.policies import ARMAutoResourceProviderRegistrationPolicy
from azure.mgmt.core.tools import get_arm_endpoints
from . import models as _models
from ._configuration import PolicyClientConfiguration
from ._utils.serialization import Deserializer, Serializer
from .operations import (
DataPolicyManifestsOperations,
PolicyAssignmentsOperations,
PolicyDefinitionVersionsOperations,
PolicyDefinitionsOperations,
PolicyExemptionsOperations,
PolicySetDefinitionVersionsOperations,
PolicySetDefinitionsOperations,
VariableValuesOperations,
VariablesOperations,
)
if TYPE_CHECKING:
from azure.core.credentials import TokenCredential
class PolicyClient: # pylint: disable=client-accepts-api-version-keyword,too-many-instance-attributes
"""To manage and control access to your resources, you can define customized policies and assign
them at a scope.
:ivar data_policy_manifests: DataPolicyManifestsOperations operations
:vartype data_policy_manifests:
azure.mgmt.resource.policy.operations.DataPolicyManifestsOperations
:ivar policy_definitions: PolicyDefinitionsOperations operations
:vartype policy_definitions: azure.mgmt.resource.policy.operations.PolicyDefinitionsOperations
:ivar policy_definition_versions: PolicyDefinitionVersionsOperations operations
:vartype policy_definition_versions:
azure.mgmt.resource.policy.operations.PolicyDefinitionVersionsOperations
:ivar policy_set_definitions: PolicySetDefinitionsOperations operations
:vartype policy_set_definitions:
azure.mgmt.resource.policy.operations.PolicySetDefinitionsOperations
:ivar policy_set_definition_versions: PolicySetDefinitionVersionsOperations operations
:vartype policy_set_definition_versions:
azure.mgmt.resource.policy.operations.PolicySetDefinitionVersionsOperations
:ivar policy_assignments: PolicyAssignmentsOperations operations
:vartype policy_assignments: azure.mgmt.resource.policy.operations.PolicyAssignmentsOperations
:ivar policy_exemptions: PolicyExemptionsOperations operations
:vartype policy_exemptions: azure.mgmt.resource.policy.operations.PolicyExemptionsOperations
:ivar variables: VariablesOperations operations
:vartype variables: azure.mgmt.resource.policy.operations.VariablesOperations
:ivar variable_values: VariableValuesOperations operations
:vartype variable_values: azure.mgmt.resource.policy.operations.VariableValuesOperations
:param credential: Credential needed for the client to connect to Azure. Required.
:type credential: ~azure.core.credentials.TokenCredential
:param subscription_id: The ID of the target subscription. The value must be an UUID. Required.
:type subscription_id: str
:param base_url: Service URL. Default value is None.
:type base_url: str
"""
def __init__(
self, credential: "TokenCredential", subscription_id: str, base_url: Optional[str] = None, **kwargs: Any
) -> None:
_cloud = kwargs.pop("cloud_setting", None) or settings.current.azure_cloud # type: ignore
_endpoints = get_arm_endpoints(_cloud)
if not base_url:
base_url = _endpoints["resource_manager"]
credential_scopes = kwargs.pop("credential_scopes", _endpoints["credential_scopes"])
self._config = PolicyClientConfiguration(
credential=credential, subscription_id=subscription_id, credential_scopes=credential_scopes, **kwargs
)
_policies = kwargs.pop("policies", None)
if _policies is None:
_policies = [
policies.RequestIdPolicy(**kwargs),
self._config.headers_policy,
self._config.user_agent_policy,
self._config.proxy_policy,
policies.ContentDecodePolicy(**kwargs),
ARMAutoResourceProviderRegistrationPolicy(),
self._config.redirect_policy,
self._config.retry_policy,
self._config.authentication_policy,
self._config.custom_hook_policy,
self._config.logging_policy,
policies.DistributedTracingPolicy(**kwargs),
policies.SensitiveHeaderCleanupPolicy(**kwargs) if self._config.redirect_policy else None,
self._config.http_logging_policy,
]
self._client: ARMPipelineClient = ARMPipelineClient(base_url=cast(str, base_url), policies=_policies, **kwargs)
client_models = {k: v for k, v in _models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._deserialize = Deserializer(client_models)
self._serialize.client_side_validation = False
self.data_policy_manifests = DataPolicyManifestsOperations(
self._client, self._config, self._serialize, self._deserialize
)
self.policy_definitions = PolicyDefinitionsOperations(
self._client, self._config, self._serialize, self._deserialize
)
self.policy_definition_versions = PolicyDefinitionVersionsOperations(
self._client, self._config, self._serialize, self._deserialize
)
self.policy_set_definitions = PolicySetDefinitionsOperations(
self._client, self._config, self._serialize, self._deserialize
)
self.policy_set_definition_versions = PolicySetDefinitionVersionsOperations(
self._client, self._config, self._serialize, self._deserialize
)
self.policy_assignments = PolicyAssignmentsOperations(
self._client, self._config, self._serialize, self._deserialize
)
self.policy_exemptions = PolicyExemptionsOperations(
self._client, self._config, self._serialize, self._deserialize
)
self.variables = VariablesOperations(self._client, self._config, self._serialize, self._deserialize)
self.variable_values = VariableValuesOperations(self._client, self._config, self._serialize, self._deserialize)
def _send_request(self, request: HttpRequest, *, stream: bool = False, **kwargs: Any) -> HttpResponse:
"""Runs the network request through the client's chained policies.
>>> from azure.core.rest import HttpRequest
>>> request = HttpRequest("GET", "https://www.example.org/")
<HttpRequest [GET], url: 'https://www.example.org/'>
>>> response = client._send_request(request)
<HttpResponse: 200 OK>
For more information on this code flow, see https://aka.ms/azsdk/dpcodegen/python/send_request
:param request: The network request you want to make. Required.
:type request: ~azure.core.rest.HttpRequest
:keyword bool stream: Whether the response payload will be streamed. Defaults to False.
:return: The response of your network call. Does not do error handling on your response.
:rtype: ~azure.core.rest.HttpResponse
"""
request_copy = deepcopy(request)
request_copy.url = self._client.format_url(request_copy.url)
return self._client.send_request(request_copy, stream=stream, **kwargs) # type: ignore
def close(self) -> None:
self._client.close()
def __enter__(self) -> Self:
self._client.__enter__()
return self
def __exit__(self, *exc_details: Any) -> None:
self._client.__exit__(*exc_details)
|