Skip to content

Use tsp gen code #38429

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 13 commits into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,6 +1,8 @@
# coding=utf-8
# --------------------------------------------------------------------------
# Code generated by Microsoft (R) AutoRest Code Generator (autorest: 3.9.5, generator: @autorest/python@6.28.4)
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# Code generated by Microsoft (R) Python Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# --------------------------------------------------------------------------
# pylint: disable=wrong-import-position
Expand All @@ -10,7 +12,10 @@
if TYPE_CHECKING:
from ._patch import * # pylint: disable=unused-wildcard-import

from ._search_index_client import SearchIndexClient # type: ignore
from ._client import SearchClient # type: ignore
from ._version import VERSION

__version__ = VERSION

try:
from ._patch import __all__ as _patch_all
Expand All @@ -20,7 +25,7 @@
from ._patch import patch_sdk as _patch_sdk

__all__ = [
"SearchIndexClient",
"SearchClient",
]
__all__.extend([p for p in _patch_all if p not in __all__]) # pyright: ignore

Expand Down
Original file line number Diff line number Diff line change
@@ -1,59 +1,70 @@
# coding=utf-8
# --------------------------------------------------------------------------
# Code generated by Microsoft (R) AutoRest Code Generator (autorest: 3.9.5, generator: @autorest/python@6.28.4)
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# Code generated by Microsoft (R) Python Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# --------------------------------------------------------------------------

from copy import deepcopy
from typing import Any
from typing import Any, TYPE_CHECKING, Union
from typing_extensions import Self

from azure.core import PipelineClient
from azure.core.credentials import AzureKeyCredential
from azure.core.pipeline import policies
from azure.core.rest import HttpRequest, HttpResponse

from . import models as _models
from ._configuration import SearchServiceClientConfiguration
from ._configuration import SearchClientConfiguration
from ._serialization import Deserializer, Serializer
from .operations import (
AliasesOperations,
DataSourcesOperations,
DocumentsOperations,
IndexersOperations,
IndexesOperations,
SearchServiceClientOperationsMixin,
SearchClientOperationsMixin,
SkillsetsOperations,
SynonymMapsOperations,
)

if TYPE_CHECKING:
from azure.core.credentials import TokenCredential

class SearchServiceClient(SearchServiceClientOperationsMixin): # pylint: disable=too-many-instance-attributes
"""Client that can be used to manage and query indexes and documents, as well as manage other
resources, on a search service.

class SearchClient(SearchClientOperationsMixin): # pylint: disable=too-many-instance-attributes
"""Client that can be used to manage and query indexes and documents, as well as
manage other resources, on a search service.

:ivar data_sources: DataSourcesOperations operations
:vartype data_sources: azure.search.documents.indexes.operations.DataSourcesOperations
:vartype data_sources: azure.search.documents.operations.DataSourcesOperations
:ivar indexers: IndexersOperations operations
:vartype indexers: azure.search.documents.indexes.operations.IndexersOperations
:vartype indexers: azure.search.documents.operations.IndexersOperations
:ivar skillsets: SkillsetsOperations operations
:vartype skillsets: azure.search.documents.indexes.operations.SkillsetsOperations
:vartype skillsets: azure.search.documents.operations.SkillsetsOperations
:ivar synonym_maps: SynonymMapsOperations operations
:vartype synonym_maps: azure.search.documents.indexes.operations.SynonymMapsOperations
:vartype synonym_maps: azure.search.documents.operations.SynonymMapsOperations
:ivar indexes: IndexesOperations operations
:vartype indexes: azure.search.documents.indexes.operations.IndexesOperations
:vartype indexes: azure.search.documents.operations.IndexesOperations
:ivar aliases: AliasesOperations operations
:vartype aliases: azure.search.documents.indexes.operations.AliasesOperations
:param endpoint: The endpoint URL of the search service. Required.
:vartype aliases: azure.search.documents.operations.AliasesOperations
:ivar documents: DocumentsOperations operations
:vartype documents: azure.search.documents.operations.DocumentsOperations
:param endpoint: Service host. Required.
:type endpoint: str
:keyword api_version: Api Version. Default value is "2025-03-01-preview". Note that overriding
this default value may result in unsupported behavior.
:param credential: Credential used to authenticate requests to the service. Is either a key
credential type or a token credential type. Required.
:type credential: ~azure.core.credentials.AzureKeyCredential or
~azure.core.credentials.TokenCredential
:keyword api_version: The API version to use for this operation. Default value is
"2025-03-01-preview". Note that overriding this default value may result in unsupported
behavior.
:paramtype api_version: str
"""

def __init__( # pylint: disable=missing-client-constructor-parameter-credential
self, endpoint: str, **kwargs: Any
) -> None:
def __init__(self, endpoint: str, credential: Union[AzureKeyCredential, "TokenCredential"], **kwargs: Any) -> None:
_endpoint = "{endpoint}"
self._config = SearchServiceClientConfiguration(endpoint=endpoint, **kwargs)
self._config = SearchClientConfiguration(endpoint=endpoint, credential=credential, **kwargs)
_policies = kwargs.pop("policies", None)
if _policies is None:
_policies = [
Expand All @@ -73,24 +84,24 @@ def __init__( # pylint: disable=missing-client-constructor-parameter-credential
]
self._client: PipelineClient = PipelineClient(base_url=_endpoint, policies=_policies, **kwargs)

client_models = {k: v for k, v in _models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._deserialize = Deserializer(client_models)
self._serialize = Serializer()
self._deserialize = Deserializer()
self._serialize.client_side_validation = False
self.data_sources = DataSourcesOperations(self._client, self._config, self._serialize, self._deserialize)
self.indexers = IndexersOperations(self._client, self._config, self._serialize, self._deserialize)
self.skillsets = SkillsetsOperations(self._client, self._config, self._serialize, self._deserialize)
self.synonym_maps = SynonymMapsOperations(self._client, self._config, self._serialize, self._deserialize)
self.indexes = IndexesOperations(self._client, self._config, self._serialize, self._deserialize)
self.aliases = AliasesOperations(self._client, self._config, self._serialize, self._deserialize)
self.documents = DocumentsOperations(self._client, self._config, self._serialize, self._deserialize)

def _send_request(self, request: HttpRequest, *, stream: bool = False, **kwargs: Any) -> HttpResponse:
def send_request(self, request: HttpRequest, *, stream: bool = False, **kwargs: Any) -> HttpResponse:
"""Runs the network request through the client's chained policies.

>>> from azure.core.rest import HttpRequest
>>> request = HttpRequest("GET", "https://www.example.org/")
<HttpRequest [GET], url: 'https://www.example.org/'>
>>> response = client._send_request(request)
>>> response = client.send_request(request)
<HttpResponse: 200 OK>

For more information on this code flow, see https://aka.ms/azsdk/dpcodegen/python/send_request
Expand Down
Original file line number Diff line number Diff line change
@@ -1,46 +1,63 @@
# coding=utf-8
# --------------------------------------------------------------------------
# Code generated by Microsoft (R) AutoRest Code Generator (autorest: 3.9.5, generator: @autorest/python@6.28.4)
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# Code generated by Microsoft (R) Python Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# --------------------------------------------------------------------------

from typing import Any
from typing import Any, TYPE_CHECKING, Union

from azure.core.credentials import AzureKeyCredential
from azure.core.pipeline import policies

VERSION = "unknown"
from ._version import VERSION

if TYPE_CHECKING:
from azure.core.credentials import TokenCredential

class SearchIndexClientConfiguration: # pylint: disable=too-many-instance-attributes
"""Configuration for SearchIndexClient.

class SearchClientConfiguration: # pylint: disable=too-many-instance-attributes
"""Configuration for SearchClient.

Note that all parameters used to create this instance are saved as instance
attributes.

:param endpoint: The endpoint URL of the search service. Required.
:param endpoint: Service host. Required.
:type endpoint: str
:param index_name: The name of the index. Required.
:type index_name: str
:keyword api_version: Api Version. Default value is "2025-03-01-preview". Note that overriding
this default value may result in unsupported behavior.
:param credential: Credential used to authenticate requests to the service. Is either a key
credential type or a token credential type. Required.
:type credential: ~azure.core.credentials.AzureKeyCredential or
~azure.core.credentials.TokenCredential
:keyword api_version: The API version to use for this operation. Default value is
"2025-03-01-preview". Note that overriding this default value may result in unsupported
behavior.
:paramtype api_version: str
"""

def __init__(self, endpoint: str, index_name: str, **kwargs: Any) -> None:
def __init__(self, endpoint: str, credential: Union[AzureKeyCredential, "TokenCredential"], **kwargs: Any) -> None:
api_version: str = kwargs.pop("api_version", "2025-03-01-preview")

if endpoint is None:
raise ValueError("Parameter 'endpoint' must not be None.")
if index_name is None:
raise ValueError("Parameter 'index_name' must not be None.")
if credential is None:
raise ValueError("Parameter 'credential' must not be None.")

self.endpoint = endpoint
self.index_name = index_name
self.credential = credential
self.api_version = api_version
kwargs.setdefault("sdk_moniker", "searchindexclient/{}".format(VERSION))
self.credential_scopes = kwargs.pop("credential_scopes", ["https://search.azure.com/.default"])
kwargs.setdefault("sdk_moniker", "search-documents/{}".format(VERSION))
self.polling_interval = kwargs.get("polling_interval", 30)
self._configure(**kwargs)

def _infer_policy(self, **kwargs):
if isinstance(self.credential, AzureKeyCredential):
return policies.AzureKeyCredentialPolicy(self.credential, "api-key", **kwargs)
if hasattr(self.credential, "get_token"):
return policies.BearerTokenCredentialPolicy(self.credential, *self.credential_scopes, **kwargs)
raise TypeError(f"Unsupported credential: {self.credential}")

def _configure(self, **kwargs: Any) -> None:
self.user_agent_policy = kwargs.get("user_agent_policy") or policies.UserAgentPolicy(**kwargs)
self.headers_policy = kwargs.get("headers_policy") or policies.HeadersPolicy(**kwargs)
Expand All @@ -51,3 +68,5 @@ def _configure(self, **kwargs: Any) -> None:
self.redirect_policy = kwargs.get("redirect_policy") or policies.RedirectPolicy(**kwargs)
self.retry_policy = kwargs.get("retry_policy") or policies.RetryPolicy(**kwargs)
self.authentication_policy = kwargs.get("authentication_policy")
if self.credential and not self.authentication_policy:
self.authentication_policy = self._infer_policy(**kwargs)
Loading