From 9bade8d4dbc6ff05e6640334859c94aed62a4ac5 Mon Sep 17 00:00:00 2001 From: Azure SDK for Python bot Date: Mon, 28 Jan 2019 12:48:25 -0800 Subject: [PATCH 1/4] Generated from ef1287831662781cf21ee0d9a732217aea8eab9c (#4246) [AKS] add apiServerAuthorizedIPRanges property --- .../containerservice/v2018_03_31/models/managed_cluster.py | 5 +++++ .../v2018_03_31/models/managed_cluster_py3.py | 7 ++++++- .../v2018_08_01_preview/models/managed_cluster.py | 5 +++++ .../v2018_08_01_preview/models/managed_cluster_py3.py | 7 ++++++- 4 files changed, 22 insertions(+), 2 deletions(-) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py index 622b3450c0e5..0319ef151af0 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py @@ -67,6 +67,9 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile + :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes + API server. + :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -97,6 +100,7 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, + 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -113,3 +117,4 @@ def __init__(self, **kwargs): self.enable_rbac = kwargs.get('enable_rbac', None) self.network_profile = kwargs.get('network_profile', None) self.aad_profile = kwargs.get('aad_profile', None) + self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py index 706e0f347849..5d469d9cabc2 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py @@ -67,6 +67,9 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile + :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes + API server. + :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -97,9 +100,10 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, + 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } - def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None: + def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None: super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs) self.provisioning_state = None self.kubernetes_version = kubernetes_version @@ -113,3 +117,4 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn self.enable_rbac = enable_rbac self.network_profile = network_profile self.aad_profile = aad_profile + self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py index 554e00888876..8864f98b7a6d 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py @@ -66,6 +66,9 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile + :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes + API server. + :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -96,6 +99,7 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, + 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -112,3 +116,4 @@ def __init__(self, **kwargs): self.enable_rbac = kwargs.get('enable_rbac', None) self.network_profile = kwargs.get('network_profile', None) self.aad_profile = kwargs.get('aad_profile', None) + self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py index 710286bd0a9f..04d1589d1184 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py @@ -66,6 +66,9 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile + :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes + API server. + :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -96,9 +99,10 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, + 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } - def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None: + def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None: super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs) self.provisioning_state = None self.kubernetes_version = kubernetes_version @@ -112,3 +116,4 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn self.enable_rbac = enable_rbac self.network_profile = network_profile self.aad_profile = aad_profile + self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges From c3048af99cf6a3e195661455263ec40113187dba Mon Sep 17 00:00:00 2001 From: Azure SDK for Python bot Date: Wed, 30 Jan 2019 22:10:07 +0000 Subject: [PATCH 2/4] Generated from 8422e3797ea876c0e05c5fcbc78a8dc83ac68f88 [AKS] add availabilityZones to agent pool profile --- .../models/managed_cluster_agent_pool_profile.py | 4 ++++ .../models/managed_cluster_agent_pool_profile_py3.py | 6 +++++- 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile.py index de4cb740d6c0..c373a5304f92 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile.py @@ -101,6 +101,8 @@ class ManagedClusterAgentPoolProfile(Model): values include: 'VirtualMachineScaleSets', 'AvailabilitySet' :type type: str or ~azure.mgmt.containerservice.v2018_08_01_preview.models.AgentPoolType + :param availability_zones: Availability zones for nodes + :type availability_zones: list[str] """ _validation = { @@ -121,6 +123,7 @@ class ManagedClusterAgentPoolProfile(Model): 'min_count': {'key': 'minCount', 'type': 'int'}, 'enable_auto_scaling': {'key': 'enableAutoScaling', 'type': 'bool'}, 'type': {'key': 'type', 'type': 'str'}, + 'availability_zones': {'key': 'availabilityZones', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -136,3 +139,4 @@ def __init__(self, **kwargs): self.min_count = kwargs.get('min_count', None) self.enable_auto_scaling = kwargs.get('enable_auto_scaling', None) self.type = kwargs.get('type', None) + self.availability_zones = kwargs.get('availability_zones', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile_py3.py index 46a260aa73c3..31f9abbe997c 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile_py3.py @@ -101,6 +101,8 @@ class ManagedClusterAgentPoolProfile(Model): values include: 'VirtualMachineScaleSets', 'AvailabilitySet' :type type: str or ~azure.mgmt.containerservice.v2018_08_01_preview.models.AgentPoolType + :param availability_zones: Availability zones for nodes + :type availability_zones: list[str] """ _validation = { @@ -121,9 +123,10 @@ class ManagedClusterAgentPoolProfile(Model): 'min_count': {'key': 'minCount', 'type': 'int'}, 'enable_auto_scaling': {'key': 'enableAutoScaling', 'type': 'bool'}, 'type': {'key': 'type', 'type': 'str'}, + 'availability_zones': {'key': 'availabilityZones', 'type': '[str]'}, } - def __init__(self, *, name: str, vm_size, count: int=1, os_disk_size_gb: int=None, vnet_subnet_id: str=None, max_pods: int=None, os_type="Linux", max_count: int=None, min_count: int=None, enable_auto_scaling: bool=None, type=None, **kwargs) -> None: + def __init__(self, *, name: str, vm_size, count: int=1, os_disk_size_gb: int=None, vnet_subnet_id: str=None, max_pods: int=None, os_type="Linux", max_count: int=None, min_count: int=None, enable_auto_scaling: bool=None, type=None, availability_zones=None, **kwargs) -> None: super(ManagedClusterAgentPoolProfile, self).__init__(**kwargs) self.name = name self.count = count @@ -136,3 +139,4 @@ def __init__(self, *, name: str, vm_size, count: int=1, os_disk_size_gb: int=Non self.min_count = min_count self.enable_auto_scaling = enable_auto_scaling self.type = type + self.availability_zones = availability_zones From befb1c2bb3d568ab41a197a20bb708ac080adc0e Mon Sep 17 00:00:00 2001 From: azuresdkci Date: Wed, 30 Jan 2019 22:14:18 +0000 Subject: [PATCH 3/4] Packaging update of azure-mgmt-containerservice --- azure-mgmt-containerservice/README.rst | 19 ------------------- 1 file changed, 19 deletions(-) diff --git a/azure-mgmt-containerservice/README.rst b/azure-mgmt-containerservice/README.rst index 92bf434c9d09..e12d590b52dc 100644 --- a/azure-mgmt-containerservice/README.rst +++ b/azure-mgmt-containerservice/README.rst @@ -14,25 +14,6 @@ For the older Azure Service Management (ASM) libraries, see For a more complete set of Azure libraries, see the `azure `__ bundle package. -Compatibility -============= - -**IMPORTANT**: If you have an earlier version of the azure package -(version < 1.0), you should uninstall it before installing this package. - -You can check the version using pip: - -.. code:: shell - - pip freeze - -If you see azure==0.11.0 (or any version below 1.0), uninstall it first: - -.. code:: shell - - pip uninstall azure - - Usage ===== From 3c3e60387918319cfa51defc07a2bffe09770a18 Mon Sep 17 00:00:00 2001 From: Azure SDK for Python bot Date: Tue, 5 Feb 2019 21:45:05 +0000 Subject: [PATCH 4/4] Generated from 327c434f20c43385d70ce909fea8aabd32306a95 [AKS] add availabilityZones to agent pool profile --- .../containerservice/v2018_03_31/models/managed_cluster.py | 5 ----- .../v2018_03_31/models/managed_cluster_py3.py | 7 +------ .../v2018_08_01_preview/models/managed_cluster.py | 5 ----- .../models/managed_cluster_agent_pool_profile.py | 4 ---- .../models/managed_cluster_agent_pool_profile_py3.py | 6 +----- .../v2018_08_01_preview/models/managed_cluster_py3.py | 7 +------ 6 files changed, 3 insertions(+), 31 deletions(-) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py index 0319ef151af0..622b3450c0e5 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py @@ -67,9 +67,6 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile - :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes - API server. - :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -100,7 +97,6 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, - 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -117,4 +113,3 @@ def __init__(self, **kwargs): self.enable_rbac = kwargs.get('enable_rbac', None) self.network_profile = kwargs.get('network_profile', None) self.aad_profile = kwargs.get('aad_profile', None) - self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py index 5d469d9cabc2..706e0f347849 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py @@ -67,9 +67,6 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile - :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes - API server. - :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -100,10 +97,9 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, - 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } - def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None: + def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None: super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs) self.provisioning_state = None self.kubernetes_version = kubernetes_version @@ -117,4 +113,3 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn self.enable_rbac = enable_rbac self.network_profile = network_profile self.aad_profile = aad_profile - self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py index 8864f98b7a6d..554e00888876 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py @@ -66,9 +66,6 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile - :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes - API server. - :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -99,7 +96,6 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, - 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -116,4 +112,3 @@ def __init__(self, **kwargs): self.enable_rbac = kwargs.get('enable_rbac', None) self.network_profile = kwargs.get('network_profile', None) self.aad_profile = kwargs.get('aad_profile', None) - self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile.py index c373a5304f92..de4cb740d6c0 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile.py @@ -101,8 +101,6 @@ class ManagedClusterAgentPoolProfile(Model): values include: 'VirtualMachineScaleSets', 'AvailabilitySet' :type type: str or ~azure.mgmt.containerservice.v2018_08_01_preview.models.AgentPoolType - :param availability_zones: Availability zones for nodes - :type availability_zones: list[str] """ _validation = { @@ -123,7 +121,6 @@ class ManagedClusterAgentPoolProfile(Model): 'min_count': {'key': 'minCount', 'type': 'int'}, 'enable_auto_scaling': {'key': 'enableAutoScaling', 'type': 'bool'}, 'type': {'key': 'type', 'type': 'str'}, - 'availability_zones': {'key': 'availabilityZones', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -139,4 +136,3 @@ def __init__(self, **kwargs): self.min_count = kwargs.get('min_count', None) self.enable_auto_scaling = kwargs.get('enable_auto_scaling', None) self.type = kwargs.get('type', None) - self.availability_zones = kwargs.get('availability_zones', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile_py3.py index 31f9abbe997c..46a260aa73c3 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_agent_pool_profile_py3.py @@ -101,8 +101,6 @@ class ManagedClusterAgentPoolProfile(Model): values include: 'VirtualMachineScaleSets', 'AvailabilitySet' :type type: str or ~azure.mgmt.containerservice.v2018_08_01_preview.models.AgentPoolType - :param availability_zones: Availability zones for nodes - :type availability_zones: list[str] """ _validation = { @@ -123,10 +121,9 @@ class ManagedClusterAgentPoolProfile(Model): 'min_count': {'key': 'minCount', 'type': 'int'}, 'enable_auto_scaling': {'key': 'enableAutoScaling', 'type': 'bool'}, 'type': {'key': 'type', 'type': 'str'}, - 'availability_zones': {'key': 'availabilityZones', 'type': '[str]'}, } - def __init__(self, *, name: str, vm_size, count: int=1, os_disk_size_gb: int=None, vnet_subnet_id: str=None, max_pods: int=None, os_type="Linux", max_count: int=None, min_count: int=None, enable_auto_scaling: bool=None, type=None, availability_zones=None, **kwargs) -> None: + def __init__(self, *, name: str, vm_size, count: int=1, os_disk_size_gb: int=None, vnet_subnet_id: str=None, max_pods: int=None, os_type="Linux", max_count: int=None, min_count: int=None, enable_auto_scaling: bool=None, type=None, **kwargs) -> None: super(ManagedClusterAgentPoolProfile, self).__init__(**kwargs) self.name = name self.count = count @@ -139,4 +136,3 @@ def __init__(self, *, name: str, vm_size, count: int=1, os_disk_size_gb: int=Non self.min_count = min_count self.enable_auto_scaling = enable_auto_scaling self.type = type - self.availability_zones = availability_zones diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py index 04d1589d1184..710286bd0a9f 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py @@ -66,9 +66,6 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile - :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes - API server. - :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -99,10 +96,9 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, - 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } - def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None: + def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None: super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs) self.provisioning_state = None self.kubernetes_version = kubernetes_version @@ -116,4 +112,3 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn self.enable_rbac = enable_rbac self.network_profile = network_profile self.aad_profile = aad_profile - self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges