From 657c560bead7c7738ee61214893fb6eb16e433fe Mon Sep 17 00:00:00 2001 From: Azure SDK for Python bot Date: Mon, 4 Feb 2019 10:17:21 -0800 Subject: [PATCH] [AutoPR containerservice/resource-manager] Revert "[AKS] add apiServerAuthorizedIPRanges property" (#4302) * Generated from 61675bba89c552d90ca1f94fa73f32d9419bb26d Revert "[AKS] add apiServerAuthorizedIPRanges property (#5101)" This reverts commit 8d178c32246fded822657e6db2c2598a9db0d19a. * Packaging update of azure-mgmt-containerservice --- azure-mgmt-containerservice/README.rst | 19 ------------------- .../v2018_03_31/models/managed_cluster.py | 5 ----- .../v2018_03_31/models/managed_cluster_py3.py | 7 +------ .../models/managed_cluster.py | 5 ----- .../models/managed_cluster_py3.py | 7 +------ 5 files changed, 2 insertions(+), 41 deletions(-) diff --git a/azure-mgmt-containerservice/README.rst b/azure-mgmt-containerservice/README.rst index 92bf434c9d09..e12d590b52dc 100644 --- a/azure-mgmt-containerservice/README.rst +++ b/azure-mgmt-containerservice/README.rst @@ -14,25 +14,6 @@ For the older Azure Service Management (ASM) libraries, see For a more complete set of Azure libraries, see the `azure `__ bundle package. -Compatibility -============= - -**IMPORTANT**: If you have an earlier version of the azure package -(version < 1.0), you should uninstall it before installing this package. - -You can check the version using pip: - -.. code:: shell - - pip freeze - -If you see azure==0.11.0 (or any version below 1.0), uninstall it first: - -.. code:: shell - - pip uninstall azure - - Usage ===== diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py index 0319ef151af0..622b3450c0e5 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py @@ -67,9 +67,6 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile - :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes - API server. - :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -100,7 +97,6 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, - 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -117,4 +113,3 @@ def __init__(self, **kwargs): self.enable_rbac = kwargs.get('enable_rbac', None) self.network_profile = kwargs.get('network_profile', None) self.aad_profile = kwargs.get('aad_profile', None) - self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py index 5d469d9cabc2..706e0f347849 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py @@ -67,9 +67,6 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile - :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes - API server. - :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -100,10 +97,9 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, - 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } - def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None: + def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None: super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs) self.provisioning_state = None self.kubernetes_version = kubernetes_version @@ -117,4 +113,3 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn self.enable_rbac = enable_rbac self.network_profile = network_profile self.aad_profile = aad_profile - self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py index 8864f98b7a6d..554e00888876 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py @@ -66,9 +66,6 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile - :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes - API server. - :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -99,7 +96,6 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, - 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -116,4 +112,3 @@ def __init__(self, **kwargs): self.enable_rbac = kwargs.get('enable_rbac', None) self.network_profile = kwargs.get('network_profile', None) self.aad_profile = kwargs.get('aad_profile', None) - self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py index 04d1589d1184..710286bd0a9f 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py @@ -66,9 +66,6 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile - :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes - API server. - :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -99,10 +96,9 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, - 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } - def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None: + def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None: super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs) self.provisioning_state = None self.kubernetes_version = kubernetes_version @@ -116,4 +112,3 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn self.enable_rbac = enable_rbac self.network_profile = network_profile self.aad_profile = aad_profile - self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges