Skip to content

Commit

Permalink
[AutoPR containerservice/resource-manager] Revert "[AKS] add apiServe…
Browse files Browse the repository at this point in the history
…rAuthorizedIPRanges property" (#4302)

* Generated from 61675bba89c552d90ca1f94fa73f32d9419bb26d

Revert "[AKS] add apiServerAuthorizedIPRanges property (#5101)"

This reverts commit 8d178c3.

* Packaging update of azure-mgmt-containerservice
  • Loading branch information
AutorestCI authored Feb 4, 2019
1 parent 9bade8d commit 657c560
Show file tree
Hide file tree
Showing 5 changed files with 2 additions and 41 deletions.
19 changes: 0 additions & 19 deletions azure-mgmt-containerservice/README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -14,25 +14,6 @@ For the older Azure Service Management (ASM) libraries, see
For a more complete set of Azure libraries, see the `azure <https://pypi.python.org/pypi/azure>`__ bundle package.


Compatibility
=============

**IMPORTANT**: If you have an earlier version of the azure package
(version < 1.0), you should uninstall it before installing this package.

You can check the version using pip:

.. code:: shell
pip freeze
If you see azure==0.11.0 (or any version below 1.0), uninstall it first:

.. code:: shell
pip uninstall azure
Usage
=====

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -67,9 +67,6 @@ class ManagedCluster(Resource):
:param aad_profile: Profile of Azure Active Directory configuration.
:type aad_profile:
~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile
:param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes
API server.
:type api_server_authorized_ip_ranges: list[str]
"""

_validation = {
Expand Down Expand Up @@ -100,7 +97,6 @@ class ManagedCluster(Resource):
'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'},
'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'},
'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'},
'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'},
}

def __init__(self, **kwargs):
Expand All @@ -117,4 +113,3 @@ def __init__(self, **kwargs):
self.enable_rbac = kwargs.get('enable_rbac', None)
self.network_profile = kwargs.get('network_profile', None)
self.aad_profile = kwargs.get('aad_profile', None)
self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None)
Original file line number Diff line number Diff line change
Expand Up @@ -67,9 +67,6 @@ class ManagedCluster(Resource):
:param aad_profile: Profile of Azure Active Directory configuration.
:type aad_profile:
~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile
:param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes
API server.
:type api_server_authorized_ip_ranges: list[str]
"""

_validation = {
Expand Down Expand Up @@ -100,10 +97,9 @@ class ManagedCluster(Resource):
'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'},
'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'},
'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'},
'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'},
}

def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None:
def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None:
super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs)
self.provisioning_state = None
self.kubernetes_version = kubernetes_version
Expand All @@ -117,4 +113,3 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn
self.enable_rbac = enable_rbac
self.network_profile = network_profile
self.aad_profile = aad_profile
self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges
Original file line number Diff line number Diff line change
Expand Up @@ -66,9 +66,6 @@ class ManagedCluster(Resource):
:param aad_profile: Profile of Azure Active Directory configuration.
:type aad_profile:
~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile
:param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes
API server.
:type api_server_authorized_ip_ranges: list[str]
"""

_validation = {
Expand Down Expand Up @@ -99,7 +96,6 @@ class ManagedCluster(Resource):
'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'},
'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'},
'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'},
'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'},
}

def __init__(self, **kwargs):
Expand All @@ -116,4 +112,3 @@ def __init__(self, **kwargs):
self.enable_rbac = kwargs.get('enable_rbac', None)
self.network_profile = kwargs.get('network_profile', None)
self.aad_profile = kwargs.get('aad_profile', None)
self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None)
Original file line number Diff line number Diff line change
Expand Up @@ -66,9 +66,6 @@ class ManagedCluster(Resource):
:param aad_profile: Profile of Azure Active Directory configuration.
:type aad_profile:
~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile
:param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes
API server.
:type api_server_authorized_ip_ranges: list[str]
"""

_validation = {
Expand Down Expand Up @@ -99,10 +96,9 @@ class ManagedCluster(Resource):
'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'},
'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'},
'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'},
'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'},
}

def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None:
def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None:
super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs)
self.provisioning_state = None
self.kubernetes_version = kubernetes_version
Expand All @@ -116,4 +112,3 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn
self.enable_rbac = enable_rbac
self.network_profile = network_profile
self.aad_profile = aad_profile
self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges

0 comments on commit 657c560

Please sign in to comment.