diff --git a/src/aks-preview/azext_aks_preview/tests/latest/recording_processors.py b/src/aks-preview/azext_aks_preview/tests/latest/recording_processors.py index 90fbd9131e0..213980e4817 100644 --- a/src/aks-preview/azext_aks_preview/tests/latest/recording_processors.py +++ b/src/aks-preview/azext_aks_preview/tests/latest/recording_processors.py @@ -24,7 +24,6 @@ def process_response(self, response): response['body']['string'] = self._replace_string_keys(response['body']['string']) return response - # pylint: disable=no-self-use def _replace_string_keys(self, val): import re if 'secret' in val: @@ -41,7 +40,6 @@ def _replace_string_keys(self, val): .format(MOCK_GUID), val, flags=re.IGNORECASE) return val - # pylint: disable=no-self-use def _replace_byte_keys(self, val): import re if b'secret' in val: diff --git a/src/aks-preview/azext_aks_preview/tests/latest/recordings/test_aks_create_and_update_with_http_proxy_config.yaml b/src/aks-preview/azext_aks_preview/tests/latest/recordings/test_aks_create_and_update_with_http_proxy_config.yaml index 931f411054a..6111b2298d6 100755 --- a/src/aks-preview/azext_aks_preview/tests/latest/recordings/test_aks_create_and_update_with_http_proxy_config.yaml +++ b/src/aks-preview/azext_aks_preview/tests/latest/recordings/test_aks_create_and_update_with_http_proxy_config.yaml @@ -13,23 +13,21 @@ interactions: ParameterSetName: - --resource-group --name --address-prefixes --subnet-name --subnet-prefix User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001","name":"clitest000001","type":"Microsoft.Resources/resourceGroups","location":"westus2","tags":{"product":"azurecli","cause":"automation","test":"test_aks_create_and_update_with_http_proxy_config","date":"2023-09-15T07:45:57Z","module":"aks-preview"},"properties":{"provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001","name":"clitest000001","type":"Microsoft.Resources/resourceGroups","location":"westus2","tags":{"product":"azurecli","cause":"automation","test":"test_aks_create_and_update_with_http_proxy_config","date":"2023-12-22T10:07:21Z","module":"aks-preview"},"properties":{"provisioningState":"Succeeded"}}' headers: cache-control: - no-cache - connection: - - close content-length: - '387' content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:45:58 GMT + - Fri, 22 Dec 2023 10:07:23 GMT expires: - '-1' pragma: @@ -63,19 +61,19 @@ interactions: ParameterSetName: - --resource-group --name --address-prefixes --subnet-name --subnet-prefix User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002?api-version=2022-01-01 response: body: string: "{\r\n \"name\": \"cliakstest000002\",\r\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002\",\r\n - \ \"etag\": \"W/\\\"e6f9158e-13c0-4dbd-a441-9b6e44aa8206\\\"\",\r\n \"type\": + \ \"etag\": \"W/\\\"ab04d706-99ff-400a-a140-02ae7180dd87\\\"\",\r\n \"type\": \"Microsoft.Network/virtualNetworks\",\r\n \"location\": \"westus2\",\r\n \ \"properties\": {\r\n \"provisioningState\": \"Updating\",\r\n \"resourceGuid\": - \"c1bc145c-fc66-47c2-8fad-7bba5cdaf269\",\r\n \"addressSpace\": {\r\n \"addressPrefixes\": + \"45c3230f-7042-40ba-a954-1d59a3deaf1d\",\r\n \"addressSpace\": {\r\n \"addressPrefixes\": [\r\n \"10.42.0.0/16\"\r\n ]\r\n },\r\n \"subnets\": [\r\n \ {\r\n \"name\": \"aks-subnet\",\r\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet\",\r\n - \ \"etag\": \"W/\\\"e6f9158e-13c0-4dbd-a441-9b6e44aa8206\\\"\",\r\n + \ \"etag\": \"W/\\\"ab04d706-99ff-400a-a140-02ae7180dd87\\\"\",\r\n \ \"properties\": {\r\n \"provisioningState\": \"Updating\",\r\n \ \"addressPrefix\": \"10.42.1.0/24\",\r\n \"delegations\": [],\r\n \"privateEndpointNetworkPolicies\": \"Disabled\",\r\n \"privateLinkServiceNetworkPolicies\": @@ -86,7 +84,7 @@ interactions: azure-asyncnotification: - Enabled azure-asyncoperation: - - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/d8ede50a-faba-4896-b62d-ea4ba3fd2b86?api-version=2022-01-01 + - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/f60f05d6-b9a0-4ef6-a6bd-4e6145ed7f0b?api-version=2022-01-01&t=638388364443945317&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHaBggrBgEFBQcBAQSCAcwwggHIMGYGCCsGAQUFBzAChlpodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMElORlJBJTIwQ0ElMjAwMSg0KS5jcnQwVgYIKwYBBQUHMAKGSmh0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JZMlBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3J0MFYGCCsGAQUFBzAChkpodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CWTJQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSU5GUkElMjBDQSUyMDAxKDQpLmNydDBWBggrBgEFBQcwAoZKaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMElORlJBJTIwQ0ElMjAwMSg0KS5jcnQwVgYIKwYBBQUHMAKGSmh0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JZMlBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3J0MB0GA1UdDgQWBBTS1aFccpK8162ob3hFc-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=nsnEmLHFoRCH3CyO1RXkUNViqY5V60uvXUpTHATZmZbpG4xULxrGx-Q2lFqibkk1vTao7HSgkSTzw2wVhZhXHvMjatUmvWtfsTRZhikfsTEcwb4fseEpZq4ZEv-o_0PonJYM8P6_2B-ZZigX_zO-QKAUOroRdyhCUGNuS50XNF3IZGKQoF4AZo3r8Jw_PgERXiulaHlrQYW-xNcksCTvUmrZ6IlfWlvYtsI9z2nx0P6KRzN6_GZedX6M2z2ZJKFfwKw1skLso4x2f8-lQVuoqnxJvxbrIZyPdhnLa_O0eoruxOjcJBVt0ZXArTK6d9MLm816KjsKzOtIHiW3r1A6Lw&h=VTPfs66MgxMS3cv9_DJc_lex-F779AwUGbUY0qPx33I cache-control: - no-cache content-length: @@ -94,7 +92,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:45:59 GMT + - Fri, 22 Dec 2023 10:07:23 GMT expires: - '-1' pragma: @@ -107,7 +105,7 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - 13fe2ed6-e85e-4490-a1d1-f15f4e551307 + - 91f427e6-dd6c-4c3b-9a0f-f4c7cda52509 x-ms-ratelimit-remaining-subscription-writes: - '1199' status: @@ -127,9 +125,9 @@ interactions: ParameterSetName: - --resource-group --name --address-prefixes --subnet-name --subnet-prefix User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/d8ede50a-faba-4896-b62d-ea4ba3fd2b86?api-version=2022-01-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/f60f05d6-b9a0-4ef6-a6bd-4e6145ed7f0b?api-version=2022-01-01&t=638388364443945317&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=nsnEmLHFoRCH3CyO1RXkUNViqY5V60uvXUpTHATZmZbpG4xULxrGx-Q2lFqibkk1vTao7HSgkSTzw2wVhZhXHvMjatUmvWtfsTRZhikfsTEcwb4fseEpZq4ZEv-o_0PonJYM8P6_2B-ZZigX_zO-QKAUOroRdyhCUGNuS50XNF3IZGKQoF4AZo3r8Jw_PgERXiulaHlrQYW-xNcksCTvUmrZ6IlfWlvYtsI9z2nx0P6KRzN6_GZedX6M2z2ZJKFfwKw1skLso4x2f8-lQVuoqnxJvxbrIZyPdhnLa_O0eoruxOjcJBVt0ZXArTK6d9MLm816KjsKzOtIHiW3r1A6Lw&h=VTPfs66MgxMS3cv9_DJc_lex-F779AwUGbUY0qPx33I response: body: string: "{\r\n \"status\": \"InProgress\"\r\n}" @@ -141,7 +139,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:45:59 GMT + - Fri, 22 Dec 2023 10:07:24 GMT expires: - '-1' pragma: @@ -158,7 +156,7 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - 2f9475c9-1e32-482d-aa5f-fb9dbe14bee2 + - 94264292-d94c-4ddb-8044-773322c73221 status: code: 200 message: OK @@ -176,9 +174,9 @@ interactions: ParameterSetName: - --resource-group --name --address-prefixes --subnet-name --subnet-prefix User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/d8ede50a-faba-4896-b62d-ea4ba3fd2b86?api-version=2022-01-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/f60f05d6-b9a0-4ef6-a6bd-4e6145ed7f0b?api-version=2022-01-01&t=638388364443945317&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-fJo76DmDAOBgNVHQ8BAf8EBAMCBaAwggE1BgNVHR8EggEsMIIBKDCCASSgggEgoIIBHIZCaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTl2Ztn_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=nsnEmLHFoRCH3CyO1RXkUNViqY5V60uvXUpTHATZmZbpG4xULxrGx-Q2lFqibkk1vTao7HSgkSTzw2wVhZhXHvMjatUmvWtfsTRZhikfsTEcwb4fseEpZq4ZEv-o_0PonJYM8P6_2B-ZZigX_zO-QKAUOroRdyhCUGNuS50XNF3IZGKQoF4AZo3r8Jw_PgERXiulaHlrQYW-xNcksCTvUmrZ6IlfWlvYtsI9z2nx0P6KRzN6_GZedX6M2z2ZJKFfwKw1skLso4x2f8-lQVuoqnxJvxbrIZyPdhnLa_O0eoruxOjcJBVt0ZXArTK6d9MLm816KjsKzOtIHiW3r1A6Lw&h=VTPfs66MgxMS3cv9_DJc_lex-F779AwUGbUY0qPx33I response: body: string: "{\r\n \"status\": \"Succeeded\"\r\n}" @@ -190,7 +188,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:09 GMT + - Fri, 22 Dec 2023 10:07:34 GMT expires: - '-1' pragma: @@ -207,7 +205,7 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - ef431dfb-c4bc-4d51-8496-e89990425085 + - 717d96b4-29ea-4f68-9aa1-18fa98f03397 status: code: 200 message: OK @@ -225,19 +223,19 @@ interactions: ParameterSetName: - --resource-group --name --address-prefixes --subnet-name --subnet-prefix User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002?api-version=2022-01-01 response: body: string: "{\r\n \"name\": \"cliakstest000002\",\r\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002\",\r\n - \ \"etag\": \"W/\\\"a177b211-ba82-4a51-876f-45392e0bde3c\\\"\",\r\n \"type\": + \ \"etag\": \"W/\\\"9f7128dc-016e-415d-952c-c536c2570649\\\"\",\r\n \"type\": \"Microsoft.Network/virtualNetworks\",\r\n \"location\": \"westus2\",\r\n \ \"properties\": {\r\n \"provisioningState\": \"Succeeded\",\r\n \"resourceGuid\": - \"c1bc145c-fc66-47c2-8fad-7bba5cdaf269\",\r\n \"addressSpace\": {\r\n \"addressPrefixes\": + \"45c3230f-7042-40ba-a954-1d59a3deaf1d\",\r\n \"addressSpace\": {\r\n \"addressPrefixes\": [\r\n \"10.42.0.0/16\"\r\n ]\r\n },\r\n \"subnets\": [\r\n \ {\r\n \"name\": \"aks-subnet\",\r\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet\",\r\n - \ \"etag\": \"W/\\\"a177b211-ba82-4a51-876f-45392e0bde3c\\\"\",\r\n + \ \"etag\": \"W/\\\"9f7128dc-016e-415d-952c-c536c2570649\\\"\",\r\n \ \"properties\": {\r\n \"provisioningState\": \"Succeeded\",\r\n \ \"addressPrefix\": \"10.42.1.0/24\",\r\n \"delegations\": [],\r\n \"privateEndpointNetworkPolicies\": \"Disabled\",\r\n \"privateLinkServiceNetworkPolicies\": @@ -252,9 +250,9 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:10 GMT + - Fri, 22 Dec 2023 10:07:34 GMT etag: - - W/"a177b211-ba82-4a51-876f-45392e0bde3c" + - W/"9f7128dc-016e-415d-952c-c536c2570649" expires: - '-1' pragma: @@ -271,12 +269,14 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - 6fc70875-ddfe-45bb-823d-e35fa3f6a859 + - 18c2b415-8558-4472-822a-48ab8d12d01a status: code: 200 message: OK - request: - body: '{"name": "proxy-subnet", "properties": {"addressPrefix": "10.42.3.0/24"}}' + body: '{"name": "proxy-subnet", "properties": {"addressPrefix": "10.42.3.0/24", + "privateEndpointNetworkPolicies": "Disabled", "privateLinkServiceNetworkPolicies": + "Enabled"}}' headers: Accept: - application/json @@ -287,23 +287,23 @@ interactions: Connection: - keep-alive Content-Length: - - '73' + - '167' Content-Type: - application/json ParameterSetName: - --resource-group --vnet-name --name --address-prefix User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: PUT - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet?api-version=2023-05-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet?api-version=2023-09-01 response: body: - string: '{"name":"proxy-subnet","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet","etag":"W/\"75d3308d-2be0-4f6d-b312-814b219b36fc\"","properties":{"provisioningState":"Updating","addressPrefix":"10.42.3.0/24","delegations":[],"privateEndpointNetworkPolicies":"Disabled","privateLinkServiceNetworkPolicies":"Enabled"},"type":"Microsoft.Network/virtualNetworks/subnets"}' + string: '{"name":"proxy-subnet","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet","etag":"W/\"eabb5553-026d-4a40-9ced-2a4fba2cd16d\"","properties":{"provisioningState":"Updating","addressPrefix":"10.42.3.0/24","delegations":[],"privateEndpointNetworkPolicies":"Disabled","privateLinkServiceNetworkPolicies":"Enabled"},"type":"Microsoft.Network/virtualNetworks/subnets"}' headers: azure-asyncnotification: - Enabled azure-asyncoperation: - - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/fe7563f9-4979-4438-b10c-38ff6b863880?api-version=2023-05-01 + - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/a3d1f804-b2da-43f1-9956-5f8d4f3b106f?api-version=2023-09-01&t=638388364556015140&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=fnDjrALSjfFLru_3ZO4AkVrgIvl3xw6fMDCeE_mL9cXsT4KWJpFGV9SJXC1y2HeGxcDGL06OiHKhHBHo5tKFFqhs-Tw8jWjLpmiSxqsLcjBwnVY1YP2ujEwMOOsmAlMucHCrgw4mUSWxPjf-11NeQIsgO5rRGsw09yxZB5qFHWg-hU795limT5-a1Kf9js7lUSJkaKqX9zzu5iv-tF8vFjSp2fJn8Jv4PD7FNuwyEYbQNL7_T1UEVO_lttv0BIXvMrlJ8Nx5bNm3t00mCbSIF1sKg4asvP9CqVtMedWp2wW6r1ejMGDPUYrJ5EGcEQUO0tHE8ETajfITkCLR6zCxxg&h=p7EZzaz5Fhq4sJwwTMg7ca26Dda8-txNU4bcyM0YXGc cache-control: - no-cache content-length: @@ -311,7 +311,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:10 GMT + - Fri, 22 Dec 2023 10:07:35 GMT expires: - '-1' pragma: @@ -324,12 +324,12 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - 633eb6f4-61a8-4c5d-a2c3-d35e551fc2e3 + - 1b56215a-2595-4a90-914a-1bc7420e83da x-ms-ratelimit-remaining-subscription-writes: - '1199' status: code: 201 - message: '' + message: Created - request: body: null headers: @@ -344,9 +344,9 @@ interactions: ParameterSetName: - --resource-group --vnet-name --name --address-prefix User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/fe7563f9-4979-4438-b10c-38ff6b863880?api-version=2023-05-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/a3d1f804-b2da-43f1-9956-5f8d4f3b106f?api-version=2023-09-01&t=638388364556015140&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-fJo76DmDAOBgNVHQ8BAf8EBAMCBaAwggE1BgNVHR8EggEsMIIBKDCCASSgggEgoIIBHIZCaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTl2Ztn_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=fnDjrALSjfFLru_3ZO4AkVrgIvl3xw6fMDCeE_mL9cXsT4KWJpFGV9SJXC1y2HeGxcDGL06OiHKhHBHo5tKFFqhs-Tw8jWjLpmiSxqsLcjBwnVY1YP2ujEwMOOsmAlMucHCrgw4mUSWxPjf-11NeQIsgO5rRGsw09yxZB5qFHWg-hU795limT5-a1Kf9js7lUSJkaKqX9zzu5iv-tF8vFjSp2fJn8Jv4PD7FNuwyEYbQNL7_T1UEVO_lttv0BIXvMrlJ8Nx5bNm3t00mCbSIF1sKg4asvP9CqVtMedWp2wW6r1ejMGDPUYrJ5EGcEQUO0tHE8ETajfITkCLR6zCxxg&h=p7EZzaz5Fhq4sJwwTMg7ca26Dda8-txNU4bcyM0YXGc response: body: string: '{"status":"InProgress"}' @@ -358,7 +358,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:10 GMT + - Fri, 22 Dec 2023 10:07:35 GMT expires: - '-1' pragma: @@ -375,10 +375,10 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - e3981fe2-de58-4943-9cd2-4f612eaaa103 + - e774dc30-b89d-42f3-9033-07ef28f39c0a status: code: 200 - message: '' + message: OK - request: body: null headers: @@ -393,9 +393,9 @@ interactions: ParameterSetName: - --resource-group --vnet-name --name --address-prefix User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/fe7563f9-4979-4438-b10c-38ff6b863880?api-version=2023-05-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/locations/westus2/operations/a3d1f804-b2da-43f1-9956-5f8d4f3b106f?api-version=2023-09-01&t=638388364556015140&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-fJo76DmDAOBgNVHQ8BAf8EBAMCBaAwggE1BgNVHR8EggEsMIIBKDCCASSgggEgoIIBHIZCaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTl2Ztn_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=fnDjrALSjfFLru_3ZO4AkVrgIvl3xw6fMDCeE_mL9cXsT4KWJpFGV9SJXC1y2HeGxcDGL06OiHKhHBHo5tKFFqhs-Tw8jWjLpmiSxqsLcjBwnVY1YP2ujEwMOOsmAlMucHCrgw4mUSWxPjf-11NeQIsgO5rRGsw09yxZB5qFHWg-hU795limT5-a1Kf9js7lUSJkaKqX9zzu5iv-tF8vFjSp2fJn8Jv4PD7FNuwyEYbQNL7_T1UEVO_lttv0BIXvMrlJ8Nx5bNm3t00mCbSIF1sKg4asvP9CqVtMedWp2wW6r1ejMGDPUYrJ5EGcEQUO0tHE8ETajfITkCLR6zCxxg&h=p7EZzaz5Fhq4sJwwTMg7ca26Dda8-txNU4bcyM0YXGc response: body: string: '{"status":"Succeeded"}' @@ -407,7 +407,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:21 GMT + - Fri, 22 Dec 2023 10:07:45 GMT expires: - '-1' pragma: @@ -424,10 +424,10 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - 56ae61e9-6a92-4754-be04-e235d7652d31 + - b6827556-df63-4750-b847-6be3252a790f status: code: 200 - message: '' + message: OK - request: body: null headers: @@ -442,12 +442,12 @@ interactions: ParameterSetName: - --resource-group --vnet-name --name --address-prefix User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet?api-version=2023-05-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet?api-version=2023-09-01 response: body: - string: '{"name":"proxy-subnet","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet","etag":"W/\"d059dcc8-26c0-433d-b474-8470a0820bfb\"","properties":{"provisioningState":"Succeeded","addressPrefix":"10.42.3.0/24","delegations":[],"privateEndpointNetworkPolicies":"Disabled","privateLinkServiceNetworkPolicies":"Enabled"},"type":"Microsoft.Network/virtualNetworks/subnets"}' + string: '{"name":"proxy-subnet","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet","etag":"W/\"a772ff56-794f-42f0-b631-45847605ffe7\"","properties":{"provisioningState":"Succeeded","addressPrefix":"10.42.3.0/24","delegations":[],"privateEndpointNetworkPolicies":"Disabled","privateLinkServiceNetworkPolicies":"Enabled"},"type":"Microsoft.Network/virtualNetworks/subnets"}' headers: cache-control: - no-cache @@ -456,9 +456,9 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:21 GMT + - Fri, 22 Dec 2023 10:07:45 GMT etag: - - W/"d059dcc8-26c0-433d-b474-8470a0820bfb" + - W/"a772ff56-794f-42f0-b631-45847605ffe7" expires: - '-1' pragma: @@ -475,10 +475,10 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - 8d869052-cd8c-44d3-9b78-bed9c0274f92 + - b21da384-44cc-4301-98d2-f83b11200bb2 status: code: 200 - message: '' + message: OK - request: body: null headers: @@ -493,12 +493,12 @@ interactions: ParameterSetName: - --resource-group --vnet-name --name User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet?api-version=2023-05-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet?api-version=2023-09-01 response: body: - string: '{"name":"aks-subnet","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet","etag":"W/\"d059dcc8-26c0-433d-b474-8470a0820bfb\"","properties":{"provisioningState":"Succeeded","addressPrefix":"10.42.1.0/24","delegations":[],"privateEndpointNetworkPolicies":"Disabled","privateLinkServiceNetworkPolicies":"Enabled"},"type":"Microsoft.Network/virtualNetworks/subnets"}' + string: '{"name":"aks-subnet","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet","etag":"W/\"a772ff56-794f-42f0-b631-45847605ffe7\"","properties":{"provisioningState":"Succeeded","addressPrefix":"10.42.1.0/24","delegations":[],"privateEndpointNetworkPolicies":"Disabled","privateLinkServiceNetworkPolicies":"Enabled"},"type":"Microsoft.Network/virtualNetworks/subnets"}' headers: cache-control: - no-cache @@ -507,9 +507,9 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:21 GMT + - Fri, 22 Dec 2023 10:07:46 GMT etag: - - W/"d059dcc8-26c0-433d-b474-8470a0820bfb" + - W/"a772ff56-794f-42f0-b631-45847605ffe7" expires: - '-1' pragma: @@ -526,7 +526,7 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - 671cf6f3-9054-474a-9b9f-b932f53ee4a7 + - fea5b8bc-1f41-4bf6-be5b-5b4145ea3620 status: code: 200 message: OK @@ -545,12 +545,12 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001","name":"clitest000001","type":"Microsoft.Resources/resourceGroups","location":"westus2","tags":{"product":"azurecli","cause":"automation","test":"test_aks_create_and_update_with_http_proxy_config","date":"2023-09-15T07:45:57Z","module":"aks-preview"},"properties":{"provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001","name":"clitest000001","type":"Microsoft.Resources/resourceGroups","location":"westus2","tags":{"product":"azurecli","cause":"automation","test":"test_aks_create_and_update_with_http_proxy_config","date":"2023-12-22T10:07:21Z","module":"aks-preview"},"properties":{"provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -559,7 +559,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:22 GMT + - Fri, 22 Dec 2023 10:07:46 GMT expires: - '-1' pragma: @@ -588,13 +588,13 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-compute/30.0.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-compute/30.4.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions?$top=1&$orderby=name%20desc&api-version=2022-11-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions?$top=1&$orderby=name%20desc&api-version=2023-09-01 response: body: - string: "[\r\n {\r\n \"location\": \"westus2\",\r\n \"name\": \"20.04.202308310\",\r\n - \ \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202308310\"\r\n + string: "[\r\n {\r\n \"location\": \"westus2\",\r\n \"name\": \"20.04.202312080\",\r\n + \ \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202312080\"\r\n \ }\r\n]" headers: cache-control: @@ -604,7 +604,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:21 GMT + - Fri, 22 Dec 2023 10:07:46 GMT expires: - '-1' pragma: @@ -621,7 +621,7 @@ interactions: x-content-type-options: - nosniff x-ms-ratelimit-remaining-resource: - - Microsoft.Compute/ListVMImagesVersionsFromLocation3Min;15999,Microsoft.Compute/ListVMImagesVersionsFromLocation30Min;43999 + - Microsoft.Compute/ListVMImagesVersionsFromLocation3Min;15999,Microsoft.Compute/ListVMImagesVersionsFromLocation30Min;43994 status: code: 200 message: OK @@ -640,9 +640,9 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-compute/30.0.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-compute/30.4.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions/20.04.202308310?api-version=2022-11-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions/20.04.202312080?api-version=2023-09-01 response: body: string: "{\r\n \"properties\": {\r\n \"hyperVGeneration\": \"V1\",\r\n \"architecture\": @@ -656,7 +656,7 @@ interactions: \"IsHibernateSupported\",\r\n \"value\": \"True\"\r\n }\r\n ],\r\n \ \"osDiskImage\": {\r\n \"operatingSystem\": \"Linux\",\r\n \"sizeInBytes\": 32213303808\r\n },\r\n \"dataDiskImages\": []\r\n },\r\n \"location\": - \"westus2\",\r\n \"name\": \"20.04.202308310\",\r\n \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202308310\"\r\n}" + \"westus2\",\r\n \"name\": \"20.04.202312080\",\r\n \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202312080\"\r\n}" headers: cache-control: - no-cache @@ -665,7 +665,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:22 GMT + - Fri, 22 Dec 2023 10:07:47 GMT expires: - '-1' pragma: @@ -682,7 +682,7 @@ interactions: x-content-type-options: - nosniff x-ms-ratelimit-remaining-resource: - - Microsoft.Compute/GetVMImageFromLocation3Min;12999,Microsoft.Compute/GetVMImageFromLocation30Min;73999 + - Microsoft.Compute/GetVMImageFromLocation3Min;12999,Microsoft.Compute/GetVMImageFromLocation30Min;73995 status: code: 200 message: OK @@ -701,12 +701,12 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network","namespace":"Microsoft.Network","authorizations":[{"applicationId":"2cf9eb86-36b5-49dc-86ae-9a63135dfa8c","roleDefinitionId":"13ba9ab4-19f0-4804-adc4-14ece36cc7a1"},{"applicationId":"7c33bfcb-8d33-48d6-8e60-dc6404003489","roleDefinitionId":"ad6261e4-fa9a-4642-aa5f-104f1b67e9e3"},{"applicationId":"1e3e4475-288f-4018-a376-df66fd7fac5f","roleDefinitionId":"1d538b69-3d87-4e56-8ff8-25786fd48261"},{"applicationId":"a0be0c72-870e-46f0-9c49-c98333a996f7","roleDefinitionId":"7ce22727-ffce-45a9-930c-ddb2e56fa131"},{"applicationId":"486c78bf-a0f7-45f1-92fd-37215929e116","roleDefinitionId":"98a9e526-0a60-4c1f-a33a-ae46e1f8dc0d"},{"applicationId":"19947cfd-0303-466c-ac3c-fcc19a7a1570","roleDefinitionId":"d813ab6c-bfb7-413e-9462-005b21f0ce09"},{"applicationId":"341b7f3d-69b3-47f9-9ce7-5b7f4945fdbd","roleDefinitionId":"8141843c-c51c-4c1e-a5bf-0d351594b86c"},{"applicationId":"328fd23b-de6e-462c-9433-e207470a5727","roleDefinitionId":"79e29e06-4056-41e5-a6b2-959f1f47747e"},{"applicationId":"6d057c82-a784-47ae-8d12-ca7b38cf06b4","roleDefinitionId":"c27dd31e-c1e5-4ab0-93e1-a12ba34f182e","managedByRoleDefinitionId":"82e8942a-bcb6-444a-b1c4-31a3ea463a7d"},{"applicationId":"b4ca0290-4e73-4e31-ade0-c82ecfaabf6a","roleDefinitionId":"18363e25-ff21-4159-ae8d-7dfecb5bd001"},{"applicationId":"79d7fb34-4bef-4417-8184-ff713af7a679","roleDefinitionId":"1c1f11ef-abfa-4abe-a02b-226771d07fc7"},{"applicationId":"38808189-fa7a-4d8a-807f-eba01edacca6","roleDefinitionId":"7dbad3e2-b105-40d5-8fe4-4a9ff6c17ae6"},{"applicationId":"6e02f8e9-db9b-4eb5-aa5a-7c8968375f68","roleDefinitionId":"787424c7-f9d2-416b-a939-4d59deb2d259"}],"resourceTypes":[{"resourceType":"virtualNetworkGateways","locations":["West + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network","namespace":"Microsoft.Network","authorizations":[{"applicationId":"2cf9eb86-36b5-49dc-86ae-9a63135dfa8c","roleDefinitionId":"13ba9ab4-19f0-4804-adc4-14ece36cc7a1"},{"applicationId":"7c33bfcb-8d33-48d6-8e60-dc6404003489","roleDefinitionId":"ad6261e4-fa9a-4642-aa5f-104f1b67e9e3"},{"applicationId":"1e3e4475-288f-4018-a376-df66fd7fac5f","roleDefinitionId":"1d538b69-3d87-4e56-8ff8-25786fd48261"},{"applicationId":"a0be0c72-870e-46f0-9c49-c98333a996f7","roleDefinitionId":"7ce22727-ffce-45a9-930c-ddb2e56fa131"},{"applicationId":"486c78bf-a0f7-45f1-92fd-37215929e116","roleDefinitionId":"98a9e526-0a60-4c1f-a33a-ae46e1f8dc0d"},{"applicationId":"19947cfd-0303-466c-ac3c-fcc19a7a1570","roleDefinitionId":"d813ab6c-bfb7-413e-9462-005b21f0ce09"},{"applicationId":"341b7f3d-69b3-47f9-9ce7-5b7f4945fdbd","roleDefinitionId":"8141843c-c51c-4c1e-a5bf-0d351594b86c"},{"applicationId":"328fd23b-de6e-462c-9433-e207470a5727","roleDefinitionId":"79e29e06-4056-41e5-a6b2-959f1f47747e"},{"applicationId":"6d057c82-a784-47ae-8d12-ca7b38cf06b4","roleDefinitionId":"c27dd31e-c1e5-4ab0-93e1-a12ba34f182e","managedByRoleDefinitionId":"82e8942a-bcb6-444a-b1c4-31a3ea463a7d"},{"applicationId":"b4ca0290-4e73-4e31-ade0-c82ecfaabf6a","roleDefinitionId":"18363e25-ff21-4159-ae8d-7dfecb5bd001"},{"applicationId":"79d7fb34-4bef-4417-8184-ff713af7a679","roleDefinitionId":"1c1f11ef-abfa-4abe-a02b-226771d07fc7"},{"applicationId":"38808189-fa7a-4d8a-807f-eba01edacca6","roleDefinitionId":"7dbad3e2-b105-40d5-8fe4-4a9ff6c17ae6"},{"applicationId":"6e02f8e9-db9b-4eb5-aa5a-7c8968375f68","roleDefinitionId":"787424c7-f9d2-416b-a939-4d59deb2d259"},{"applicationId":"60b2e7d5-a27f-426d-a6b1-acced0846fdf","roleDefinitionId":"0edb7c43-ed90-4da9-9ca2-e9a5d1521b00"}],"resourceTypes":[{"resourceType":"virtualNetworkGateways","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -714,7 +714,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-03-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-03-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"localNetworkGateways","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -723,7 +724,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-03-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-03-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"connections","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -732,7 +734,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-03-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-03-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"applicationGateways","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -741,7 +744,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","zoneMappings":[{"location":"Australia + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","zoneMappings":[{"location":"Australia East","zones":["3","2","1"]},{"location":"Brazil South","zones":["3","2","1"]},{"location":"Canada Central","zones":["3","2","1"]},{"location":"Central India","zones":["3","2","1"]},{"location":"Central US","zones":["3","2","1"]},{"location":"Central US EUAP","zones":["2","1"]},{"location":"East @@ -756,8 +760,9 @@ interactions: Central","zones":["3","2","1"]},{"location":"Switzerland North","zones":["3","2","1"]},{"location":"UAE North","zones":["3","2","1"]},{"location":"UK South","zones":["3","2","1"]},{"location":"West Europe","zones":["3","2","1"]},{"location":"West US","zones":[]},{"location":"West - US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Italy - North","zones":["3","2","1"]}],"capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"expressRouteCircuits","locations":["West + US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Israel + Central","zones":["3","2","1"]},{"location":"Italy North","zones":["3","2","1"]}],"capabilities":"SupportsTags, + SupportsLocation"},{"resourceType":"expressRouteCircuits","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -765,7 +770,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"expressRouteServiceProviders","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -774,7 +780,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableWafRuleSets","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableWafRuleSets","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -782,7 +789,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableSslOptions","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableSslOptions","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -790,7 +798,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableServerVariables","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableServerVariables","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -798,7 +807,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableRequestHeaders","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableRequestHeaders","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -806,7 +816,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableResponseHeaders","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01"],"capabilities":"None"},{"resourceType":"applicationGatewayAvailableResponseHeaders","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -814,7 +825,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01"],"capabilities":"None"},{"resourceType":"routeFilters","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01"],"capabilities":"None"},{"resourceType":"routeFilters","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -822,7 +834,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"bgpServiceCommunities","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -831,7 +844,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01"],"capabilities":"None"},{"resourceType":"vpnSites","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01"],"capabilities":"None"},{"resourceType":"vpnSites","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -839,7 +853,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"vpnServerConfigurations","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -848,7 +863,7 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","South Africa North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar Central","Poland Central","Italy - North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + North","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"virtualHubs","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil @@ -857,7 +872,7 @@ interactions: South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar Central","Poland - Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Italy North","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"vpnGateways","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil @@ -866,7 +881,7 @@ interactions: South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar Central","Poland - Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Italy North","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"p2sVpnGateways","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil @@ -875,7 +890,7 @@ interactions: South","Korea Central","Korea South","France Central","Australia Central","UAE North","South Africa North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar Central","Poland - Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Italy North","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"expressRouteGateways","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -884,7 +899,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"expressRoutePortsLocations","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -893,7 +909,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"capabilities":"None"},{"resourceType":"expressRoutePorts","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"capabilities":"None"},{"resourceType":"expressRoutePorts","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -901,7 +918,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","UAE North","South Africa North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"securityPartnerProviders","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -910,7 +928,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"azureFirewalls","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Brazil South","Australia @@ -919,7 +938,8 @@ interactions: Central","Australia Central","Japan West","Japan East","Korea Central","Korea South","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"defaultApiVersion":"2020-03-01","zoneMappings":[{"location":"Australia + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"defaultApiVersion":"2020-03-01","zoneMappings":[{"location":"Australia East","zones":["3","2","1"]},{"location":"Brazil South","zones":["3","2","1"]},{"location":"Canada Central","zones":["3","2","1"]},{"location":"Central India","zones":["3","2","1"]},{"location":"Central US","zones":["3","2","1"]},{"location":"Central US EUAP","zones":["2","1"]},{"location":"East @@ -934,8 +954,9 @@ interactions: Central","zones":["3","2","1"]},{"location":"Switzerland North","zones":["3","2","1"]},{"location":"UAE North","zones":["3","2","1"]},{"location":"UK South","zones":["3","2","1"]},{"location":"West Europe","zones":["3","2","1"]},{"location":"West US","zones":[]},{"location":"West - US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Italy - North","zones":["3","2","1"]}],"capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"azureFirewallFqdnTags","locations":["West + US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Israel + Central","zones":["3","2","1"]},{"location":"Italy North","zones":["3","2","1"]}],"capabilities":"SupportsTags, + SupportsLocation"},{"resourceType":"azureFirewallFqdnTags","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -943,7 +964,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"capabilities":"None"},{"resourceType":"applicationGatewayWebApplicationFirewallPolicies","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"capabilities":"None"},{"resourceType":"applicationGatewayWebApplicationFirewallPolicies","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -951,7 +973,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"locations/ApplicationGatewayWafDynamicManifests","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -960,7 +983,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01"],"capabilities":"None"},{"resourceType":"virtualWans","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01"],"capabilities":"None"},{"resourceType":"virtualWans","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -968,7 +992,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"bastionHosts","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil @@ -977,7 +1002,7 @@ interactions: South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar Central","Poland - Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + Central","Italy North","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"queryExpressRoutePortsBandwidth","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -986,70 +1011,17 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01"],"capabilities":"None"},{"resourceType":"trafficmanagerprofiles","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"CrossResourceGroupResourceMove, - CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"trafficmanagerprofiles/heatMaps","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-09-01-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"trafficmanagerprofiles/azureendpoints","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"trafficmanagerprofiles/externalendpoints","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"trafficmanagerprofiles/nestedendpoints","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"checkTrafficManagerNameAvailability","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"checkTrafficManagerNameAvailabilityV2","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01"],"defaultApiVersion":"2022-04-01","capabilities":"None"},{"resourceType":"trafficManagerUserMetricsKeys","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2017-09-01-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"trafficManagerGeographicHierarchies","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"dnsResolvers","locations":["West - Central US","East US 2","West Europe","North Europe","Australia East","UK - South","South Central US","East US","North Central US","West US 2","West US - 3","Southeast Asia","Central India","Canada Central","Central US","France - Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden - Central","East Asia","Switzerland North","Brazil South","West US","Norway - East","UAE North","Australia Southeast","Canada East","Japan West","Qatar - Central","Poland Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"CrossResourceGroupResourceMove, - CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dnsResolvers/inboundEndpoints","locations":["West - Central US","East US 2","West Europe","North Europe","Australia East","UK - South","South Central US","East US","North Central US","West US 2","West US - 3","Southeast Asia","Central India","Canada Central","Central US","France - Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden - Central","East Asia","Switzerland North","Brazil South","West US","Norway - East","UAE North","Australia Southeast","Canada East","Japan West","Qatar - Central","Poland Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"CrossResourceGroupResourceMove, - CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dnsResolvers/outboundEndpoints","locations":["West - Central US","East US 2","West Europe","North Europe","Australia East","UK - South","South Central US","East US","North Central US","West US 2","West US - 3","Southeast Asia","Central India","Canada Central","Central US","France - Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden - Central","East Asia","Switzerland North","Brazil South","West US","Norway - East","UAE North","Australia Southeast","Canada East","Japan West","Qatar - Central","Poland Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"CrossResourceGroupResourceMove, - CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dnsForwardingRulesets","locations":["West - Central US","East US 2","West Europe","North Europe","Australia East","UK - South","South Central US","East US","North Central US","West US 2","West US - 3","Southeast Asia","Central India","Canada Central","Central US","France - Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden - Central","East Asia","Switzerland North","Brazil South","West US","Norway - East","UAE North","Australia Southeast","Canada East","Japan West","Qatar - Central","Poland Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"CrossResourceGroupResourceMove, - CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dnsForwardingRulesets/forwardingRules","locations":["West - Central US","East US 2","West Europe","North Europe","Australia East","UK - South","South Central US","East US","North Central US","West US 2","West US - 3","Southeast Asia","Central India","Canada Central","Central US","France - Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden - Central","East Asia","Switzerland North","Brazil South","West US","Norway - East","UAE North","Australia Southeast","Canada East","Japan West","Qatar - Central","Poland Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"dnsForwardingRulesets/virtualNetworkLinks","locations":["West - Central US","East US 2","West Europe","North Europe","Australia East","UK - South","South Central US","East US","North Central US","West US 2","West US - 3","Southeast Asia","Central India","Canada Central","Central US","France - Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden - Central","East Asia","Switzerland North","Brazil South","West US","Norway - East","UAE North","Australia Southeast","Canada East","Japan West","Qatar - Central","Poland Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"virtualNetworks/listDnsResolvers","locations":["West - Central US","East US 2","West Europe","North Europe","Australia East","UK - South","South Central US","East US","North Central US","West US 2","West US - 3","Southeast Asia","Central India","Canada Central","Central US","France - Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden - Central","East Asia","Switzerland North","Brazil South","West US","Norway - East","UAE North","Australia Southeast","Canada East","Japan West","Qatar - Central","Poland Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"virtualNetworks/listDnsForwardingRulesets","locations":["West - Central US","East US 2","West Europe","North Europe","Australia East","UK - South","South Central US","East US","North Central US","West US 2","West US - 3","Southeast Asia","Central India","Canada Central","Central US","France - Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden - Central","East Asia","Switzerland North","Brazil South","West US","Norway - East","UAE North","Australia Southeast","Canada East","Japan West","Qatar - Central","Poland Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"locations/dnsResolverOperationResults","locations":[],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"locations/dnsResolverOperationStatuses","locations":[],"apiVersions":["2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"privateDnsZones","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"CrossResourceGroupResourceMove, - CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"privateDnsZones/virtualNetworkLinks","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"CrossResourceGroupResourceMove, - CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"privateDnsOperationResults","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsOperationStatuses","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZonesInternal","locations":["global"],"apiVersions":["2020-06-01","2020-01-01"],"defaultApiVersion":"2020-01-01","capabilities":"None"},{"resourceType":"privateDnsZones/A","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/AAAA","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/CNAME","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/PTR","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/MX","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/TXT","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/SRV","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/SOA","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/all","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"virtualNetworks/privateDnsZoneLinks","locations":["global"],"apiVersions":["2020-06-01"],"defaultApiVersion":"2020-06-01","capabilities":"None"},{"resourceType":"locations/hybridEdgeZone","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01"],"capabilities":"None"},{"resourceType":"trafficmanagerprofiles","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"trafficmanagerprofiles/heatMaps","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-09-01-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"trafficmanagerprofiles/azureendpoints","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"trafficmanagerprofiles/externalendpoints","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"trafficmanagerprofiles/nestedendpoints","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"checkTrafficManagerNameAvailability","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01","2015-11-01","2015-04-28-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"checkTrafficManagerNameAvailabilityV2","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01"],"defaultApiVersion":"2022-04-01","capabilities":"None"},{"resourceType":"trafficManagerUserMetricsKeys","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2017-09-01-preview"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"trafficManagerGeographicHierarchies","locations":["global"],"apiVersions":["2022-04-01-preview","2022-04-01","2018-08-01","2018-04-01","2018-03-01","2018-02-01","2017-05-01","2017-03-01"],"defaultApiVersion":"2018-08-01","capabilities":"None"},{"resourceType":"expressRouteProviderPorts","locations":["West + US","East US","North Europe","West Europe","East Asia","Southeast Asia","North + Central US","South Central US","Central US","East US 2","Japan East","Japan + West","Brazil South","Australia East","Australia Southeast","Central India","South + India","West India","Canada Central","Canada East","West Central US","West + US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia + Central","South Africa North","UAE North","Switzerland North","Germany West + Central","Norway East","West US 3","Jio India West","Sweden Central","Central + US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01"],"defaultApiVersion":"2020-06-01","capabilities":"None"},{"resourceType":"locations/hybridEdgeZone","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1057,7 +1029,7 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"firewallPolicies","locations":["Italy + Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"firewallPolicies","locations":["Italy North","Qatar Central","Poland Central","UAE North","Australia Central 2","UAE Central","Germany North","Central India","Korea South","Switzerland North","Switzerland West","Japan West","France South","South Africa West","West India","Canada @@ -1067,7 +1039,7 @@ interactions: West","West US","East US","North Europe","West Europe","West Central US","South Central US","Australia East","Australia Central","Australia Southeast","UK South","East US 2","West US 2","North Central US","Canada Central","France - Central","Central US","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01"],"defaultApiVersion":"2020-04-01","capabilities":"SupportsTags, + Central","Central US","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01"],"defaultApiVersion":"2020-04-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"ipGroups","locations":["Italy North","Qatar Central","Poland Central","UAE North","Australia Central 2","UAE Central","Germany North","Central India","Korea South","Switzerland North","Switzerland West","Japan @@ -1077,9 +1049,9 @@ interactions: US 3","Jio India West","Sweden Central","Japan East","UK West","West US","East US","North Europe","West Europe","South Central US","Australia East","Australia Central","Australia Southeast","UK South","East US 2","West US 2","North Central - US","Canada Central","France Central","West Central US","Central US","Central - US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01"],"defaultApiVersion":"2020-04-01","capabilities":"SupportsTags, - SupportsLocation"},{"resourceType":"azureWebCategories","locations":[],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01"],"defaultApiVersion":"2020-08-01","capabilities":"None"},{"resourceType":"locations/nfvOperations","locations":[],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"capabilities":"None"},{"resourceType":"locations/nfvOperationResults","locations":[],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"capabilities":"None"},{"resourceType":"virtualRouters","locations":["Italy + US","Canada Central","France Central","West Central US","Central US","Israel + Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01"],"defaultApiVersion":"2020-04-01","capabilities":"SupportsTags, + SupportsLocation"},{"resourceType":"azureWebCategories","locations":[],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01"],"defaultApiVersion":"2020-08-01","capabilities":"None"},{"resourceType":"locations/nfvOperations","locations":[],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"capabilities":"None"},{"resourceType":"locations/nfvOperationResults","locations":[],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"capabilities":"None"},{"resourceType":"virtualRouters","locations":["Italy North","Qatar Central","Poland Central","UAE North","Australia Central 2","UAE Central","Germany North","Central India","Korea South","Switzerland North","Switzerland West","Japan West","France South","South Africa West","West India","Canada @@ -1089,7 +1061,7 @@ interactions: West","West US","East US","North Europe","West Europe","West Central US","South Central US","Australia East","Australia Central","Australia Southeast","UK South","East US 2","West US 2","North Central US","Canada Central","France - Central","Central US","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01"],"defaultApiVersion":"2020-04-01","capabilities":"SupportsTags, + Central","Central US","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01"],"defaultApiVersion":"2020-04-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"networkVirtualAppliances","locations":["Italy North","Qatar Central","Poland Central","Brazil Southeast","West US 3","Jio India West","Sweden Central","UAE North","Australia Central 2","UAE Central","Germany @@ -1100,8 +1072,8 @@ interactions: US","East US","North Europe","West Europe","West Central US","South Central US","Australia East","Australia Central","Australia Southeast","UK South","East US 2","West US 2","North Central US","Canada Central","France Central","Central - US","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01"],"defaultApiVersion":"2020-04-01","capabilities":"SystemAssignedResourceIdentity, - SupportsTags, SupportsLocation"},{"resourceType":"networkVirtualApplianceSkus","locations":[],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01"],"defaultApiVersion":"2020-04-01","capabilities":"None"},{"resourceType":"checkFrontdoorNameAvailability","locations":["global","Central + US","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01"],"defaultApiVersion":"2020-04-01","capabilities":"SystemAssignedResourceIdentity, + SupportsTags, SupportsLocation"},{"resourceType":"networkVirtualApplianceSkus","locations":[],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2023-01-01-preview","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01"],"defaultApiVersion":"2020-04-01","capabilities":"None"},{"resourceType":"checkFrontdoorNameAvailability","locations":["global","Central US","East US","East US 2","North Central US","South Central US","West US","North Europe","West Europe","East Asia","Southeast Asia","Japan East","Japan West","Brazil South","Australia East","Australia Southeast"],"apiVersions":["2021-06-01","2020-07-01","2020-05-01","2020-01-01","2019-08-01","2019-05-01","2019-04-01","2018-08-01"],"defaultApiVersion":"2020-07-01","capabilities":"None"},{"resourceType":"frontdoorWebApplicationFirewallManagedRuleSets","locations":["global","Central @@ -1117,8 +1089,29 @@ interactions: 3","Central India","Korea South","Brazil Southeast","Korea Central","Southeast Asia","South Central US","Norway West","Australia East","Japan East","Canada East","Canada Central","Switzerland North","Qatar Central","Poland Central","Italy - North","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"defaultApiVersion":"2022-05-01","capabilities":"CrossResourceGroupResourceMove, - CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"networkManagerConnections","locations":[],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"defaultApiVersion":"2022-05-01","capabilities":"SupportsExtension"},{"resourceType":"locations/queryNetworkSecurityPerimeter","locations":["West + North","Israel Central","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"defaultApiVersion":"2022-05-01","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"networkManagerConnections","locations":[],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"defaultApiVersion":"2022-05-01","capabilities":"SupportsExtension"},{"resourceType":"networkSecurityPerimeters","locations":["West + Central US","Jio India West","Jio India Central","North Central US","West + US","West Europe","UAE Central","Germany North","East US","West India","East + US 2","Australia Central","Australia Central 2","South Africa West","Brazil + South","UK West","North Europe","Central US","UAE North","Germany West Central","Switzerland + West","East Asia","South Africa North","UK South","South India","Australia + Southeast","France South","West US 2","Sweden Central","Japan West","Norway + East","France Central","West US 3","Central India","Korea South","Brazil Southeast","Korea + Central","Southeast Asia","South Central US","Norway West","Australia East","Japan + East","Canada East","Canada Central","Switzerland North","Qatar Central","Poland + Central","Italy North","Israel Central","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-09-01-preview","2023-08-01-preview","2023-07-01-preview","2022-02-01-preview","2021-05-01-preview","2021-02-01-preview"],"defaultApiVersion":"2021-02-01-preview","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"locations/perimeterAssociableResourceTypes","locations":["West + Central US","Jio India West","Jio India Central","North Central US","West + US","West Europe","UAE Central","Germany North","East US","West India","East + US 2","Australia Central","Australia Central 2","South Africa West","Brazil + South","UK West","North Europe","Central US","UAE North","Germany West Central","Switzerland + West","East Asia","South Africa North","UK South","South India","Australia + Southeast","France South","West US 2","Sweden Central","Japan West","Norway + East","France Central","West US 3","Central India","Korea South","Brazil Southeast","Korea + Central","Southeast Asia","South Central US","Norway West","Australia East","Japan + East","Canada East","Canada Central","Switzerland North","Qatar Central","Poland + Central","Italy North","Israel Central","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-09-01-preview","2023-08-01-preview","2023-07-01-preview","2022-02-01-preview","2021-05-01-preview","2021-02-01-preview"],"defaultApiVersion":"2021-02-01-preview","capabilities":"None"},{"resourceType":"locations/queryNetworkSecurityPerimeter","locations":["West Central US","Jio India West","North Central US","West US","West Europe","UAE Central","Germany North","East US","West India","East US 2","Australia Central","Australia Central 2","South Africa West","Brazil South","UK West","North Europe","Central @@ -1128,7 +1121,7 @@ interactions: 3","Central India","Korea South","Brazil Southeast","Korea Central","Southeast Asia","South Central US","Norway West","Australia East","Japan East","Canada East","Canada Central","Switzerland North","Qatar Central","Poland Central","Italy - North","East US 2 EUAP","Central US EUAP"],"apiVersions":["2022-02-01-preview","2021-05-01-preview","2021-02-01-preview"],"defaultApiVersion":"2021-02-01-preview","capabilities":"None"},{"resourceType":"virtualNetworks/listNetworkManagerEffectiveConnectivityConfigurations","locations":["West + North","Israel Central","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-09-01-preview","2023-08-01-preview","2023-07-01-preview","2022-02-01-preview","2021-05-01-preview","2021-02-01-preview"],"defaultApiVersion":"2021-02-01-preview","capabilities":"None"},{"resourceType":"virtualNetworks/listNetworkManagerEffectiveConnectivityConfigurations","locations":["West Central US","North Central US","West US","West Europe","UAE Central","Germany North","East US","West India","East US 2","Australia Central","Australia Central 2","South Africa West","Brazil South","UK West","North Europe","Central US","UAE @@ -1138,7 +1131,7 @@ interactions: 3","Central India","Korea South","Brazil Southeast","Korea Central","Southeast Asia","South Central US","Norway West","Australia East","Japan East","Canada East","Canada Central","Switzerland North","Qatar Central","Poland Central","Italy - North","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"defaultApiVersion":"2022-05-01","capabilities":"None"},{"resourceType":"virtualNetworks/listNetworkManagerEffectiveSecurityAdminRules","locations":["West + North","Israel Central","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"defaultApiVersion":"2022-05-01","capabilities":"None"},{"resourceType":"virtualNetworks/listNetworkManagerEffectiveSecurityAdminRules","locations":["West Central US","North Central US","West US","West Europe","UAE Central","Germany North","East US","West India","East US 2","Australia Central","Australia Central 2","South Africa West","Brazil South","UK West","North Europe","Central US","UAE @@ -1148,7 +1141,7 @@ interactions: 3","Central India","Korea South","Brazil Southeast","Korea Central","Southeast Asia","South Central US","Norway West","Australia East","Japan East","Canada East","Canada Central","Switzerland North","Qatar Central","Poland Central","Italy - North","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"defaultApiVersion":"2022-05-01","capabilities":"None"},{"resourceType":"networkGroupMemberships","locations":["West + North","Israel Central","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"defaultApiVersion":"2022-05-01","capabilities":"None"},{"resourceType":"networkGroupMemberships","locations":["West Central US","North Central US","West US","West Europe","UAE Central","Germany North","East US","West India","East US 2","Australia Central","Australia Central 2","South Africa West","Brazil South","UK West","North Europe","Central US","UAE @@ -1158,7 +1151,7 @@ interactions: 3","Central India","Korea South","Brazil Southeast","Korea Central","Southeast Asia","South Central US","Norway West","Australia East","Japan East","Canada East","Canada Central","Switzerland North","Qatar Central","Poland Central","Italy - North","East US 2 EUAP","Central US EUAP"],"apiVersions":["2022-06-01-preview"],"defaultApiVersion":"2022-06-01-preview","capabilities":"SupportsExtension"},{"resourceType":"locations/commitInternalAzureNetworkManagerConfiguration","locations":["West + North","Israel Central","East US 2 EUAP","Central US EUAP"],"apiVersions":["2022-06-01-preview"],"defaultApiVersion":"2022-06-01-preview","capabilities":"SupportsExtension"},{"resourceType":"locations/commitInternalAzureNetworkManagerConfiguration","locations":["West Central US","North Central US","West US","West Europe","UAE Central","Germany North","East US","West India","East US 2","Australia Central","Australia Central 2","South Africa West","Brazil South","UK West","North Europe","Central US","UAE @@ -1168,7 +1161,7 @@ interactions: 3","Central India","Korea South","Brazil Southeast","Korea Central","Southeast Asia","South Central US","Norway West","Australia East","Japan East","Canada East","Canada Central","Switzerland North","Qatar Central","Poland Central","Italy - North","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"capabilities":"None"},{"resourceType":"locations/internalAzureVirtualNetworkManagerOperation","locations":["West + North","Israel Central","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"capabilities":"None"},{"resourceType":"locations/internalAzureVirtualNetworkManagerOperation","locations":["West Central US","North Central US","West US","West Europe","UAE Central","Germany North","East US","West India","East US 2","Australia Central","Australia Central 2","South Africa West","Brazil South","UK West","North Europe","Central US","UAE @@ -1178,7 +1171,77 @@ interactions: 3","Central India","Korea South","Brazil Southeast","Korea Central","Southeast Asia","South Central US","Norway West","Australia East","Japan East","Canada East","Canada Central","Switzerland North","Qatar Central","Poland Central","Italy - North","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"capabilities":"None"},{"resourceType":"dnszones","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2016-04-01"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2016-04-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2016-04-01"}],"capabilities":"CrossResourceGroupResourceMove, + North","Israel Central","East US 2 EUAP","Central US EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-03-01-preview","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-06-01-preview","2022-05-01","2022-04-01-preview","2022-01-01"],"capabilities":"None"},{"resourceType":"dnsResolvers","locations":["West + Central US","East US 2","West Europe","North Europe","Australia East","UK + South","South Central US","East US","North Central US","West US 2","West US + 3","Southeast Asia","Central India","Canada Central","Central US","France + Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden + Central","East Asia","Switzerland North","Brazil South","West US","Norway + East","UAE North","Australia Southeast","Canada East","Japan West","Italy + North","Israel Central","Uk West","South India","Qatar Central","Poland Central","Central + US EUAP","East US 2 EUAP"],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dnsResolvers/inboundEndpoints","locations":["West + Central US","East US 2","West Europe","North Europe","Australia East","UK + South","South Central US","East US","North Central US","West US 2","West US + 3","Southeast Asia","Central India","Canada Central","Central US","France + Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden + Central","East Asia","Switzerland North","Brazil South","West US","Norway + East","UAE North","Australia Southeast","Canada East","Japan West","Italy + North","Israel Central","Uk West","South India","Qatar Central","Poland Central","Central + US EUAP","East US 2 EUAP"],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dnsResolvers/outboundEndpoints","locations":["West + Central US","East US 2","West Europe","North Europe","Australia East","UK + South","South Central US","East US","North Central US","West US 2","West US + 3","Southeast Asia","Central India","Canada Central","Central US","France + Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden + Central","East Asia","Switzerland North","Brazil South","West US","Norway + East","UAE North","Australia Southeast","Canada East","Japan West","Italy + North","Israel Central","Uk West","South India","Qatar Central","Poland Central","Central + US EUAP","East US 2 EUAP"],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dnsForwardingRulesets","locations":["West + Central US","East US 2","West Europe","North Europe","Australia East","UK + South","South Central US","East US","North Central US","West US 2","West US + 3","Southeast Asia","Central India","Canada Central","Central US","France + Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden + Central","East Asia","Switzerland North","Brazil South","West US","Norway + East","UAE North","Australia Southeast","Canada East","Japan West","Italy + North","Israel Central","Uk West","South India","Qatar Central","Poland Central","Central + US EUAP","East US 2 EUAP"],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dnsForwardingRulesets/forwardingRules","locations":["West + Central US","East US 2","West Europe","North Europe","Australia East","UK + South","South Central US","East US","North Central US","West US 2","West US + 3","Southeast Asia","Central India","Canada Central","Central US","France + Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden + Central","East Asia","Switzerland North","Brazil South","West US","Norway + East","UAE North","Australia Southeast","Canada East","Japan West","Italy + North","Israel Central","Uk West","South India","Qatar Central","Poland Central","Central + US EUAP","East US 2 EUAP"],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"dnsForwardingRulesets/virtualNetworkLinks","locations":["West + Central US","East US 2","West Europe","North Europe","Australia East","UK + South","South Central US","East US","North Central US","West US 2","West US + 3","Southeast Asia","Central India","Canada Central","Central US","France + Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden + Central","East Asia","Switzerland North","Brazil South","West US","Norway + East","UAE North","Australia Southeast","Canada East","Japan West","Italy + North","Israel Central","Uk West","South India","Qatar Central","Poland Central","Central + US EUAP","East US 2 EUAP"],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"virtualNetworks/listDnsResolvers","locations":["West + Central US","East US 2","West Europe","North Europe","Australia East","UK + South","South Central US","East US","North Central US","West US 2","West US + 3","Southeast Asia","Central India","Canada Central","Central US","France + Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden + Central","East Asia","Switzerland North","Brazil South","West US","Norway + East","UAE North","Australia Southeast","Canada East","Japan West","Italy + North","Israel Central","Uk West","South India","Qatar Central","Poland Central","Central + US EUAP","East US 2 EUAP"],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"virtualNetworks/listDnsForwardingRulesets","locations":["West + Central US","East US 2","West Europe","North Europe","Australia East","UK + South","South Central US","East US","North Central US","West US 2","West US + 3","Southeast Asia","Central India","Canada Central","Central US","France + Central","Japan East","Germany West Central","South Africa North","Korea Central","Sweden + Central","East Asia","Switzerland North","Brazil South","West US","Norway + East","UAE North","Australia Southeast","Canada East","Japan West","Italy + North","Israel Central","Uk West","South India","Qatar Central","Poland Central","Central + US EUAP","East US 2 EUAP"],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"locations/dnsResolverOperationResults","locations":[],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"locations/dnsResolverOperationStatuses","locations":[],"apiVersions":["2023-07-01-preview","2023-07-01","2022-07-01","2020-04-01-preview"],"defaultApiVersion":"2020-04-01-preview","capabilities":"None"},{"resourceType":"locations/dnsResolverPolicyOperationResults","locations":[],"apiVersions":["2023-07-01-preview"],"defaultApiVersion":"2023-07-01-preview","capabilities":"None"},{"resourceType":"locations/dnsResolverPolicyOperationStatuses","locations":[],"apiVersions":["2023-07-01-preview"],"defaultApiVersion":"2023-07-01-preview","capabilities":"None"},{"resourceType":"privateDnsZones","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"privateDnsZones/virtualNetworkLinks","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"privateDnsOperationResults","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsOperationStatuses","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZonesInternal","locations":["global"],"apiVersions":["2020-06-01","2020-01-01"],"defaultApiVersion":"2020-01-01","capabilities":"None"},{"resourceType":"privateDnsZones/A","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/AAAA","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/CNAME","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/PTR","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/MX","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/TXT","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/SRV","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/SOA","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"privateDnsZones/all","locations":["global"],"apiVersions":["2020-06-01","2020-01-01","2018-09-01"],"defaultApiVersion":"2018-09-01","capabilities":"None"},{"resourceType":"virtualNetworks/privateDnsZoneLinks","locations":["global"],"apiVersions":["2020-06-01"],"defaultApiVersion":"2020-06-01","capabilities":"None"},{"resourceType":"dnszones","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2016-04-01"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2016-04-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2016-04-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dnsOperationResults","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnsOperationStatuses","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"getDnsResourceReference","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"internalNotify","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/A","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/AAAA","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/CNAME","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/PTR","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/MX","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/TXT","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/SRV","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/SOA","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/NS","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/CAA","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/DS","locations":["global"],"apiVersions":["2023-07-01-preview"],"defaultApiVersion":"2023-07-01-preview","capabilities":"None"},{"resourceType":"dnszones/TLSA","locations":["global"],"apiVersions":["2023-07-01-preview"],"defaultApiVersion":"2023-07-01-preview","capabilities":"None"},{"resourceType":"dnszones/NAPTR","locations":["global"],"apiVersions":["2023-07-01-preview"],"defaultApiVersion":"2023-07-01-preview","capabilities":"None"},{"resourceType":"dnszones/recordsets","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/all","locations":["global"],"apiVersions":["2023-07-01-preview","2018-05-01","2018-03-01-preview","2017-10-01","2017-09-15-preview","2017-09-01","2016-04-01","2015-05-04-preview"],"defaultApiVersion":"2018-05-01","capabilities":"None"},{"resourceType":"dnszones/dnssecConfigs","locations":["global"],"apiVersions":["2023-07-01-preview"],"defaultApiVersion":"2023-07-01-preview","capabilities":"None"},{"resourceType":"virtualNetworks","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1187,7 +1250,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"virtualNetworks/taggedTrafficConsumers","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1196,7 +1260,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"natGateways","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"natGateways","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1204,7 +1269,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01"],"defaultApiVersion":"2020-03-01","zoneMappings":[{"location":"Australia + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01"],"defaultApiVersion":"2020-03-01","zoneMappings":[{"location":"Australia East","zones":["3","2","1"]},{"location":"Brazil South","zones":["3","2","1"]},{"location":"Canada Central","zones":["3","2","1"]},{"location":"Central India","zones":["3","2","1"]},{"location":"Central US","zones":["3","2","1"]},{"location":"Central US EUAP","zones":["2","1"]},{"location":"East @@ -1219,8 +1285,8 @@ interactions: Central","zones":["3","2","1"]},{"location":"Switzerland North","zones":["3","2","1"]},{"location":"UAE North","zones":["3","2","1"]},{"location":"UK South","zones":["3","2","1"]},{"location":"West Europe","zones":["3","2","1"]},{"location":"West US","zones":[]},{"location":"West - US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Italy - North","zones":["3","2","1"]}],"capabilities":"CrossResourceGroupResourceMove, + US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Israel + Central","zones":["3","2","1"]},{"location":"Italy North","zones":["3","2","1"]}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"publicIPAddresses","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1229,7 +1295,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"zoneMappings":[{"location":"Australia + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"zoneMappings":[{"location":"Australia East","zones":["3","2","1"]},{"location":"Brazil South","zones":["3","2","1"]},{"location":"Canada Central","zones":["3","2","1"]},{"location":"Central India","zones":["3","2","1"]},{"location":"Central US","zones":["3","2","1"]},{"location":"Central US EUAP","zones":["2","1"]},{"location":"East @@ -1244,8 +1311,8 @@ interactions: Central","zones":["3","2","1"]},{"location":"Switzerland North","zones":["3","2","1"]},{"location":"UAE North","zones":["3","2","1"]},{"location":"UK South","zones":["3","2","1"]},{"location":"West Europe","zones":["3","2","1"]},{"location":"West US","zones":[]},{"location":"West - US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Italy - North","zones":["3","2","1"]}],"capabilities":"CrossResourceGroupResourceMove, + US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Israel + Central","zones":["3","2","1"]},{"location":"Italy North","zones":["3","2","1"]}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"internalPublicIpAddresses","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1254,7 +1321,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"customIpPrefixes","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"customIpPrefixes","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1262,7 +1330,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01"],"defaultApiVersion":"2020-06-01","zoneMappings":[{"location":"Australia + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01"],"defaultApiVersion":"2020-06-01","zoneMappings":[{"location":"Australia East","zones":["3","2","1"]},{"location":"Brazil South","zones":["3","2","1"]},{"location":"Canada Central","zones":["3","2","1"]},{"location":"Central India","zones":["3","2","1"]},{"location":"Central US","zones":["3","2","1"]},{"location":"Central US EUAP","zones":["2","1"]},{"location":"East @@ -1277,8 +1346,8 @@ interactions: Central","zones":["3","2","1"]},{"location":"Switzerland North","zones":["3","2","1"]},{"location":"UAE North","zones":["3","2","1"]},{"location":"UK South","zones":["3","2","1"]},{"location":"West Europe","zones":["3","2","1"]},{"location":"West US","zones":[]},{"location":"West - US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Italy - North","zones":["3","2","1"]}],"capabilities":"CrossResourceGroupResourceMove, + US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Israel + Central","zones":["3","2","1"]},{"location":"Italy North","zones":["3","2","1"]}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"networkInterfaces","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1287,7 +1356,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"dscpConfigurations","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1296,7 +1366,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01"],"defaultApiVersion":"2020-06-01","capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01"],"defaultApiVersion":"2020-06-01","capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"privateEndpoints","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1305,7 +1376,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"privateEndpoints/privateLinkServiceProxies","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1314,7 +1386,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01"],"defaultApiVersion":"2020-03-01","capabilities":"None"},{"resourceType":"privateEndpointRedirectMaps","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01"],"defaultApiVersion":"2020-03-01","capabilities":"None"},{"resourceType":"privateEndpointRedirectMaps","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1322,7 +1395,7 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar Central","Poland - Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Italy North","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"loadBalancers","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil @@ -1331,7 +1404,7 @@ interactions: South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar Central","Poland - Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, + Central","Italy North","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"networkSecurityGroups","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1340,7 +1413,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"applicationSecurityGroups","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1349,7 +1423,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2017-09-01"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2017-09-01"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"serviceEndpointPolicies","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1358,7 +1433,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"networkIntentPolicies","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1367,7 +1443,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"routeTables","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1376,7 +1453,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"publicIPPrefixes","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1385,7 +1463,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01"],"defaultApiVersion":"2020-03-01","zoneMappings":[{"location":"Australia + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01"],"defaultApiVersion":"2020-03-01","zoneMappings":[{"location":"Australia East","zones":["3","2","1"]},{"location":"Brazil South","zones":["3","2","1"]},{"location":"Canada Central","zones":["3","2","1"]},{"location":"Central India","zones":["3","2","1"]},{"location":"Central US","zones":["3","2","1"]},{"location":"Central US EUAP","zones":["2","1"]},{"location":"East @@ -1400,8 +1479,8 @@ interactions: Central","zones":["3","2","1"]},{"location":"Switzerland North","zones":["3","2","1"]},{"location":"UAE North","zones":["3","2","1"]},{"location":"UK South","zones":["3","2","1"]},{"location":"West Europe","zones":["3","2","1"]},{"location":"West US","zones":[]},{"location":"West - US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Italy - North","zones":["3","2","1"]}],"capabilities":"CrossResourceGroupResourceMove, + US 2","zones":["3","2","1"]},{"location":"West US 3","zones":["3","2","1"]},{"location":"Israel + Central","zones":["3","2","1"]},{"location":"Italy North","zones":["3","2","1"]}],"capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"networkWatchers","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1410,7 +1489,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"networkWatchers/connectionMonitors","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1419,7 +1499,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"networkWatchers/flowLogs","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1428,7 +1509,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"networkWatchers/pingMeshes","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1437,8 +1519,9 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, - CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"locations","locations":[],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"locations/operations","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"locations","locations":[],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"locations/operations","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1446,7 +1529,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"locations/operationResults","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"locations/operationResults","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1454,7 +1538,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"locations/CheckDnsNameAvailability","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"locations/CheckDnsNameAvailability","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1462,7 +1547,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"capabilities":"None"},{"resourceType":"locations/setLoadBalancerFrontendPublicIpAddresses","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"capabilities":"None"},{"resourceType":"locations/setLoadBalancerFrontendPublicIpAddresses","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1470,7 +1556,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01"],"capabilities":"None"},{"resourceType":"cloudServiceSlots","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01"],"capabilities":"None"},{"resourceType":"cloudServiceSlots","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1478,7 +1565,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01"],"capabilities":"SupportsExtension"},{"resourceType":"locations/usages","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01"],"capabilities":"SupportsExtension"},{"resourceType":"locations/usages","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1486,7 +1574,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"locations/virtualNetworkAvailableEndpointServices","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2015-06-15"},{"profileVersion":"2018-03-01-hybrid","apiVersion":"2017-10-01"},{"profileVersion":"2019-03-01-hybrid","apiVersion":"2017-10-01"}],"capabilities":"None"},{"resourceType":"locations/virtualNetworkAvailableEndpointServices","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1494,7 +1583,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01"],"capabilities":"None"},{"resourceType":"locations/availableDelegations","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01"],"capabilities":"None"},{"resourceType":"locations/availableDelegations","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1502,7 +1592,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/serviceTags","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/serviceTags","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1510,7 +1601,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01"],"capabilities":"None"},{"resourceType":"locations/availablePrivateEndpointTypes","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01"],"capabilities":"None"},{"resourceType":"locations/availablePrivateEndpointTypes","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1518,7 +1610,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01"],"capabilities":"None"},{"resourceType":"locations/availableServiceAliases","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01"],"capabilities":"None"},{"resourceType":"locations/availableServiceAliases","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1526,7 +1619,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01"],"capabilities":"None"},{"resourceType":"locations/checkPrivateLinkServiceVisibility","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01"],"capabilities":"None"},{"resourceType":"locations/checkPrivateLinkServiceVisibility","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1534,7 +1628,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01"],"capabilities":"None"},{"resourceType":"locations/autoApprovedPrivateLinkServices","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01"],"capabilities":"None"},{"resourceType":"locations/autoApprovedPrivateLinkServices","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1542,7 +1637,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01"],"capabilities":"None"},{"resourceType":"locations/batchValidatePrivateEndpointsForResourceMove","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01"],"capabilities":"None"},{"resourceType":"locations/batchValidatePrivateEndpointsForResourceMove","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1550,7 +1646,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01"],"capabilities":"None"},{"resourceType":"locations/batchNotifyPrivateEndpointsForResourceMove","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01"],"capabilities":"None"},{"resourceType":"locations/batchNotifyPrivateEndpointsForResourceMove","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1558,7 +1655,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01"],"capabilities":"None"},{"resourceType":"locations/supportedVirtualMachineSizes","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01"],"capabilities":"None"},{"resourceType":"locations/supportedVirtualMachineSizes","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1566,7 +1664,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/setAzureNetworkManagerConfiguration","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/setAzureNetworkManagerConfiguration","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1574,7 +1673,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01"],"capabilities":"None"},{"resourceType":"locations/publishResources","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01"],"capabilities":"None"},{"resourceType":"locations/publishResources","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1582,7 +1682,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"locations/getAzureNetworkManagerConfiguration","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"locations/getAzureNetworkManagerConfiguration","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1590,7 +1691,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01"],"capabilities":"None"},{"resourceType":"locations/checkAcceleratedNetworkingSupport","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01"],"capabilities":"None"},{"resourceType":"locations/checkAcceleratedNetworkingSupport","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1598,7 +1700,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/validateResourceOwnership","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/validateResourceOwnership","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1606,7 +1709,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/setResourceOwnership","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/setResourceOwnership","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1614,7 +1718,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/effectiveResourceOwnership","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"locations/effectiveResourceOwnership","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1622,7 +1727,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"operations","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01"],"capabilities":"None"},{"resourceType":"operations","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1630,7 +1736,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"capabilities":"None"},{"resourceType":"virtualNetworkTaps","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01","2017-08-01","2017-06-01","2017-04-01","2017-03-01","2016-12-01","2016-11-01","2016-10-01","2016-09-01","2016-08-01","2016-07-01","2016-06-01","2016-03-30","2015-06-15","2015-05-01-preview","2014-12-01-preview"],"capabilities":"None"},{"resourceType":"virtualNetworkTaps","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1638,7 +1745,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"privateLinkServices","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1647,7 +1755,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"locations/privateLinkServices","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1656,7 +1765,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01"],"capabilities":"None"},{"resourceType":"ddosProtectionPlans","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01"],"capabilities":"None"},{"resourceType":"ddosProtectionPlans","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1664,7 +1774,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2018-02-01"}],"capabilities":"SupportsTags, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01"],"defaultApiVersion":"2020-03-01","apiProfiles":[{"profileVersion":"2017-03-09-profile","apiVersion":"2018-02-01"}],"capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"networkProfiles","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil @@ -1673,7 +1784,7 @@ interactions: South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar Central","Poland - Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, + Central","Italy North","Israel Central","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01"],"defaultApiVersion":"2020-03-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"locations/bareMetalTenants","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1682,7 +1793,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01"],"capabilities":"None"},{"resourceType":"ipAllocations","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01"],"capabilities":"None"},{"resourceType":"ipAllocations","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1690,7 +1802,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"},{"resourceType":"locations/serviceTagDetails","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan @@ -1699,7 +1812,53 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01"],"capabilities":"None"},{"resourceType":"locations/dataTasks","locations":["West + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01"],"capabilities":"None"},{"resourceType":"locations/dataTasks","locations":["West + US","East US","North Europe","West Europe","East Asia","Southeast Asia","North + Central US","South Central US","Central US","East US 2","Japan East","Japan + West","Brazil South","Australia East","Australia Southeast","Central India","South + India","West India","Canada Central","Canada East","West Central US","West + US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia + Central","South Africa North","UAE North","Switzerland North","Germany West + Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01"],"capabilities":"None"},{"resourceType":"locations/startPacketTagging","locations":["West + US","East US","North Europe","West Europe","East Asia","Southeast Asia","North + Central US","South Central US","Central US","East US 2","Japan East","Japan + West","Brazil South","Australia East","Australia Southeast","Central India","South + India","West India","Canada Central","Canada East","West Central US","West + US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia + Central","South Africa North","UAE North","Switzerland North","Germany West + Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"locations/deletePacketTagging","locations":["West + US","East US","North Europe","West Europe","East Asia","Southeast Asia","North + Central US","South Central US","Central US","East US 2","Japan East","Japan + West","Brazil South","Australia East","Australia Southeast","Central India","South + India","West India","Canada Central","Canada East","West Central US","West + US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia + Central","South Africa North","UAE North","Switzerland North","Germany West + Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"locations/getPacketTagging","locations":["West + US","East US","North Europe","West Europe","East Asia","Southeast Asia","North + Central US","South Central US","Central US","East US 2","Japan East","Japan + West","Brazil South","Australia East","Australia Southeast","Central India","South + India","West India","Canada Central","Canada East","West Central US","West + US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia + Central","South Africa North","UAE North","Switzerland North","Germany West + Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"locations/rnmEffectiveRouteTable","locations":["West + US","East US","North Europe","West Europe","East Asia","Southeast Asia","North + Central US","South Central US","Central US","East US 2","Japan East","Japan + West","Brazil South","Australia East","Australia Southeast","Central India","South + India","West India","Canada Central","Canada East","West Central US","West + US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia + Central","South Africa North","UAE North","Switzerland North","Germany West + Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"locations/rnmEffectiveNetworkSecurityGroups","locations":["West US","East US","North Europe","West Europe","East Asia","Southeast Asia","North Central US","South Central US","Central US","East US 2","Japan East","Japan West","Brazil South","Australia East","Australia Southeast","Central India","South @@ -1707,7 +1866,8 @@ interactions: US 2","UK West","UK South","Korea Central","Korea South","France Central","Australia Central","South Africa North","UAE North","Switzerland North","Germany West Central","Norway East","West US 3","Jio India West","Sweden Central","Qatar - Central","Poland Central","Italy North","Central US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01"],"capabilities":"None"},{"resourceType":"frontdoorOperationResults","locations":["global"],"apiVersions":["2022-05-01","2021-06-01","2020-11-01","2020-07-01","2020-05-01","2020-04-01","2020-01-01","2019-11-01","2019-10-01","2019-08-01","2019-05-01","2019-04-01","2019-03-01","2018-08-01"],"defaultApiVersion":"2020-07-01","capabilities":"None"},{"resourceType":"frontdoors","locations":["Central + Central","Poland Central","Italy North","Israel Central","Central US EUAP","East + US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01"],"capabilities":"None"},{"resourceType":"frontdoorOperationResults","locations":["global"],"apiVersions":["2022-05-01","2021-06-01","2020-11-01","2020-07-01","2020-05-01","2020-04-01","2020-01-01","2019-11-01","2019-10-01","2019-08-01","2019-05-01","2019-04-01","2019-03-01","2018-08-01"],"defaultApiVersion":"2020-07-01","capabilities":"None"},{"resourceType":"frontdoors","locations":["Central US EUAP","East US 2 EUAP","global","Central US","East US","East US 2","North Central US","South Central US","West US","North Europe","West Europe","East Asia","Southeast Asia","Japan East","Japan West","Brazil South","Australia @@ -1731,17 +1891,17 @@ interactions: Europe","East Asia","Southeast Asia","Japan East","Japan West","Brazil South","Australia East","Australia Southeast"],"apiVersions":["2019-11-01"],"defaultApiVersion":"2019-11-01","capabilities":"SupportsTags, SupportsLocation"},{"resourceType":"networkWatchers/lenses","locations":["Central - US EUAP","East US 2 EUAP"],"apiVersions":["2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, + US EUAP","East US 2 EUAP"],"apiVersions":["2023-09-01","2023-06-01","2023-05-01","2023-04-01","2023-02-01","2022-11-01","2022-09-01","2022-07-01","2022-05-01","2022-01-01","2021-12-01","2021-08-01","2021-06-01","2021-05-01","2021-04-01","2021-03-01","2021-02-01","2021-01-01","2020-11-01","2020-08-01","2020-07-01","2020-06-01","2020-05-01","2020-04-01","2020-03-01","2020-01-01","2019-12-01","2019-11-01","2019-09-01","2019-08-01","2019-07-01","2019-06-01","2019-04-01","2019-02-01","2018-12-01","2018-11-01","2018-10-01","2018-08-01","2018-07-01","2018-06-01","2018-05-01","2018-04-01","2018-03-01","2018-02-01","2018-01-01","2017-11-01","2017-10-01","2017-09-01"],"defaultApiVersion":"2020-03-01","capabilities":"CrossResourceGroupResourceMove, CrossSubscriptionResourceMove, SupportsTags, SupportsLocation"}],"registrationState":"Registered","registrationPolicy":"RegistrationRequired"}' headers: cache-control: - no-cache content-length: - - '162445' + - '174807' content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:23 GMT + - Fri, 22 Dec 2023 10:07:47 GMT expires: - '-1' pragma: @@ -1770,12 +1930,12 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet?api-version=2023-06-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet?api-version=2023-09-01 response: body: - string: '{"name":"proxy-subnet","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet","etag":"W/\"d059dcc8-26c0-433d-b474-8470a0820bfb\"","properties":{"provisioningState":"Succeeded","addressPrefix":"10.42.3.0/24","delegations":[],"privateEndpointNetworkPolicies":"Disabled","privateLinkServiceNetworkPolicies":"Enabled"},"type":"Microsoft.Network/virtualNetworks/subnets"}' + string: '{"name":"proxy-subnet","id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet","etag":"W/\"a772ff56-794f-42f0-b631-45847605ffe7\"","properties":{"provisioningState":"Succeeded","addressPrefix":"10.42.3.0/24","delegations":[],"privateEndpointNetworkPolicies":"Disabled","privateLinkServiceNetworkPolicies":"Enabled"},"type":"Microsoft.Network/virtualNetworks/subnets"}' headers: cache-control: - no-cache @@ -1784,9 +1944,9 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:23 GMT + - Fri, 22 Dec 2023 10:07:48 GMT etag: - - W/"d059dcc8-26c0-433d-b474-8470a0820bfb" + - W/"a772ff56-794f-42f0-b631-45847605ffe7" expires: - '-1' pragma: @@ -1803,7 +1963,7 @@ interactions: x-content-type-options: - nosniff x-ms-arm-service-request-id: - - f4d6f48c-1281-47a0-93da-fd05f5bd6801 + - 4a6966e3-4888-4daa-8dc7-9e63ad06c627 status: code: 200 message: OK @@ -1822,13 +1982,13 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-compute/30.0.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-compute/30.4.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions?$top=1&$orderby=name%20desc&api-version=2022-11-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions?$top=1&$orderby=name%20desc&api-version=2023-09-01 response: body: - string: "[\r\n {\r\n \"location\": \"westus2\",\r\n \"name\": \"20.04.202308310\",\r\n - \ \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202308310\"\r\n + string: "[\r\n {\r\n \"location\": \"westus2\",\r\n \"name\": \"20.04.202312080\",\r\n + \ \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202312080\"\r\n \ }\r\n]" headers: cache-control: @@ -1838,7 +1998,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:23 GMT + - Fri, 22 Dec 2023 10:07:48 GMT expires: - '-1' pragma: @@ -1848,14 +2008,10 @@ interactions: - Microsoft-HTTPAPI/2.0 strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-resource: - - Microsoft.Compute/ListVMImagesVersionsFromLocation3Min;15998,Microsoft.Compute/ListVMImagesVersionsFromLocation30Min;43998 + - Microsoft.Compute/ListVMImagesVersionsFromLocation3Min;15998,Microsoft.Compute/ListVMImagesVersionsFromLocation30Min;43993 status: code: 200 message: OK @@ -1874,9 +2030,9 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-compute/30.0.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-compute/30.4.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions/20.04.202308310?api-version=2022-11-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions/20.04.202312080?api-version=2023-09-01 response: body: string: "{\r\n \"properties\": {\r\n \"hyperVGeneration\": \"V1\",\r\n \"architecture\": @@ -1890,7 +2046,7 @@ interactions: \"IsHibernateSupported\",\r\n \"value\": \"True\"\r\n }\r\n ],\r\n \ \"osDiskImage\": {\r\n \"operatingSystem\": \"Linux\",\r\n \"sizeInBytes\": 32213303808\r\n },\r\n \"dataDiskImages\": []\r\n },\r\n \"location\": - \"westus2\",\r\n \"name\": \"20.04.202308310\",\r\n \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202308310\"\r\n}" + \"westus2\",\r\n \"name\": \"20.04.202312080\",\r\n \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202312080\"\r\n}" headers: cache-control: - no-cache @@ -1899,7 +2055,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:24 GMT + - Fri, 22 Dec 2023 10:07:49 GMT expires: - '-1' pragma: @@ -1909,14 +2065,10 @@ interactions: - Microsoft-HTTPAPI/2.0 strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-resource: - - Microsoft.Compute/GetVMImageFromLocation3Min;12998,Microsoft.Compute/GetVMImageFromLocation30Min;73998 + - Microsoft.Compute/GetVMImageFromLocation3Min;12998,Microsoft.Compute/GetVMImageFromLocation30Min;73994 status: code: 200 message: OK @@ -1935,13 +2087,13 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-compute/30.0.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-compute/30.4.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions?$top=1&$orderby=name%20desc&api-version=2022-11-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions?$top=1&$orderby=name%20desc&api-version=2023-09-01 response: body: - string: "[\r\n {\r\n \"location\": \"westus2\",\r\n \"name\": \"20.04.202308310\",\r\n - \ \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202308310\"\r\n + string: "[\r\n {\r\n \"location\": \"westus2\",\r\n \"name\": \"20.04.202312080\",\r\n + \ \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202312080\"\r\n \ }\r\n]" headers: cache-control: @@ -1951,7 +2103,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:24 GMT + - Fri, 22 Dec 2023 10:07:50 GMT expires: - '-1' pragma: @@ -1968,7 +2120,7 @@ interactions: x-content-type-options: - nosniff x-ms-ratelimit-remaining-resource: - - Microsoft.Compute/ListVMImagesVersionsFromLocation3Min;15997,Microsoft.Compute/ListVMImagesVersionsFromLocation30Min;43997 + - Microsoft.Compute/ListVMImagesVersionsFromLocation3Min;15997,Microsoft.Compute/ListVMImagesVersionsFromLocation30Min;43992 status: code: 200 message: OK @@ -1987,9 +2139,9 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-compute/30.0.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-compute/30.4.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions/20.04.202308310?api-version=2022-11-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Compute/locations/westus2/publishers/Canonical/artifacttypes/vmimage/offers/0001-com-ubuntu-server-focal/skus/20_04-lts/versions/20.04.202312080?api-version=2023-09-01 response: body: string: "{\r\n \"properties\": {\r\n \"hyperVGeneration\": \"V1\",\r\n \"architecture\": @@ -2003,7 +2155,7 @@ interactions: \"IsHibernateSupported\",\r\n \"value\": \"True\"\r\n }\r\n ],\r\n \ \"osDiskImage\": {\r\n \"operatingSystem\": \"Linux\",\r\n \"sizeInBytes\": 32213303808\r\n },\r\n \"dataDiskImages\": []\r\n },\r\n \"location\": - \"westus2\",\r\n \"name\": \"20.04.202308310\",\r\n \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202308310\"\r\n}" + \"westus2\",\r\n \"name\": \"20.04.202312080\",\r\n \"id\": \"/Subscriptions/00000000-0000-0000-0000-000000000000/Providers/Microsoft.Compute/Locations/westus2/Publishers/Canonical/ArtifactTypes/VMImage/Offers/0001-com-ubuntu-server-focal/Skus/20_04-lts/Versions/20.04.202312080\"\r\n}" headers: cache-control: - no-cache @@ -2012,7 +2164,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:25 GMT + - Fri, 22 Dec 2023 10:07:49 GMT expires: - '-1' pragma: @@ -2029,7 +2181,7 @@ interactions: x-content-type-options: - nosniff x-ms-ratelimit-remaining-resource: - - Microsoft.Compute/GetVMImageFromLocation3Min;12997,Microsoft.Compute/GetVMImageFromLocation30Min;73997 + - Microsoft.Compute/GetVMImageFromLocation3Min;12997,Microsoft.Compute/GetVMImageFromLocation30Min;73993 status: code: 200 message: OK @@ -2047,7 +2199,7 @@ interactions: [{"name": "ipconfigcli-proxy-vm", "properties": {"privateIPAllocationMethod": "Dynamic", "subnet": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/proxy-subnet"}}}], "networkSecurityGroup": {"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkSecurityGroups/cli-proxy-vmNSG"}}}, - {"apiVersion": "2022-11-01", "type": "Microsoft.Compute/virtualMachines", "name": + {"apiVersion": "2023-09-01", "type": "Microsoft.Compute/virtualMachines", "name": "cli-proxy-vm", "location": "westus2", "tags": {}, "dependsOn": ["Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic"], "properties": {"hardwareProfile": {"vmSize": "Standard_DS1_v2"}, "networkProfile": {"networkInterfaces": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic", @@ -2057,7 +2209,7 @@ interactions: "sku": "20_04-lts", "version": "latest"}}, "osProfile": {"computerName": "cli-proxy-vm", "adminUsername": "azureuser", "customData": "#!/usr/bin/env bash
set -x

echo "setting up"
WORKDIR="${1:-$(mktemp -d)}"
echo "setting up ${WORKDIR}"

pushd "$WORKDIR"

apt update -y && apt install -y apt-transport-https curl gnupg make gcc < /dev/null

# add diladele apt key
wget -qO - https://packages.diladele.com/diladele_pub.asc | apt-key add -

# add new repo
tee /etc/apt/sources.list.d/squid413-ubuntu20.diladele.com.list <<EOF
deb https://squid413-ubuntu20.diladele.com/ubuntu/ focal main
EOF

# and install
apt-get update && apt-get install -y squid-common squid-openssl squidclient libecap3 libecap3-dev < /dev/null

mkdir -p /var/lib/squid

/usr/lib/squid/security_file_certgen -c -s /var/lib/squid/ssl_db -M 4MB || true

chown -R proxy:proxy /var/lib/squid

# Name of the VM on which Squid is hosted
HOST="cli-proxy-vm"

tee squidc.pem > /dev/null <<EOF
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
EOF

tee squidk.pem > /dev/null <<EOF
-----BEGIN PRIVATE KEY-----
MIIJRAIBADANBgkqhkiG9w0BAQEFAASCCS4wggkqAgEAAoICAQD8w+1XkFM+3pyq
LhF0yWavfIixra6PNyHG/iGOwLUO2dGCizlLjU8fSuL7e1NJVffbKvCxj6sPVhG6
mbqWYTsaFTkjQaL2jORIXRkopomLajKlT8UH5A+rOgJGwwTAYJuYoVWXxW6HKd1c
rhviRuWv1uX967B3szxJu/NZSOd4OtCyIiyvM9PgoBkupy3MN7iWU9PtgprfeGIQ
85+9aJn52qRpAD0/rjFdLKd8dfy5UAne4FUl4bEPSmQ0nuM6vJpS4ce5xTxL2YiO
cqMAHlo+MsfnECzqWZvfXbbL7W2cQCZcznQP5SgSN9Loc5vmt2Kpca9zUpugqPOQ
8JHHHZrvZy96BSPqaAAkvOBOETWWVyZTiLODGggyRWkZNU4sufVUUq42ExkK8W8q
CcqgC/cbQVSd9YRpFGNI2YMthowNPkf1m3akMhSNQZK0KXuBHMwSdjAk7fKIOmDj
ejl1HKxTIv0l8T82HtODrXyfxwn9bv5BhtiWO6tqnyvtAVKuiXdUKEUH46ivmeL6
+iFIDAl/RSUykbfFabLVQjhMUp8UZFFPOs/7ts3BfmEi8jLlW2DJo6onBPGGL8l3
G06va0DmsJbv4K2BK/OSo0RfKvu+RiCnpjktmDLi1SMrQrQ5SBV2ME6EOkTPL8UX
zDUURWAnSpj+tZwuQEcNPxG8mSGKjwIDAQABAoICADZwcFbSo8s/oNhaUbIoinAz
TzGNabI4upKkO1AGmzhWm3QVTkLCbY8czuRA/IAn/tj6V5q2ia4k6G6bG3+180e7
2HGKenHFiIk5W+jQbYFUXxIRqyr26JUFSmY5LHXOmNR3svqcMCD2WFHUwfarNF75
1tEoiPpO5SYwT8okFI5lhHtJNvyJGhIgCSxuH0QDoELoTRWzcm28/MoP3pCpzbft
akmfHpHvj3w02OHKe6Lh5S5WfKBLCppzeD+JFQGai1ZcgGq3WzQu5uVfNVIaN297
+mf+qN3UbOjfwzYKrffgLSMB6CdgQJAj683a0HIRfzNlY9dfrFse6E6IMa2D59FI
gdF51d5OOqW02NGoO9fhp6M6dGPNxIUcWpk8hjagQQr/C8ygMljMS0/uXbU904M2
zyVNNpSndT4sY/Mxihlnl9+Un2672dhCS8TiR0JnQbqxviZprqP9IUnOdEST4OtW
2xFTYF+bg3PEKcuScgPrix9GhQ77uZw+MwPeyzreXdUBL+9jRAjuPqIE1Cpj+6R6
zWkme00AeWnuaBBS3AD0xMqst7tMqqgXcTmccEaqNM3Dk/+IUnDJ3AwNxpXBq7UL
UYrjFiK5mXul6/vDeX2d276Cp5M2LR8Sh83PfDGZdKam5vASiMGAGXdJyJMFZt7S
ZvxXwBrQlysTT6qx0aVRAoIBAQD/IIuWX3ZSXv4lK0x4N1KqqKIwTJjhA8fVDE7Y
+P0/jh5roRYMXqcEZxERsdd0BT6pYtCaXuf1dR7ynt0Pw5VtxgiOiQWz0Mge7Osh
+AJULmYsQBOM1wBMMk0n+U6ZHl9rSNGgyXY7LWULT8NjzL74vJTk0RWpQD440Vbd
i+FQMHvASBeQ+JI6G4XGEZs8vB9Ar7vl/3atLpq7xmoii+j6D5jHgjlMtVRD6Q9h
BWn7xNSfpQ/teIntjd60ophvQqnVYwa2nN7Hlj0ak6MIIqDG5KiEqDGVA00GarOc
U6EJDZVx6NeDYaOlt8K2tpzzqX+WXn4manRF09n8qFeM5tn3AoIBAQD9oVAyKpQv
SzhW6cHBX+kSX623X3S/jLctf2J4otN66sByi2rJNXK7Y68Xu9up55PSuBtyQTzj
xSnIF+u96PhWQsnyaXyN41pqjypeS5qGA/JqPfsAa23j5LepSZS6aLtDE+y+2HfV
hPFHzs7/ldp7bLv3B7XzyLSE+2v5reyW52vW4ItaJxHsvukf/6gE3AMYSMaHXaId
cyeTVxUUs1tIM1J9WBjYzYa+t2QLv20lQTzZL2tZYclX7WQrpMoGilAZT3mTYnPb
pWeudS3422Fy8wH4qp0yt1ouI+KUL6Ri1AFAvDSauWHlznH9SLG4S/0oy/tG+9mh
6CJBsN8ZY+4pAoIBAQCROjt7W9gEx6IwElezTvq1vsykZdXYsMg+FIWFqSav2Pyk
E8xzOiYksW7b/bpBhwLGdUN9vGyaIxN81MXNxW34UPRp/sHKPBzOzdqDOaRJuyfa
JJd8Yp7+wNt+18HQE6QJdCgwOL4erZaJO9xjoRdMjDzNi9+iurkwqqmh75BQj2jC
acdQdM74WNZri3YsuoGn1uFE6YjqyE64eRfNlosGXX6AgzaO3eGbzr08Y1KTSNYo
ElPgv+7z1QBjHvNa0j3PBFG7/cwrHPCngkcZyGxxC5SJ/xxKUNi1wGOBp3FRr/PU
JdEYLqpzGQmz7HunkGLae+uffpW1cgTyd/lucbK9AoIBAQDBP/tJ7hVwn6Cy4HNo
Mvr0rABB2zKqjL45pXjTMEVwv5OY80+PNfFQhJixvcqWf8OrZ+pJuRl69wxp0Ign
8G3f1A3pbaSgu911mdYPeQ2pFTLM7qLkY/acEPY7v7vZ+NjOOE1H8MoF38C0FQi1
x2lsZ6IkjDSAJqodNTDFUlcVeAk79WVYcLKAr8oTPom4Aic9hp32IErYo5hA9LY0
SqC/t5MfvFNaRedoQ3WwWdAA9d82IKJrvU1beJ69flcMerCjSGH7AaYDctk4HULE
/esXWb9jyCP0s627wE3w2Qgo4R5/Q6fVSHEmV5GVCqGXKhcf0aSJJnZhne0UHn8u
6mxZAoIBAQCB4PwvqtgRAj3bxIyoP65AN6j2n2wk2TpLYUYC8XbgcJXmXuvJBD6f
ywgEc9khMEv/Z3r0vCoP+dW0SyK/+9bjLJozq3BCNrdgRqYrg7cnEaPbesgOPWY9
R5KgCN8gctivZ8G3zdembR4qFyeyecwZ+96JfyEsk0V1IpRrZZg7soZ4qsDRKZc1
dkEB7pxAfOl17cOtcZSQHuj8VDtDmUyySzySBGRrF3qoGhWbQ59Wp48Gw9/JZ/th
wmr7LEnQZNzo3IbLngzUlCiRtRgNl9hCw5vZwfS8yEsS0a72lmKY3qGyXr3xAAhf
07oi7EDdo42CbbjAFVk2H40iMvVR5d4U
-----END PRIVATE KEY-----
EOF

chown proxy:proxy squidc.pem
chown proxy:proxy squidk.pem
chmod 400 squidc.pem 
chmod 400 squidk.pem
cp squidc.pem /etc/squid/squidc.pem
cp squidk.pem /etc/squid/squidk.pem
cp squidc.pem /usr/local/share/ca-certificates/squidc.crt
update-ca-certificates 

sed -i 's~http_access deny all~http_access allow all~' /etc/squid/squid.conf
sed -i "s~http_port 3128~http_port $HOST:3128\nhttps_port $HOST:3129 tls-cert=/etc/squid/squidc.pem tls-key=/etc/squid/squidk.pem~" /etc/squid/squid.conf

systemctl restart squid
systemctl status squid

# validation, fails VM creation if commands fail
curl -fsSl -o /dev/null -w '%{http_code}\n' -x http://${HOST}:3128/ -I http://www.google.com
curl -fsSl -o /dev/null -w '%{http_code}\n' -x http://${HOST}:3128/ -I https://www.google.com
curl -fsSl -o /dev/null -w '%{http_code}\n' -x https://${HOST}:3129/ -I http://www.google.com
curl -fsSl -o /dev/null -w '%{http_code}\n' -x https://${HOST}:3129/ -I https://www.google.com
", "linuxConfiguration": {"disablePasswordAuthentication": true, "ssh": {"publicKeys": - [{"keyData": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + [{"keyData": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com", "path": "/home/azureuser/.ssh/authorized_keys"}]}}}}}], "outputs": {}}, "parameters": {}, "mode": "incremental"}}' headers: @@ -2077,15 +2229,15 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Resources/deployments/mock-deployment?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Resources/deployments/vm_deploy_BFIIAV9qae64OlaaK6eJACeRxh0QYKWD","name":"vm_deploy_BFIIAV9qae64OlaaK6eJACeRxh0QYKWD","type":"Microsoft.Resources/deployments","properties":{"templateHash":"13340453635184502032","parameters":{},"mode":"Incremental","provisioningState":"Accepted","timestamp":"2023-09-15T07:46:27.6992525Z","duration":"PT0.0006458S","correlationId":"2cdbd7f6-47f1-42cb-b8ac-3b531ed4c47c","providers":[{"namespace":"Microsoft.Network","resourceTypes":[{"resourceType":"networkSecurityGroups","locations":["westus2"]},{"resourceType":"networkInterfaces","locations":["westus2"]}]},{"namespace":"Microsoft.Compute","resourceTypes":[{"resourceType":"virtualMachines","locations":["westus2"]}]}],"dependencies":[{"dependsOn":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkSecurityGroups/cli-proxy-vmNSG","resourceType":"Microsoft.Network/networkSecurityGroups","resourceName":"cli-proxy-vmNSG"}],"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic","resourceType":"Microsoft.Network/networkInterfaces","resourceName":"cli-proxy-vmVMNic"},{"dependsOn":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic","resourceType":"Microsoft.Network/networkInterfaces","resourceName":"cli-proxy-vmVMNic"}],"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/virtualMachines/cli-proxy-vm","resourceType":"Microsoft.Compute/virtualMachines","resourceName":"cli-proxy-vm"}]}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Resources/deployments/vm_deploy_pTiM2VC6MbYRLyhjaYsjgTmVoGbIWsu5","name":"vm_deploy_pTiM2VC6MbYRLyhjaYsjgTmVoGbIWsu5","type":"Microsoft.Resources/deployments","properties":{"templateHash":"12849302810600682494","parameters":{},"mode":"Incremental","provisioningState":"Accepted","timestamp":"2023-12-22T10:07:53.0745548Z","duration":"PT0.0002193S","correlationId":"205e4e9c-15dd-42df-a41d-bcc96d991424","providers":[{"namespace":"Microsoft.Network","resourceTypes":[{"resourceType":"networkSecurityGroups","locations":["westus2"]},{"resourceType":"networkInterfaces","locations":["westus2"]}]},{"namespace":"Microsoft.Compute","resourceTypes":[{"resourceType":"virtualMachines","locations":["westus2"]}]}],"dependencies":[{"dependsOn":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkSecurityGroups/cli-proxy-vmNSG","resourceType":"Microsoft.Network/networkSecurityGroups","resourceName":"cli-proxy-vmNSG"}],"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic","resourceType":"Microsoft.Network/networkInterfaces","resourceName":"cli-proxy-vmVMNic"},{"dependsOn":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic","resourceType":"Microsoft.Network/networkInterfaces","resourceName":"cli-proxy-vmVMNic"}],"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/virtualMachines/cli-proxy-vm","resourceType":"Microsoft.Compute/virtualMachines","resourceName":"cli-proxy-vm"}]}}' headers: azure-asyncoperation: - - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Resources/deployments/vm_deploy_BFIIAV9qae64OlaaK6eJACeRxh0QYKWD/operationStatuses/08585068428991366641?api-version=2022-09-01 + - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Resources/deployments/vm_deploy_pTiM2VC6MbYRLyhjaYsjgTmVoGbIWsu5/operationStatuses/08584983672138316788?api-version=2022-09-01 cache-control: - no-cache content-length: @@ -2093,7 +2245,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:28 GMT + - Fri, 22 Dec 2023 10:07:53 GMT expires: - '-1' pragma: @@ -2122,9 +2274,9 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Resources/deployments/mock-deployment/operationStatuses/08585068428991366641?api-version=2022-09-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Resources/deployments/mock-deployment/operationStatuses/08584983672138316788?api-version=2022-09-01 response: body: string: '{"status":"Accepted"}' @@ -2136,50 +2288,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:46:28 GMT - expires: - - '-1' - pragma: - - no-cache - strict-transport-security: - - max-age=31536000; includeSubDomains - vary: - - Accept-Encoding - x-content-type-options: - - nosniff - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - CommandName: - - vm create - Connection: - - keep-alive - ParameterSetName: - - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data - --vnet-name --subnet - User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) - method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Resources/deployments/mock-deployment/operationStatuses/08585068428991366641?api-version=2022-09-01 - response: - body: - string: '{"status":"Running"}' - headers: - cache-control: - - no-cache - content-length: - - '20' - content-type: - - application/json; charset=utf-8 - date: - - Fri, 15 Sep 2023 07:46:58 GMT + - Fri, 22 Dec 2023 10:07:53 GMT expires: - '-1' pragma: @@ -2208,9 +2317,9 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Resources/deployments/mock-deployment/operationStatuses/08585068428991366641?api-version=2022-09-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Resources/deployments/mock-deployment/operationStatuses/08584983672138316788?api-version=2022-09-01 response: body: string: '{"status":"Succeeded"}' @@ -2222,7 +2331,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:47:28 GMT + - Fri, 22 Dec 2023 10:08:23 GMT expires: - '-1' pragma: @@ -2251,12 +2360,12 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001/providers/Microsoft.Resources/deployments/mock-deployment?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Resources/deployments/vm_deploy_BFIIAV9qae64OlaaK6eJACeRxh0QYKWD","name":"vm_deploy_BFIIAV9qae64OlaaK6eJACeRxh0QYKWD","type":"Microsoft.Resources/deployments","properties":{"templateHash":"13340453635184502032","parameters":{},"mode":"Incremental","provisioningState":"Succeeded","timestamp":"2023-09-15T07:47:13.9005725Z","duration":"PT46.2019658S","correlationId":"2cdbd7f6-47f1-42cb-b8ac-3b531ed4c47c","providers":[{"namespace":"Microsoft.Network","resourceTypes":[{"resourceType":"networkSecurityGroups","locations":["westus2"]},{"resourceType":"networkInterfaces","locations":["westus2"]}]},{"namespace":"Microsoft.Compute","resourceTypes":[{"resourceType":"virtualMachines","locations":["westus2"]}]}],"dependencies":[{"dependsOn":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkSecurityGroups/cli-proxy-vmNSG","resourceType":"Microsoft.Network/networkSecurityGroups","resourceName":"cli-proxy-vmNSG"}],"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic","resourceType":"Microsoft.Network/networkInterfaces","resourceName":"cli-proxy-vmVMNic"},{"dependsOn":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic","resourceType":"Microsoft.Network/networkInterfaces","resourceName":"cli-proxy-vmVMNic"}],"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/virtualMachines/cli-proxy-vm","resourceType":"Microsoft.Compute/virtualMachines","resourceName":"cli-proxy-vm"}],"outputs":{},"outputResources":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/virtualMachines/cli-proxy-vm"},{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic"},{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkSecurityGroups/cli-proxy-vmNSG"}]}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Resources/deployments/vm_deploy_pTiM2VC6MbYRLyhjaYsjgTmVoGbIWsu5","name":"vm_deploy_pTiM2VC6MbYRLyhjaYsjgTmVoGbIWsu5","type":"Microsoft.Resources/deployments","properties":{"templateHash":"12849302810600682494","parameters":{},"mode":"Incremental","provisioningState":"Succeeded","timestamp":"2023-12-22T10:08:12.7672289Z","duration":"PT19.6928934S","correlationId":"205e4e9c-15dd-42df-a41d-bcc96d991424","providers":[{"namespace":"Microsoft.Network","resourceTypes":[{"resourceType":"networkSecurityGroups","locations":["westus2"]},{"resourceType":"networkInterfaces","locations":["westus2"]}]},{"namespace":"Microsoft.Compute","resourceTypes":[{"resourceType":"virtualMachines","locations":["westus2"]}]}],"dependencies":[{"dependsOn":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkSecurityGroups/cli-proxy-vmNSG","resourceType":"Microsoft.Network/networkSecurityGroups","resourceName":"cli-proxy-vmNSG"}],"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic","resourceType":"Microsoft.Network/networkInterfaces","resourceName":"cli-proxy-vmVMNic"},{"dependsOn":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic","resourceType":"Microsoft.Network/networkInterfaces","resourceName":"cli-proxy-vmVMNic"}],"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/virtualMachines/cli-proxy-vm","resourceType":"Microsoft.Compute/virtualMachines","resourceName":"cli-proxy-vm"}],"outputs":{},"outputResources":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/virtualMachines/cli-proxy-vm"},{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic"},{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkSecurityGroups/cli-proxy-vmNSG"}]}}' headers: cache-control: - no-cache @@ -2265,7 +2374,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:47:28 GMT + - Fri, 22 Dec 2023 10:08:23 GMT expires: - '-1' pragma: @@ -2294,65 +2403,66 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-compute/30.0.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-compute/30.4.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/virtualMachines/cli-proxy-vm?$expand=instanceView&api-version=2022-11-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/virtualMachines/cli-proxy-vm?$expand=instanceView&api-version=2023-09-01 response: body: string: "{\r\n \"name\": \"cli-proxy-vm\",\r\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/virtualMachines/cli-proxy-vm\",\r\n \ \"type\": \"Microsoft.Compute/virtualMachines\",\r\n \"location\": \"westus2\",\r\n \ \"tags\": {\r\n \"azsecpack\": \"nonprod\",\r\n \"platformsettings.host_environment.service.platform_optedin_for_rootcerts\": - \"true\"\r\n },\r\n \"properties\": {\r\n \"vmId\": \"89d99da5-9ed5-4548-b2e0-a317d59d81fd\",\r\n - \ \"hardwareProfile\": {\r\n \"vmSize\": \"Standard_DS1_v2\"\r\n },\r\n + \"true\"\r\n },\r\n \"properties\": {\r\n \"hardwareProfile\": {\r\n + \ \"vmSize\": \"Standard_DS1_v2\"\r\n },\r\n \"provisioningState\": + \"Succeeded\",\r\n \"vmId\": \"6899a670-d79c-4091-845f-91c2debef6fa\",\r\n \ \"storageProfile\": {\r\n \"imageReference\": {\r\n \"publisher\": \"Canonical\",\r\n \"offer\": \"0001-com-ubuntu-server-focal\",\r\n \ \"sku\": \"20_04-lts\",\r\n \"version\": \"latest\",\r\n \"exactVersion\": - \"20.04.202308310\"\r\n },\r\n \"osDisk\": {\r\n \"osType\": - \"Linux\",\r\n \"name\": \"cli-proxy-vm_OsDisk_1_6be91d8a885046ee8e84b9cf7b06f1bd\",\r\n + \"20.04.202312080\"\r\n },\r\n \"osDisk\": {\r\n \"osType\": + \"Linux\",\r\n \"name\": \"cli-proxy-vm_disk1_f7bff9c3d9fa490e928d241d19d72870\",\r\n \ \"createOption\": \"FromImage\",\r\n \"caching\": \"ReadWrite\",\r\n \ \"managedDisk\": {\r\n \"storageAccountType\": \"Premium_LRS\",\r\n - \ \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/disks/cli-proxy-vm_OsDisk_1_6be91d8a885046ee8e84b9cf7b06f1bd\"\r\n + \ \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Compute/disks/cli-proxy-vm_disk1_f7bff9c3d9fa490e928d241d19d72870\"\r\n \ },\r\n \"deleteOption\": \"Detach\",\r\n \"diskSizeGB\": 30\r\n },\r\n \"dataDisks\": []\r\n },\r\n \"osProfile\": {\r\n \"computerName\": \"cli-proxy-vm\",\r\n \"adminUsername\": \"azureuser\",\r\n \"linuxConfiguration\": {\r\n \"disablePasswordAuthentication\": true,\r\n \"ssh\": {\r\n \"publicKeys\": [\r\n {\r\n \ \"path\": \"/home/azureuser/.ssh/authorized_keys\",\r\n \"keyData\": - \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com\"\r\n }\r\n ]\r\n },\r\n \ \"provisionVMAgent\": true,\r\n \"patchSettings\": {\r\n \"patchMode\": \"ImageDefault\",\r\n \"assessmentMode\": \"ImageDefault\"\r\n },\r\n \ \"enableVMAgentPlatformUpdates\": false\r\n },\r\n \"secrets\": [],\r\n \"allowExtensionOperations\": true,\r\n \"requireGuestProvisionSignal\": true\r\n },\r\n \"networkProfile\": {\"networkInterfaces\":[{\"id\":\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic\"}]},\r\n - \ \"provisioningState\": \"Succeeded\",\r\n \"instanceView\": {\r\n \"computerName\": - \"cli-proxy-vm\",\r\n \"osName\": \"ubuntu\",\r\n \"osVersion\": - \"20.04\",\r\n \"vmAgent\": {\r\n \"vmAgentVersion\": \"2.9.1.1\",\r\n - \ \"statuses\": [\r\n {\r\n \"code\": \"ProvisioningState/succeeded\",\r\n - \ \"level\": \"Info\",\r\n \"displayStatus\": \"Ready\",\r\n - \ \"message\": \"Guest Agent is running\",\r\n \"time\": - \"2023-09-15T07:47:24+00:00\"\r\n }\r\n ],\r\n \"extensionHandlers\": - []\r\n },\r\n \"disks\": [\r\n {\r\n \"name\": \"cli-proxy-vm_OsDisk_1_6be91d8a885046ee8e84b9cf7b06f1bd\",\r\n + \ \"instanceView\": {\r\n \"computerName\": \"cli-proxy-vm\",\r\n \"osName\": + \"ubuntu\",\r\n \"osVersion\": \"20.04\",\r\n \"vmAgent\": {\r\n + \ \"vmAgentVersion\": \"2.9.1.1\",\r\n \"statuses\": [\r\n {\r\n + \ \"code\": \"ProvisioningState/succeeded\",\r\n \"level\": + \"Info\",\r\n \"displayStatus\": \"Ready\",\r\n \"message\": + \"Guest Agent is running\",\r\n \"time\": \"2023-12-22T10:08:23+00:00\"\r\n + \ }\r\n ],\r\n \"extensionHandlers\": []\r\n },\r\n + \ \"disks\": [\r\n {\r\n \"name\": \"cli-proxy-vm_disk1_f7bff9c3d9fa490e928d241d19d72870\",\r\n \ \"statuses\": [\r\n {\r\n \"code\": \"ProvisioningState/succeeded\",\r\n \ \"level\": \"Info\",\r\n \"displayStatus\": \"Provisioning - succeeded\",\r\n \"time\": \"2023-09-15T07:46:39.6663858+00:00\"\r\n + succeeded\",\r\n \"time\": \"2023-12-22T10:08:00.7812339+00:00\"\r\n \ }\r\n ]\r\n }\r\n ],\r\n \"hyperVGeneration\": \"V1\",\r\n \"statuses\": [\r\n {\r\n \"code\": \"ProvisioningState/succeeded\",\r\n \ \"level\": \"Info\",\r\n \"displayStatus\": \"Provisioning - succeeded\",\r\n \"time\": \"2023-09-15T07:47:12.0411535+00:00\"\r\n + succeeded\",\r\n \"time\": \"2023-12-22T10:08:10.671816+00:00\"\r\n \ },\r\n {\r\n \"code\": \"PowerState/running\",\r\n \ \"level\": \"Info\",\r\n \"displayStatus\": \"VM running\"\r\n - \ }\r\n ]\r\n },\r\n \"timeCreated\": \"2023-09-15T07:46:34.7445836+00:00\"\r\n + \ }\r\n ]\r\n },\r\n \"timeCreated\": \"2023-12-22T10:07:58.7499931+00:00\"\r\n \ }\r\n}" headers: cache-control: - no-cache content-length: - - '4073' + - '4063' content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:47:28 GMT + - Fri, 22 Dec 2023 10:08:24 GMT expires: - '-1' pragma: @@ -2362,17 +2472,13 @@ interactions: - Microsoft-HTTPAPI/2.0 strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-resource: - - Microsoft.Compute/LowCostGet3Min;3997,Microsoft.Compute/LowCostGet30Min;31997 + - Microsoft.Compute/LowCostGetSubscriptionMaximum;23996,Microsoft.Compute/LowCostGetResource;32 status: code: 200 - message: OK + message: '' - request: body: null headers: @@ -2388,18 +2494,18 @@ interactions: - --resource-group --name --image --ssh-key-values --public-ip-address --custom-data --vnet-name --subnet User-Agent: - - AZURECLI/2.52.0 (AAZ) azsdk-python-core/1.26.0 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 (AAZ) azsdk-python-core/1.28.0 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic?api-version=2022-01-01 response: body: string: "{\r\n \"name\": \"cli-proxy-vmVMNic\",\r\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic\",\r\n - \ \"etag\": \"W/\\\"b9ebe19b-f20f-4365-8e40-50cba99607a7\\\"\",\r\n \"tags\": + \ \"etag\": \"W/\\\"8c65ae4e-4579-44a2-8ac3-fdf55b6d5fd9\\\"\",\r\n \"tags\": {},\r\n \"properties\": {\r\n \"provisioningState\": \"Succeeded\",\r\n - \ \"resourceGuid\": \"ea48c0fc-4231-4b2e-ac85-bbf4c7d62cc0\",\r\n \"ipConfigurations\": + \ \"resourceGuid\": \"fd2b15e4-a9d2-4f0d-813c-8d67c8bcacd8\",\r\n \"ipConfigurations\": [\r\n {\r\n \"name\": \"ipconfigcli-proxy-vm\",\r\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkInterfaces/cli-proxy-vmVMNic/ipConfigurations/ipconfigcli-proxy-vm\",\r\n - \ \"etag\": \"W/\\\"b9ebe19b-f20f-4365-8e40-50cba99607a7\\\"\",\r\n + \ \"etag\": \"W/\\\"8c65ae4e-4579-44a2-8ac3-fdf55b6d5fd9\\\"\",\r\n \ \"type\": \"Microsoft.Network/networkInterfaces/ipConfigurations\",\r\n \ \"properties\": {\r\n \"provisioningState\": \"Succeeded\",\r\n \ \"privateIPAddress\": \"10.42.3.4\",\r\n \"privateIPAllocationMethod\": @@ -2407,8 +2513,8 @@ interactions: \ },\r\n \"primary\": true,\r\n \"privateIPAddressVersion\": \"IPv4\"\r\n }\r\n }\r\n ],\r\n \"dnsSettings\": {\r\n \"dnsServers\": [],\r\n \"appliedDnsServers\": [],\r\n \"internalDomainNameSuffix\": - \"lqklzqlg5tbepd3npo3fzwxsnb.xx.internal.cloudapp.net\"\r\n },\r\n \"macAddress\": - \"00-22-48-BF-96-0A\",\r\n \"enableAcceleratedNetworking\": false,\r\n + \"b2r2grkcoc3ebkkudvm0hxvpdf.xx.internal.cloudapp.net\"\r\n },\r\n \"macAddress\": + \"00-22-48-B8-69-7B\",\r\n \"enableAcceleratedNetworking\": false,\r\n \ \"vnetEncryptionSupported\": false,\r\n \"enableIPForwarding\": false,\r\n \ \"networkSecurityGroup\": {\r\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/networkSecurityGroups/cli-proxy-vmNSG\"\r\n \ },\r\n \"primary\": true,\r\n \"virtualMachine\": {\r\n \"id\": @@ -2425,9 +2531,9 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:47:28 GMT + - Fri, 22 Dec 2023 10:08:24 GMT etag: - - W/"b9ebe19b-f20f-4365-8e40-50cba99607a7" + - W/"8c65ae4e-4579-44a2-8ac3-fdf55b6d5fd9" expires: - '-1' pragma: @@ -2437,10 +2543,14 @@ interactions: - Microsoft-HTTPAPI/2.0 strict-transport-security: - max-age=31536000; includeSubDomains + transfer-encoding: + - chunked + vary: + - Accept-Encoding x-content-type-options: - nosniff x-ms-arm-service-request-id: - - 32357634-4b49-413a-a075-130d7a162f2b + - d0c2e08f-8b70-4eb7-a597-ba5d2e94b775 status: code: 200 message: OK @@ -2459,8 +2569,8 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.ContainerService/managedClusters/cliakstest000002?api-version=2023-10-02-preview response: @@ -2476,7 +2586,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:47:29 GMT + - Fri, 22 Dec 2023 10:08:25 GMT expires: - '-1' pragma: @@ -2505,12 +2615,12 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-resource/23.1.0b2 Python/3.8.10 (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest000001?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001","name":"clitest000001","type":"Microsoft.Resources/resourceGroups","location":"westus2","tags":{"product":"azurecli","cause":"automation","test":"test_aks_create_and_update_with_http_proxy_config","date":"2023-09-15T07:45:57Z","module":"aks-preview"},"properties":{"provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001","name":"clitest000001","type":"Microsoft.Resources/resourceGroups","location":"westus2","tags":{"product":"azurecli","cause":"automation","test":"test_aks_create_and_update_with_http_proxy_config","date":"2023-12-22T10:07:21Z","module":"aks-preview"},"properties":{"provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -2519,7 +2629,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:47:29 GMT + - Fri, 22 Dec 2023 10:08:24 GMT expires: - '-1' pragma: @@ -2548,8 +2658,8 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleAssignments?$filter=atScope()&api-version=2022-04-01 response: @@ -2557,16 +2667,16 @@ interactions: string: '{"value":[{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9b0f576e-fc2e-4256-9aa3-6fede171d599","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/","condition":null,"conditionVersion":null,"createdOn":"2023-07-13T16:20:06.8829118Z","updatedOn":"2023-07-13T16:20:06.8829118Z","createdBy":null,"updatedBy":null,"delegatedManagedIdentityResourceId":null,"description":"Allow AccessMonitorReader to read access details for compliance purpose"},"id":"/providers/Microsoft.Authorization/roleAssignments/fb6b898e-5323-404d-a8af-da5aafc3ecc0","type":"Microsoft.Authorization/roleAssignments","name":"fb6b898e-5323-404d-a8af-da5aafc3ecc0"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9b0f576e-fc2e-4256-9aa3-6fede171d599","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/","condition":null,"conditionVersion":null,"createdOn":"2023-07-19T22:13:56.3482970Z","updatedOn":"2023-07-19T22:13:56.3482970Z","createdBy":null,"updatedBy":null,"delegatedManagedIdentityResourceId":null,"description":"Allow AccessMonitorReader to read access details for compliance purpose"},"id":"/providers/Microsoft.Authorization/roleAssignments/3cdb16ce-2290-4f5f-bcab-5b07a458405f","type":"Microsoft.Authorization/roleAssignments","name":"3cdb16ce-2290-4f5f-bcab-5b07a458405f"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9b0f576e-fc2e-4256-9aa3-6fede171d599","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/","condition":null,"conditionVersion":null,"createdOn":"2023-07-19T22:18:24.6119781Z","updatedOn":"2023-07-19T22:18:24.6119781Z","createdBy":null,"updatedBy":null,"delegatedManagedIdentityResourceId":null,"description":"Allow - AccessMonitorReader to read access details for compliance purpose"},"id":"/providers/Microsoft.Authorization/roleAssignments/125160dd-5630-45b1-8260-4e5469d3e7b6","type":"Microsoft.Authorization/roleAssignments","name":"125160dd-5630-45b1-8260-4e5469d3e7b6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"User","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2021-04-26T05:33:00.7067936Z","updatedOn":"2021-04-26T05:33:00.7067936Z","createdBy":"7e9cc714-bfe4-4eea-acb2-d53ced88ab8b","updatedBy":"7e9cc714-bfe4-4eea-acb2-d53ced88ab8b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/2adf4737-6342-4f63-aeb2-5fcd3426a387","type":"Microsoft.Authorization/roleAssignments","name":"2adf4737-6342-4f63-aeb2-5fcd3426a387"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2021-04-26T06:09:24.5972802Z","updatedOn":"2021-04-26T06:09:24.5972802Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/c4572c05-f69f-4e5c-aac6-79afefcf0e2e","type":"Microsoft.Authorization/roleAssignments","name":"c4572c05-f69f-4e5c-aac6-79afefcf0e2e"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2021-06-18T05:18:40.4643436Z","updatedOn":"2021-06-18T05:18:40.4643436Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/3f926301-cc14-4a88-a3b7-c159d73d01f6","type":"Microsoft.Authorization/roleAssignments","name":"3f926301-cc14-4a88-a3b7-c159d73d01f6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:40.4541416Z","updatedOn":"2022-01-25T05:49:40.4541416Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/95e51146-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"95e51146-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:41.6466655Z","updatedOn":"2022-01-25T05:49:41.6466655Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/96d4d041-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"96d4d041-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:42.8008295Z","updatedOn":"2022-01-25T05:49:42.8008295Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/978dbc52-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"978dbc52-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:43.7159467Z","updatedOn":"2022-01-25T05:49:43.7159467Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/9808753a-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"9808753a-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:44.8535285Z","updatedOn":"2022-01-25T05:49:44.8535285Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/9895826c-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"9895826c-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:21.9669611Z","updatedOn":"2022-01-25T06:00:21.9669611Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/143cab45-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"143cab45-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:21.7844500Z","updatedOn":"2022-01-25T06:00:21.7844500Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/143a47b2-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"143a47b2-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:22.8152511Z","updatedOn":"2022-01-25T06:00:22.8152511Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/1503a122-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"1503a122-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:22.7549989Z","updatedOn":"2022-01-25T06:00:22.7549989Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/14fdfc11-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"14fdfc11-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/ba92f5b4-2d11-453d-a403-e96b0029c9fe","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:47.5002672Z","updatedOn":"2022-01-25T06:00:47.5002672Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/23901ba1-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"23901ba1-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/81a9662b-bebf-436f-a333-f67b29880f12","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:47.9954045Z","updatedOn":"2022-01-25T06:00:47.9954045Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/23d4b2c8-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"23d4b2c8-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/17d1049b-9a84-46fb-8f53-869881c3d3ab","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:48.0124462Z","updatedOn":"2022-01-25T06:00:48.0124462Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/23eb1c2a-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"23eb1c2a-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:49.0142818Z","updatedOn":"2022-01-25T06:00:49.0142818Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/248c7804-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"248c7804-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:49.8561822Z","updatedOn":"2022-01-25T06:00:49.8561822Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/25212cc5-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"25212cc5-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:03:00.8232622Z","updatedOn":"2022-01-25T06:03:00.8232622Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/730ae441-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"730ae441-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:03:01.6908492Z","updatedOn":"2022-01-25T06:03:01.6908492Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/73b81c51-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"73b81c51-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:27.0646115Z","updatedOn":"2022-01-25T06:05:27.0646115Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/ca436279-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"ca436279-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:27.8245772Z","updatedOn":"2022-01-25T06:05:27.8245772Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cad7146c-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cad7146c-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:28.8193427Z","updatedOn":"2022-01-25T06:05:28.8193427Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cb6be874-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cb6be874-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:30.0125029Z","updatedOn":"2022-01-25T06:05:30.0125029Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cc20f7f4-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cc20f7f4-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:31.2002633Z","updatedOn":"2022-01-25T06:05:31.2002633Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/ccd748dd-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"ccd748dd-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:32.4937030Z","updatedOn":"2022-01-25T06:05:32.4937030Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cd4bbd1a-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cd4bbd1a-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:33.6999970Z","updatedOn":"2022-01-25T06:05:33.6999970Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/ce56964e-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"ce56964e-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:35.3719606Z","updatedOn":"2022-01-25T06:05:35.3719606Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cf53c36b-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cf53c36b-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:37.0989473Z","updatedOn":"2022-01-25T06:05:37.0989473Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d0537e9f-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d0537e9f-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:37.9186616Z","updatedOn":"2022-01-25T06:05:37.9186616Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d0d7c10e-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d0d7c10e-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:39.2245796Z","updatedOn":"2022-01-25T06:05:39.2245796Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d187dc7e-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d187dc7e-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/81a9662b-bebf-436f-a333-f67b29880f12","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:41.3147495Z","updatedOn":"2022-01-25T06:05:41.3147495Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d2d190da-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d2d190da-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:42.0909979Z","updatedOn":"2022-01-25T06:05:42.0909979Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d3553305-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d3553305-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2023-02-10T04:11:40.8923959Z","updatedOn":"2023-02-10T04:11:40.8923959Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/7b9cb4b1-7e07-4127-b87e-47e7ab8ae685","type":"Microsoft.Authorization/roleAssignments","name":"7b9cb4b1-7e07-4127-b87e-47e7ab8ae685"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2023-07-04T02:50:17.7342959Z","updatedOn":"2023-07-04T02:50:17.7342959Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/620ed504-87c7-4aea-8641-c429dd227711","type":"Microsoft.Authorization/roleAssignments","name":"620ed504-87c7-4aea-8641-c429dd227711"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"Group","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2021-09-18T03:09:33.8702688Z","updatedOn":"2021-09-18T03:09:33.8702688Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/99d6fd13-909e-4c52-807e-77f7a5af83c8","type":"Microsoft.Authorization/roleAssignments","name":"99d6fd13-909e-4c52-807e-77f7a5af83c8"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/465fbb01-3623-f393-e42f-e19c0d2982de","condition":null,"conditionVersion":null,"createdOn":"2021-10-08T17:23:35.8382756Z","updatedOn":"2021-10-08T17:23:35.8382756Z","createdBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","updatedBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/465fbb01-3623-f393-e42f-e19c0d2982de/providers/Microsoft.Authorization/roleAssignments/ade4333c-4321-4b68-b498-d081d55e2b0c","type":"Microsoft.Authorization/roleAssignments","name":"ade4333c-4321-4b68-b498-d081d55e2b0c"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2019-03-26T22:01:02.9136073Z","updatedOn":"2019-03-26T22:01:02.9136073Z","createdBy":"8701e34d-d7c2-459c-b2d7-f3a9c5204818","updatedBy":"8701e34d-d7c2-459c-b2d7-f3a9c5204818","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/6f4de15e-9316-4714-a7c4-40c46cf8e067","type":"Microsoft.Authorization/roleAssignments","name":"6f4de15e-9316-4714-a7c4-40c46cf8e067"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:13.2137492Z","updatedOn":"2020-02-25T18:36:13.2137492Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/18fdd87e-1c01-424e-b380-32310f4940c2","type":"Microsoft.Authorization/roleAssignments","name":"18fdd87e-1c01-424e-b380-32310f4940c2"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:00.4746112Z","updatedOn":"2020-02-25T18:36:00.4746112Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/d9bcf58a-6f24-446d-bf60-20ffe5142396","type":"Microsoft.Authorization/roleAssignments","name":"d9bcf58a-6f24-446d-bf60-20ffe5142396"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:35:55.7490022Z","updatedOn":"2020-02-25T18:35:55.7490022Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/6e2b954b-42b2-48e0-997a-622601f0a4b4","type":"Microsoft.Authorization/roleAssignments","name":"6e2b954b-42b2-48e0-997a-622601f0a4b4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:35:57.9173081Z","updatedOn":"2020-02-25T18:35:57.9173081Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/8d76aaa3-fcfd-4ea5-8c7c-363d250e7ae9","type":"Microsoft.Authorization/roleAssignments","name":"8d76aaa3-fcfd-4ea5-8c7c-363d250e7ae9"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:23.0673659Z","updatedOn":"2020-02-25T18:36:23.0673659Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/d0817c57-3e5b-4363-88b7-52baadd5c362","type":"Microsoft.Authorization/roleAssignments","name":"d0817c57-3e5b-4363-88b7-52baadd5c362"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:31.2596366Z","updatedOn":"2020-02-25T18:36:31.2596366Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/0dabf212-a1c7-4af6-ba8b-be045493b368","type":"Microsoft.Authorization/roleAssignments","name":"0dabf212-a1c7-4af6-ba8b-be045493b368"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:35:52.9188704Z","updatedOn":"2020-02-25T18:35:52.9188704Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/d674b853-332e-4437-9ddb-bba8fde7ccce","type":"Microsoft.Authorization/roleAssignments","name":"d674b853-332e-4437-9ddb-bba8fde7ccce"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:38.8393742Z","updatedOn":"2020-02-25T18:36:38.8393742Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/00625383-053d-4227-a4db-b098e9bd2289","type":"Microsoft.Authorization/roleAssignments","name":"00625383-053d-4227-a4db-b098e9bd2289"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:05.0954462Z","updatedOn":"2020-02-25T18:36:05.0954462Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/3151fe9c-fcd2-45d3-a256-72fb13b86df5","type":"Microsoft.Authorization/roleAssignments","name":"3151fe9c-fcd2-45d3-a256-72fb13b86df5"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-07-06T18:51:23.0753297Z","updatedOn":"2020-07-06T18:51:23.0753297Z","createdBy":"d59f4a71-eff1-4bfa-a572-fe518f49f6c7","updatedBy":"d59f4a71-eff1-4bfa-a572-fe518f49f6c7","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/b3a9e1db-fde1-4ddd-ac1c-91913be67359","type":"Microsoft.Authorization/roleAssignments","name":"b3a9e1db-fde1-4ddd-ac1c-91913be67359"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-12-12T21:14:55.1655079Z","updatedOn":"2023-02-28T22:54:18.0450083Z","createdBy":"393a8425-6c8d-4d4a-a700-811f0423e5aa","updatedBy":"393a8425-6c8d-4d4a-a700-811f0423e5aa","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/6565c104-61e2-5756-96d7-663b216c8b11","type":"Microsoft.Authorization/roleAssignments","name":"6565c104-61e2-5756-96d7-663b216c8b11"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-02-17T00:30:39.4967398Z","updatedOn":"2022-02-17T00:30:39.4967398Z","createdBy":"a4319ad3-20be-4542-8952-685b66e56377","updatedBy":"a4319ad3-20be-4542-8952-685b66e56377","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/d8aedac6-3663-42b3-add4-c013b7935fb4","type":"Microsoft.Authorization/roleAssignments","name":"d8aedac6-3663-42b3-add4-c013b7935fb4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-03-02T23:53:39.1630622Z","updatedOn":"2022-03-02T23:53:39.1630622Z","createdBy":"a4319ad3-20be-4542-8952-685b66e56377","updatedBy":"a4319ad3-20be-4542-8952-685b66e56377","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/b5f0a13f-ac13-4e45-8588-15f5d9a02b20","type":"Microsoft.Authorization/roleAssignments","name":"b5f0a13f-ac13-4e45-8588-15f5d9a02b20"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/fd6e57ea-fe3c-4f21-bd1e-de170a9a4971","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-03-08T00:58:05.8353141Z","updatedOn":"2022-03-08T00:58:05.8353141Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/403b97d1-ee0a-4b10-afe1-f36f368d2ced","type":"Microsoft.Authorization/roleAssignments","name":"403b97d1-ee0a-4b10-afe1-f36f368d2ced"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/94ddc4bc-25f5-4f3e-b527-c587da93cfe4","principalId":"00000000-0000-0000-0000-000000000001","principalType":"Group","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-05-16T23:08:20.8536608Z","updatedOn":"2022-05-16T23:08:20.8536608Z","createdBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","updatedBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/8b338a13-cfa6-42e6-b424-fb375ce9d07c","type":"Microsoft.Authorization/roleAssignments","name":"8b338a13-cfa6-42e6-b424-fb375ce9d07c"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-05-17T18:23:54.2264851Z","updatedOn":"2022-05-31T17:20:00.8273681Z","createdBy":"393a8425-6c8d-4d4a-a700-811f0423e5aa","updatedBy":"393a8425-6c8d-4d4a-a700-811f0423e5aa","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/f0576973-5014-5fe2-b3f2-cf3aace860d6","type":"Microsoft.Authorization/roleAssignments","name":"f0576973-5014-5fe2-b3f2-cf3aace860d6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-07-19T00:07:21.3325762Z","updatedOn":"2022-07-19T00:07:21.3325762Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/2697280b-812c-472d-841b-a10a9fe540a5","type":"Microsoft.Authorization/roleAssignments","name":"2697280b-812c-472d-841b-a10a9fe540a5"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/fd6e57ea-fe3c-4f21-bd1e-de170a9a4971","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-07-19T00:07:23.7020980Z","updatedOn":"2022-07-19T00:07:23.7020980Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/f4254463-7a28-4d26-b331-5a18c354cbe6","type":"Microsoft.Authorization/roleAssignments","name":"f4254463-7a28-4d26-b331-5a18c354cbe6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-07-19T00:07:26.4080657Z","updatedOn":"2022-07-19T00:07:26.4080657Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/065a63ba-71cc-4c69-b92b-bc67421e7e64","type":"Microsoft.Authorization/roleAssignments","name":"065a63ba-71cc-4c69-b92b-bc67421e7e64"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2023-04-07T05:56:00.4871186Z","updatedOn":"2023-04-24T19:44:20.3477537Z","createdBy":"09a22e59-e99b-42cb-b8b7-2475f66a3007","updatedBy":"09a22e59-e99b-42cb-b8b7-2475f66a3007","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/17a093c4-e4b2-5959-95e3-5894ef6873fb","type":"Microsoft.Authorization/roleAssignments","name":"17a093c4-e4b2-5959-95e3-5894ef6873fb"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-08-09T18:17:33.0012805Z","updatedOn":"2021-08-09T18:17:33.0012805Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/01de8fe7-aae0-4d5c-844a-f0bdb8335252","type":"Microsoft.Authorization/roleAssignments","name":"01de8fe7-aae0-4d5c-844a-f0bdb8335252"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-08-09T18:17:39.9188336Z","updatedOn":"2021-08-09T18:17:39.9188336Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/ab2be506-5489-4c1f-add0-f5ed87a10439","type":"Microsoft.Authorization/roleAssignments","name":"ab2be506-5489-4c1f-add0-f5ed87a10439"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-08-24T19:32:18.2000692Z","updatedOn":"2021-08-24T19:32:18.2000692Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/0ce2f3fb-17ea-4193-9081-09aa4b39fec4","type":"Microsoft.Authorization/roleAssignments","name":"0ce2f3fb-17ea-4193-9081-09aa4b39fec4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-08-24T19:32:36.6775144Z","updatedOn":"2021-08-24T19:32:36.6775144Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/2e95b289-99bd-4e68-83de-5433f2a0428c","type":"Microsoft.Authorization/roleAssignments","name":"2e95b289-99bd-4e68-83de-5433f2a0428c"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-11-01T22:46:09.1056400Z","updatedOn":"2021-11-01T22:46:09.1056400Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/82fe7886-5c1b-42c2-9319-7b4d436d8aba","type":"Microsoft.Authorization/roleAssignments","name":"82fe7886-5c1b-42c2-9319-7b4d436d8aba"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-11-01T22:46:14.7527743Z","updatedOn":"2021-11-01T22:46:14.7527743Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/12162b26-25fb-4ef5-a6e8-651446483cb6","type":"Microsoft.Authorization/roleAssignments","name":"12162b26-25fb-4ef5-a6e8-651446483cb6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-11-01T22:46:20.6399869Z","updatedOn":"2021-11-01T22:46:20.6399869Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/105bcc1f-3ddf-4cc0-bffc-03b3d9aaf870","type":"Microsoft.Authorization/roleAssignments","name":"105bcc1f-3ddf-4cc0-bffc-03b3d9aaf870"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-01-26T20:10:13.8998989Z","updatedOn":"2021-01-26T20:10:13.8998989Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/b36517ec-61d3-468d-afdc-eceda8adb4ee","type":"Microsoft.Authorization/roleAssignments","name":"b36517ec-61d3-468d-afdc-eceda8adb4ee"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-02-06T00:13:19.1780775Z","updatedOn":"2021-02-06T00:13:19.1780775Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/5216c1ee-4f58-4d36-b379-6c04b1fbd157","type":"Microsoft.Authorization/roleAssignments","name":"5216c1ee-4f58-4d36-b379-6c04b1fbd157"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/f25e0fa2-a7c8-4377-a976-54943a77a395","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-04-16T18:26:34.3109215Z","updatedOn":"2021-04-16T18:26:34.3109215Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/7464f8a3-9f55-443b-a3a5-44a31b100cad","type":"Microsoft.Authorization/roleAssignments","name":"7464f8a3-9f55-443b-a3a5-44a31b100cad"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-04-16T18:27:56.4446265Z","updatedOn":"2021-04-16T18:27:56.4446265Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/8f430c4c-4317-4495-9f01-4f3d4e1ca111","type":"Microsoft.Authorization/roleAssignments","name":"8f430c4c-4317-4495-9f01-4f3d4e1ca111"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-05-04T19:20:06.7695456Z","updatedOn":"2021-05-04T19:20:06.7695456Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/fb8bab14-7f67-4e57-8aa5-0c4b7ab5a0fa","type":"Microsoft.Authorization/roleAssignments","name":"fb8bab14-7f67-4e57-8aa5-0c4b7ab5a0fa"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod","condition":null,"conditionVersion":null,"createdOn":"2019-03-26T22:01:02.9176787Z","updatedOn":"2019-03-26T22:01:02.9176787Z","createdBy":"8701e34d-d7c2-459c-b2d7-f3a9c5204818","updatedBy":"8701e34d-d7c2-459c-b2d7-f3a9c5204818","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod/providers/Microsoft.Authorization/roleAssignments/4b771ea9-81de-4fc4-aa28-a3a0b9b4a320","type":"Microsoft.Authorization/roleAssignments","name":"4b771ea9-81de-4fc4-aa28-a3a0b9b4a320"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/36243c78-bf99-498c-9df9-86d9f8d28608","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod","condition":null,"conditionVersion":null,"createdOn":"2019-03-27T00:49:37.3000523Z","updatedOn":"2019-03-27T00:49:37.3000523Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod/providers/Microsoft.Authorization/roleAssignments/e6e1fffd-83f7-40c7-9f33-e56e2cf75b29","type":"Microsoft.Authorization/roleAssignments","name":"e6e1fffd-83f7-40c7-9f33-e56e2cf75b29"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/5d58bcaf-24a5-4b20-bdb6-eed9f69fbe4c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod","condition":null,"conditionVersion":null,"createdOn":"2019-03-27T00:50:08.3039053Z","updatedOn":"2019-03-27T00:50:08.3039053Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod/providers/Microsoft.Authorization/roleAssignments/3d01f56e-ee3a-41ed-a775-0e067546cb12","type":"Microsoft.Authorization/roleAssignments","name":"3d01f56e-ee3a-41ed-a775-0e067546cb12"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/94ddc4bc-25f5-4f3e-b527-c587da93cfe4","principalId":"00000000-0000-0000-0000-000000000001","principalType":"Group","scope":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod","condition":null,"conditionVersion":null,"createdOn":"2022-06-28T23:11:28.9217618Z","updatedOn":"2022-06-28T23:11:28.9217618Z","createdBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","updatedBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod/providers/Microsoft.Authorization/roleAssignments/869183bd-893a-46f9-bb02-45e48b13f1be","type":"Microsoft.Authorization/roleAssignments","name":"869183bd-893a-46f9-bb02-45e48b13f1be"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47","condition":null,"conditionVersion":null,"createdOn":"2020-03-12T20:43:06.5941189Z","updatedOn":"2020-03-12T20:43:06.5941189Z","createdBy":"606f48c8-d219-4875-991d-ae6befaf0756","updatedBy":"606f48c8-d219-4875-991d-ae6befaf0756","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47/providers/Microsoft.Authorization/roleAssignments/ad9e2cd7-0ff7-4931-9b17-656c8f17934b","type":"Microsoft.Authorization/roleAssignments","name":"ad9e2cd7-0ff7-4931-9b17-656c8f17934b"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47","condition":null,"conditionVersion":null,"createdOn":"2023-02-21T22:32:46.2324804Z","updatedOn":"2023-02-21T22:32:46.2324804Z","createdBy":"7f1579a6-c648-43a1-ac1e-0c3020dd9b8e","updatedBy":"7f1579a6-c648-43a1-ac1e-0c3020dd9b8e","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47/providers/Microsoft.Authorization/roleAssignments/df7c1e07-5c2d-4b22-b7b9-fd11a8569db3","type":"Microsoft.Authorization/roleAssignments","name":"df7c1e07-5c2d-4b22-b7b9-fd11a8569db3"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/de139f84-1756-47ae-9be6-808fbbe84772","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47","condition":null,"conditionVersion":null,"createdOn":"2023-05-04T20:23:16.3808369Z","updatedOn":"2023-05-04T20:23:16.3808369Z","createdBy":"fa00c2de-57d5-4527-9254-4d513f482d0a","updatedBy":"fa00c2de-57d5-4527-9254-4d513f482d0a","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47/providers/Microsoft.Authorization/roleAssignments/59109645-7b2b-4278-831a-2e4627ec603d","type":"Microsoft.Authorization/roleAssignments","name":"59109645-7b2b-4278-831a-2e4627ec603d"}]}' + AccessMonitorReader to read access details for compliance purpose"},"id":"/providers/Microsoft.Authorization/roleAssignments/125160dd-5630-45b1-8260-4e5469d3e7b6","type":"Microsoft.Authorization/roleAssignments","name":"125160dd-5630-45b1-8260-4e5469d3e7b6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"User","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2021-04-26T05:33:00.7067936Z","updatedOn":"2021-04-26T05:33:00.7067936Z","createdBy":"7e9cc714-bfe4-4eea-acb2-d53ced88ab8b","updatedBy":"7e9cc714-bfe4-4eea-acb2-d53ced88ab8b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/2adf4737-6342-4f63-aeb2-5fcd3426a387","type":"Microsoft.Authorization/roleAssignments","name":"2adf4737-6342-4f63-aeb2-5fcd3426a387"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2021-04-26T06:09:24.5972802Z","updatedOn":"2021-04-26T06:09:24.5972802Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/c4572c05-f69f-4e5c-aac6-79afefcf0e2e","type":"Microsoft.Authorization/roleAssignments","name":"c4572c05-f69f-4e5c-aac6-79afefcf0e2e"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2021-06-18T05:18:40.4643436Z","updatedOn":"2021-06-18T05:18:40.4643436Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/3f926301-cc14-4a88-a3b7-c159d73d01f6","type":"Microsoft.Authorization/roleAssignments","name":"3f926301-cc14-4a88-a3b7-c159d73d01f6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:40.4541416Z","updatedOn":"2022-01-25T05:49:40.4541416Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/95e51146-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"95e51146-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:41.6466655Z","updatedOn":"2022-01-25T05:49:41.6466655Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/96d4d041-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"96d4d041-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:42.8008295Z","updatedOn":"2022-01-25T05:49:42.8008295Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/978dbc52-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"978dbc52-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:43.7159467Z","updatedOn":"2022-01-25T05:49:43.7159467Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/9808753a-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"9808753a-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T05:49:44.8535285Z","updatedOn":"2022-01-25T05:49:44.8535285Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/9895826c-7da2-11ec-9795-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"9895826c-7da2-11ec-9795-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:21.9669611Z","updatedOn":"2022-01-25T06:00:21.9669611Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/143cab45-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"143cab45-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:21.7844500Z","updatedOn":"2022-01-25T06:00:21.7844500Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/143a47b2-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"143a47b2-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:22.8152511Z","updatedOn":"2022-01-25T06:00:22.8152511Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/1503a122-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"1503a122-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:22.7549989Z","updatedOn":"2022-01-25T06:00:22.7549989Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/14fdfc11-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"14fdfc11-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/ba92f5b4-2d11-453d-a403-e96b0029c9fe","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:47.5002672Z","updatedOn":"2022-01-25T06:00:47.5002672Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/23901ba1-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"23901ba1-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/81a9662b-bebf-436f-a333-f67b29880f12","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:47.9954045Z","updatedOn":"2022-01-25T06:00:47.9954045Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/23d4b2c8-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"23d4b2c8-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/17d1049b-9a84-46fb-8f53-869881c3d3ab","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:48.0124462Z","updatedOn":"2022-01-25T06:00:48.0124462Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/23eb1c2a-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"23eb1c2a-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:49.0142818Z","updatedOn":"2022-01-25T06:00:49.0142818Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/248c7804-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"248c7804-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:00:49.8561822Z","updatedOn":"2022-01-25T06:00:49.8561822Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/25212cc5-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"25212cc5-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:03:00.8232622Z","updatedOn":"2022-01-25T06:03:00.8232622Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/730ae441-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"730ae441-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:03:01.6908492Z","updatedOn":"2022-01-25T06:03:01.6908492Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/73b81c51-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"73b81c51-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:27.0646115Z","updatedOn":"2022-01-25T06:05:27.0646115Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/ca436279-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"ca436279-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:27.8245772Z","updatedOn":"2022-01-25T06:05:27.8245772Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cad7146c-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cad7146c-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:28.8193427Z","updatedOn":"2022-01-25T06:05:28.8193427Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cb6be874-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cb6be874-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:30.0125029Z","updatedOn":"2022-01-25T06:05:30.0125029Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cc20f7f4-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cc20f7f4-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:31.2002633Z","updatedOn":"2022-01-25T06:05:31.2002633Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/ccd748dd-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"ccd748dd-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:32.4937030Z","updatedOn":"2022-01-25T06:05:32.4937030Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cd4bbd1a-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cd4bbd1a-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:33.6999970Z","updatedOn":"2022-01-25T06:05:33.6999970Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/ce56964e-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"ce56964e-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:35.3719606Z","updatedOn":"2022-01-25T06:05:35.3719606Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/cf53c36b-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"cf53c36b-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:37.0989473Z","updatedOn":"2022-01-25T06:05:37.0989473Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d0537e9f-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d0537e9f-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:37.9186616Z","updatedOn":"2022-01-25T06:05:37.9186616Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d0d7c10e-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d0d7c10e-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/2a2b9908-6ea1-4ae2-8e65-a410df84e7d1","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:39.2245796Z","updatedOn":"2022-01-25T06:05:39.2245796Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d187dc7e-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d187dc7e-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/81a9662b-bebf-436f-a333-f67b29880f12","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:41.3147495Z","updatedOn":"2022-01-25T06:05:41.3147495Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d2d190da-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d2d190da-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/090c5cfd-751d-490a-894a-3ce6f1109419","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2022-01-25T06:05:42.0909979Z","updatedOn":"2022-01-25T06:05:42.0909979Z","createdBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","updatedBy":"8ff738a5-abcd-4864-a162-6c18f7c9cbd9","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/d3553305-7da4-11ec-beaa-0022487a95e4","type":"Microsoft.Authorization/roleAssignments","name":"d3553305-7da4-11ec-beaa-0022487a95e4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2023-02-10T04:11:40.8923959Z","updatedOn":"2023-02-10T04:11:40.8923959Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/7b9cb4b1-7e07-4127-b87e-47e7ab8ae685","type":"Microsoft.Authorization/roleAssignments","name":"7b9cb4b1-7e07-4127-b87e-47e7ab8ae685"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2023-07-04T02:50:17.7342959Z","updatedOn":"2023-07-04T02:50:17.7342959Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/620ed504-87c7-4aea-8641-c429dd227711","type":"Microsoft.Authorization/roleAssignments","name":"620ed504-87c7-4aea-8641-c429dd227711"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635","principalId":"00000000-0000-0000-0000-000000000001","principalType":"User","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2023-10-23T09:30:37.0588305Z","updatedOn":"2023-10-23T09:30:37.0588305Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/3cb825c4-ed75-45fd-a09d-bc9df69a0329","type":"Microsoft.Authorization/roleAssignments","name":"3cb825c4-ed75-45fd-a09d-bc9df69a0329"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"Group","scope":"/subscriptions/00000000-0000-0000-0000-000000000000","condition":null,"conditionVersion":null,"createdOn":"2021-09-18T03:09:33.8702688Z","updatedOn":"2021-09-18T03:09:33.8702688Z","createdBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","updatedBy":"6904f123-3ede-43d2-bd0e-2b2f1bbe4a4b","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleAssignments/99d6fd13-909e-4c52-807e-77f7a5af83c8","type":"Microsoft.Authorization/roleAssignments","name":"99d6fd13-909e-4c52-807e-77f7a5af83c8"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/465fbb01-3623-f393-e42f-e19c0d2982de","condition":null,"conditionVersion":null,"createdOn":"2021-10-08T17:23:35.8382756Z","updatedOn":"2021-10-08T17:23:35.8382756Z","createdBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","updatedBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/465fbb01-3623-f393-e42f-e19c0d2982de/providers/Microsoft.Authorization/roleAssignments/ade4333c-4321-4b68-b498-d081d55e2b0c","type":"Microsoft.Authorization/roleAssignments","name":"ade4333c-4321-4b68-b498-d081d55e2b0c"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2019-03-26T22:01:02.9136073Z","updatedOn":"2019-03-26T22:01:02.9136073Z","createdBy":"8701e34d-d7c2-459c-b2d7-f3a9c5204818","updatedBy":"8701e34d-d7c2-459c-b2d7-f3a9c5204818","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/6f4de15e-9316-4714-a7c4-40c46cf8e067","type":"Microsoft.Authorization/roleAssignments","name":"6f4de15e-9316-4714-a7c4-40c46cf8e067"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:13.2137492Z","updatedOn":"2020-02-25T18:36:13.2137492Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/18fdd87e-1c01-424e-b380-32310f4940c2","type":"Microsoft.Authorization/roleAssignments","name":"18fdd87e-1c01-424e-b380-32310f4940c2"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:00.4746112Z","updatedOn":"2020-02-25T18:36:00.4746112Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/d9bcf58a-6f24-446d-bf60-20ffe5142396","type":"Microsoft.Authorization/roleAssignments","name":"d9bcf58a-6f24-446d-bf60-20ffe5142396"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:35:55.7490022Z","updatedOn":"2020-02-25T18:35:55.7490022Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/6e2b954b-42b2-48e0-997a-622601f0a4b4","type":"Microsoft.Authorization/roleAssignments","name":"6e2b954b-42b2-48e0-997a-622601f0a4b4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:35:57.9173081Z","updatedOn":"2020-02-25T18:35:57.9173081Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/8d76aaa3-fcfd-4ea5-8c7c-363d250e7ae9","type":"Microsoft.Authorization/roleAssignments","name":"8d76aaa3-fcfd-4ea5-8c7c-363d250e7ae9"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:31.2596366Z","updatedOn":"2020-02-25T18:36:31.2596366Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/0dabf212-a1c7-4af6-ba8b-be045493b368","type":"Microsoft.Authorization/roleAssignments","name":"0dabf212-a1c7-4af6-ba8b-be045493b368"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:35:52.9188704Z","updatedOn":"2020-02-25T18:35:52.9188704Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/d674b853-332e-4437-9ddb-bba8fde7ccce","type":"Microsoft.Authorization/roleAssignments","name":"d674b853-332e-4437-9ddb-bba8fde7ccce"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:38.8393742Z","updatedOn":"2020-02-25T18:36:38.8393742Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/00625383-053d-4227-a4db-b098e9bd2289","type":"Microsoft.Authorization/roleAssignments","name":"00625383-053d-4227-a4db-b098e9bd2289"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-02-25T18:36:05.0954462Z","updatedOn":"2020-02-25T18:36:05.0954462Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/3151fe9c-fcd2-45d3-a256-72fb13b86df5","type":"Microsoft.Authorization/roleAssignments","name":"3151fe9c-fcd2-45d3-a256-72fb13b86df5"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2020-07-06T18:51:23.0753297Z","updatedOn":"2020-07-06T18:51:23.0753297Z","createdBy":"d59f4a71-eff1-4bfa-a572-fe518f49f6c7","updatedBy":"d59f4a71-eff1-4bfa-a572-fe518f49f6c7","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/b3a9e1db-fde1-4ddd-ac1c-91913be67359","type":"Microsoft.Authorization/roleAssignments","name":"b3a9e1db-fde1-4ddd-ac1c-91913be67359"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-12-12T21:14:55.1655079Z","updatedOn":"2023-02-28T22:54:18.0450083Z","createdBy":"393a8425-6c8d-4d4a-a700-811f0423e5aa","updatedBy":"393a8425-6c8d-4d4a-a700-811f0423e5aa","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/6565c104-61e2-5756-96d7-663b216c8b11","type":"Microsoft.Authorization/roleAssignments","name":"6565c104-61e2-5756-96d7-663b216c8b11"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-02-17T00:30:39.4967398Z","updatedOn":"2022-02-17T00:30:39.4967398Z","createdBy":"a4319ad3-20be-4542-8952-685b66e56377","updatedBy":"a4319ad3-20be-4542-8952-685b66e56377","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/d8aedac6-3663-42b3-add4-c013b7935fb4","type":"Microsoft.Authorization/roleAssignments","name":"d8aedac6-3663-42b3-add4-c013b7935fb4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-03-02T23:53:39.1630622Z","updatedOn":"2022-03-02T23:53:39.1630622Z","createdBy":"a4319ad3-20be-4542-8952-685b66e56377","updatedBy":"a4319ad3-20be-4542-8952-685b66e56377","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/b5f0a13f-ac13-4e45-8588-15f5d9a02b20","type":"Microsoft.Authorization/roleAssignments","name":"b5f0a13f-ac13-4e45-8588-15f5d9a02b20"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/fd6e57ea-fe3c-4f21-bd1e-de170a9a4971","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-03-08T00:58:05.8353141Z","updatedOn":"2022-03-08T00:58:05.8353141Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/403b97d1-ee0a-4b10-afe1-f36f368d2ced","type":"Microsoft.Authorization/roleAssignments","name":"403b97d1-ee0a-4b10-afe1-f36f368d2ced"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/94ddc4bc-25f5-4f3e-b527-c587da93cfe4","principalId":"00000000-0000-0000-0000-000000000001","principalType":"Group","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-05-16T23:08:20.8536608Z","updatedOn":"2022-05-16T23:08:20.8536608Z","createdBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","updatedBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/8b338a13-cfa6-42e6-b424-fb375ce9d07c","type":"Microsoft.Authorization/roleAssignments","name":"8b338a13-cfa6-42e6-b424-fb375ce9d07c"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-05-17T18:23:54.2264851Z","updatedOn":"2022-05-31T17:20:00.8273681Z","createdBy":"393a8425-6c8d-4d4a-a700-811f0423e5aa","updatedBy":"393a8425-6c8d-4d4a-a700-811f0423e5aa","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/f0576973-5014-5fe2-b3f2-cf3aace860d6","type":"Microsoft.Authorization/roleAssignments","name":"f0576973-5014-5fe2-b3f2-cf3aace860d6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-07-19T00:07:21.3325762Z","updatedOn":"2022-07-19T00:07:21.3325762Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/2697280b-812c-472d-841b-a10a9fe540a5","type":"Microsoft.Authorization/roleAssignments","name":"2697280b-812c-472d-841b-a10a9fe540a5"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/fd6e57ea-fe3c-4f21-bd1e-de170a9a4971","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-07-19T00:07:23.7020980Z","updatedOn":"2022-07-19T00:07:23.7020980Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/f4254463-7a28-4d26-b331-5a18c354cbe6","type":"Microsoft.Authorization/roleAssignments","name":"f4254463-7a28-4d26-b331-5a18c354cbe6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2022-07-19T00:07:26.4080657Z","updatedOn":"2022-07-19T00:07:26.4080657Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/065a63ba-71cc-4c69-b92b-bc67421e7e64","type":"Microsoft.Authorization/roleAssignments","name":"065a63ba-71cc-4c69-b92b-bc67421e7e64"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2023-04-07T05:56:00.4871186Z","updatedOn":"2023-04-24T19:44:20.3477537Z","createdBy":"09a22e59-e99b-42cb-b8b7-2475f66a3007","updatedBy":"09a22e59-e99b-42cb-b8b7-2475f66a3007","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/17a093c4-e4b2-5959-95e3-5894ef6873fb","type":"Microsoft.Authorization/roleAssignments","name":"17a093c4-e4b2-5959-95e3-5894ef6873fb"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2023-11-26T01:37:41.9144630Z","updatedOn":"2023-12-14T19:54:58.8919979Z","createdBy":"815c7b56-317b-457c-bf99-f9c2b6a3f739","updatedBy":"815c7b56-317b-457c-bf99-f9c2b6a3f739","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/67815997-99bc-5b98-9a5d-5ad5a092d499","type":"Microsoft.Authorization/roleAssignments","name":"67815997-99bc-5b98-9a5d-5ad5a092d499"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-08-09T18:17:33.0012805Z","updatedOn":"2021-08-09T18:17:33.0012805Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/01de8fe7-aae0-4d5c-844a-f0bdb8335252","type":"Microsoft.Authorization/roleAssignments","name":"01de8fe7-aae0-4d5c-844a-f0bdb8335252"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-08-09T18:17:39.9188336Z","updatedOn":"2021-08-09T18:17:39.9188336Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/ab2be506-5489-4c1f-add0-f5ed87a10439","type":"Microsoft.Authorization/roleAssignments","name":"ab2be506-5489-4c1f-add0-f5ed87a10439"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-08-24T19:32:18.2000692Z","updatedOn":"2021-08-24T19:32:18.2000692Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/0ce2f3fb-17ea-4193-9081-09aa4b39fec4","type":"Microsoft.Authorization/roleAssignments","name":"0ce2f3fb-17ea-4193-9081-09aa4b39fec4"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-08-24T19:32:36.6775144Z","updatedOn":"2021-08-24T19:32:36.6775144Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/2e95b289-99bd-4e68-83de-5433f2a0428c","type":"Microsoft.Authorization/roleAssignments","name":"2e95b289-99bd-4e68-83de-5433f2a0428c"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-11-01T22:46:09.1056400Z","updatedOn":"2021-11-01T22:46:09.1056400Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/82fe7886-5c1b-42c2-9319-7b4d436d8aba","type":"Microsoft.Authorization/roleAssignments","name":"82fe7886-5c1b-42c2-9319-7b4d436d8aba"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-11-01T22:46:14.7527743Z","updatedOn":"2021-11-01T22:46:14.7527743Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/12162b26-25fb-4ef5-a6e8-651446483cb6","type":"Microsoft.Authorization/roleAssignments","name":"12162b26-25fb-4ef5-a6e8-651446483cb6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-11-01T22:46:20.6399869Z","updatedOn":"2021-11-01T22:46:20.6399869Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/105bcc1f-3ddf-4cc0-bffc-03b3d9aaf870","type":"Microsoft.Authorization/roleAssignments","name":"105bcc1f-3ddf-4cc0-bffc-03b3d9aaf870"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-01-26T20:10:13.8998989Z","updatedOn":"2021-01-26T20:10:13.8998989Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/b36517ec-61d3-468d-afdc-eceda8adb4ee","type":"Microsoft.Authorization/roleAssignments","name":"b36517ec-61d3-468d-afdc-eceda8adb4ee"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-02-06T00:13:19.1780775Z","updatedOn":"2021-02-06T00:13:19.1780775Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/5216c1ee-4f58-4d36-b379-6c04b1fbd157","type":"Microsoft.Authorization/roleAssignments","name":"5216c1ee-4f58-4d36-b379-6c04b1fbd157"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/f25e0fa2-a7c8-4377-a976-54943a77a395","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-04-16T18:26:34.3109215Z","updatedOn":"2021-04-16T18:26:34.3109215Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/7464f8a3-9f55-443b-a3a5-44a31b100cad","type":"Microsoft.Authorization/roleAssignments","name":"7464f8a3-9f55-443b-a3a5-44a31b100cad"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-04-16T18:27:56.4446265Z","updatedOn":"2021-04-16T18:27:56.4446265Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/8f430c4c-4317-4495-9f01-4f3d4e1ca111","type":"Microsoft.Authorization/roleAssignments","name":"8f430c4c-4317-4495-9f01-4f3d4e1ca111"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/9980e02c-c2be-4d73-94e8-173b1dc7cf3c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792","condition":null,"conditionVersion":null,"createdOn":"2021-05-04T19:20:06.7695456Z","updatedOn":"2021-05-04T19:20:06.7695456Z","createdBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","updatedBy":"2ffe2392-0a52-4093-b041-66b10ebc8317","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/48fed3a1-0814-4847-88ce-b766155f2792/providers/Microsoft.Authorization/roleAssignments/fb8bab14-7f67-4e57-8aa5-0c4b7ab5a0fa","type":"Microsoft.Authorization/roleAssignments","name":"fb8bab14-7f67-4e57-8aa5-0c4b7ab5a0fa"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod","condition":null,"conditionVersion":null,"createdOn":"2019-03-26T22:01:02.9176787Z","updatedOn":"2019-03-26T22:01:02.9176787Z","createdBy":"8701e34d-d7c2-459c-b2d7-f3a9c5204818","updatedBy":"8701e34d-d7c2-459c-b2d7-f3a9c5204818","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod/providers/Microsoft.Authorization/roleAssignments/4b771ea9-81de-4fc4-aa28-a3a0b9b4a320","type":"Microsoft.Authorization/roleAssignments","name":"4b771ea9-81de-4fc4-aa28-a3a0b9b4a320"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/36243c78-bf99-498c-9df9-86d9f8d28608","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod","condition":null,"conditionVersion":null,"createdOn":"2019-03-27T00:49:37.3000523Z","updatedOn":"2019-03-27T00:49:37.3000523Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod/providers/Microsoft.Authorization/roleAssignments/e6e1fffd-83f7-40c7-9f33-e56e2cf75b29","type":"Microsoft.Authorization/roleAssignments","name":"e6e1fffd-83f7-40c7-9f33-e56e2cf75b29"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/5d58bcaf-24a5-4b20-bdb6-eed9f69fbe4c","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod","condition":null,"conditionVersion":null,"createdOn":"2019-03-27T00:50:08.3039053Z","updatedOn":"2019-03-27T00:50:08.3039053Z","createdBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","updatedBy":"820ba717-9ea7-4147-bc13-1e35af4cc27c","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod/providers/Microsoft.Authorization/roleAssignments/3d01f56e-ee3a-41ed-a775-0e067546cb12","type":"Microsoft.Authorization/roleAssignments","name":"3d01f56e-ee3a-41ed-a775-0e067546cb12"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/94ddc4bc-25f5-4f3e-b527-c587da93cfe4","principalId":"00000000-0000-0000-0000-000000000001","principalType":"Group","scope":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod","condition":null,"conditionVersion":null,"createdOn":"2022-06-28T23:11:28.9217618Z","updatedOn":"2022-06-28T23:11:28.9217618Z","createdBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","updatedBy":"1c8b3602-77a2-4e8a-8c1e-f127f2af5ca2","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod/providers/Microsoft.Authorization/roleAssignments/869183bd-893a-46f9-bb02-45e48b13f1be","type":"Microsoft.Authorization/roleAssignments","name":"869183bd-893a-46f9-bb02-45e48b13f1be"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/94ddc4bc-25f5-4f3e-b527-c587da93cfe4","principalId":"00000000-0000-0000-0000-000000000001","principalType":"Group","scope":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod","condition":null,"conditionVersion":null,"createdOn":"2023-09-15T21:41:54.7021549Z","updatedOn":"2023-09-15T21:41:54.7021549Z","createdBy":"08958326-d36e-43ae-bcfb-349b337a4483","updatedBy":"08958326-d36e-43ae-bcfb-349b337a4483","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/CnAIOrchestrationServicePublicCorpprod/providers/Microsoft.Authorization/roleAssignments/c68e55f3-69fd-4ba8-8dfc-0c62d73e4eb6","type":"Microsoft.Authorization/roleAssignments","name":"c68e55f3-69fd-4ba8-8dfc-0c62d73e4eb6"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47","condition":null,"conditionVersion":null,"createdOn":"2020-03-12T20:43:06.5941189Z","updatedOn":"2020-03-12T20:43:06.5941189Z","createdBy":"606f48c8-d219-4875-991d-ae6befaf0756","updatedBy":"606f48c8-d219-4875-991d-ae6befaf0756","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47/providers/Microsoft.Authorization/roleAssignments/ad9e2cd7-0ff7-4931-9b17-656c8f17934b","type":"Microsoft.Authorization/roleAssignments","name":"ad9e2cd7-0ff7-4931-9b17-656c8f17934b"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47","condition":null,"conditionVersion":null,"createdOn":"2023-02-21T22:32:46.2324804Z","updatedOn":"2023-02-21T22:32:46.2324804Z","createdBy":"7f1579a6-c648-43a1-ac1e-0c3020dd9b8e","updatedBy":"7f1579a6-c648-43a1-ac1e-0c3020dd9b8e","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47/providers/Microsoft.Authorization/roleAssignments/df7c1e07-5c2d-4b22-b7b9-fd11a8569db3","type":"Microsoft.Authorization/roleAssignments","name":"df7c1e07-5c2d-4b22-b7b9-fd11a8569db3"},{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/de139f84-1756-47ae-9be6-808fbbe84772","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47","condition":null,"conditionVersion":null,"createdOn":"2023-05-04T20:23:16.3808369Z","updatedOn":"2023-05-04T20:23:16.3808369Z","createdBy":"fa00c2de-57d5-4527-9254-4d513f482d0a","updatedBy":"fa00c2de-57d5-4527-9254-4d513f482d0a","delegatedManagedIdentityResourceId":null,"description":null},"id":"/providers/Microsoft.Management/managementGroups/72f988bf-86f1-41af-91ab-2d7cd011db47/providers/Microsoft.Authorization/roleAssignments/59109645-7b2b-4278-831a-2e4627ec603d","type":"Microsoft.Authorization/roleAssignments","name":"59109645-7b2b-4278-831a-2e4627ec603d"}]}' headers: cache-control: - no-cache content-length: - - '70252' + - '72017' content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:47:30 GMT + - Fri, 22 Dec 2023 10:08:25 GMT expires: - '-1' pragma: @@ -2586,7 +2696,7 @@ interactions: message: OK - request: body: '{"location": "westus2", "identity": {"type": "SystemAssigned"}, "properties": - {"kubernetesVersion": "", "dnsPrefix": "cliakstest-clitesttb6455nk2-79a739", + {"kubernetesVersion": "", "dnsPrefix": "cliakstest-clitest72xlrhjcz-79a739", "agentPoolProfiles": [{"count": 3, "vmSize": "Standard_DS2_v2", "osDiskSizeGB": 0, "workloadRuntime": "OCIContainer", "vnetSubnetID": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet", "osType": "Linux", "enableAutoScaling": false, "type": "VirtualMachineScaleSets", @@ -2595,7 +2705,7 @@ interactions: "Delete", "spotMaxPrice": -1.0, "nodeTaints": [], "enableEncryptionAtHost": false, "enableUltraSSD": false, "enableFIPS": false, "networkProfile": {}, "name": "nodepool1"}], "linuxProfile": {"adminUsername": "azureuser", "ssh": {"publicKeys": - [{"keyData": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + [{"keyData": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com\n"}]}}, "addonProfiles": {}, "enableRBAC": true, "enablePodSecurityPolicy": false, "networkProfile": {"networkPlugin": "kubenet", "podCidr": "10.244.0.0/16", "serviceCidr": "10.0.0.0/16", "dnsServiceIP": "10.0.0.10", @@ -2621,8 +2731,8 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.ContainerService/managedClusters/cliakstest000002?api-version=2023-10-02-preview response: @@ -2631,67 +2741,68 @@ interactions: \ \"location\": \"westus2\",\n \"name\": \"cliakstest000002\",\n \"type\": \"Microsoft.ContainerService/ManagedClusters\",\n \"properties\": {\n \"provisioningState\": \"Creating\",\n \"powerState\": {\n \"code\": \"Running\"\n },\n \"kubernetesVersion\": - \"1.26.6\",\n \"currentKubernetesVersion\": \"1.26.6\",\n \"dnsPrefix\": - \"cliakstest-clitesttb6455nk2-79a739\",\n \"fqdn\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"azurePortalFQDN\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.portal.hcp.westus2.azmk8s.io\",\n + \"1.27\",\n \"currentKubernetesVersion\": \"1.27.7\",\n \"dnsPrefix\": + \"cliakstest-clitest72xlrhjcz-79a739\",\n \"fqdn\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"azurePortalFQDN\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.portal.hcp.westus2.azmk8s.io\",\n \ \"agentPoolProfiles\": [\n {\n \"name\": \"nodepool1\",\n \"count\": 3,\n \"vmSize\": \"Standard_DS2_v2\",\n \"osDiskSizeGB\": 128,\n \"osDiskType\": \"Managed\",\n \"kubeletDiskType\": \"OS\",\n \"workloadRuntime\": \"OCIContainer\",\n \"vnetSubnetID\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet\",\n \ \"maxPods\": 110,\n \"type\": \"VirtualMachineScaleSets\",\n \"enableAutoScaling\": false,\n \"provisioningState\": \"Creating\",\n \"powerState\": {\n - \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.26.6\",\n - \ \"currentOrchestratorVersion\": \"1.26.6\",\n \"enableNodePublicIP\": - false,\n \"enableCustomCATrust\": false,\n \"mode\": \"System\",\n - \ \"enableEncryptionAtHost\": false,\n \"enableUltraSSD\": false,\n - \ \"osType\": \"Linux\",\n \"osSKU\": \"Ubuntu\",\n \"nodeImageVersion\": - \"AKSUbuntu-2204gen2containerd-202308.22.0\",\n \"upgradeSettings\": {},\n + \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.27.7\",\n + \ \"currentOrchestratorVersion\": \"1.27.7\",\n \"enableNodePublicIP\": + false,\n \"enableCustomCATrust\": false,\n \"nodeLabels\": {},\n \"mode\": + \"System\",\n \"enableEncryptionAtHost\": false,\n \"enableUltraSSD\": + false,\n \"osType\": \"Linux\",\n \"osSKU\": \"Ubuntu\",\n \"nodeImageVersion\": + \"AKSUbuntu-2204gen2containerd-202312.06.0\",\n \"upgradeSettings\": {},\n \ \"enableFIPS\": false,\n \"networkProfile\": {},\n \"securityProfile\": {\n \"sshAccess\": \"LocalUser\"\n }\n }\n ],\n \"linuxProfile\": {\n \"adminUsername\": \"azureuser\",\n \"ssh\": {\n \"publicKeys\": - [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com\\n\"\n }\n ]\n }\n },\n \"servicePrincipalProfile\": {\n \"clientId\":\"00000000-0000-0000-0000-000000000001\"\n },\n \"nodeResourceGroup\": \"MC_clitest000001_cliakstest000002_westus2\",\n \"enableRBAC\": true,\n \ \"enablePodSecurityPolicy\": false,\n \"supportPlan\": \"KubernetesOfficial\",\n - \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"loadBalancerSku\": - \"standard\",\n \"loadBalancerProfile\": {\n \"managedOutboundIPs\": - {\n \"count\": 1\n },\n \"backendPoolType\": \"nodeIPConfiguration\"\n - \ },\n \"podCidr\": \"10.244.0.0/16\",\n \"serviceCidr\": \"10.0.0.0/16\",\n - \ \"dnsServiceIP\": \"10.0.0.10\",\n \"outboundType\": \"loadBalancer\",\n - \ \"podCidrs\": [\n \"10.244.0.0/16\"\n ],\n \"serviceCidrs\": + \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"networkPolicy\": + \"none\",\n \"loadBalancerSku\": \"standard\",\n \"loadBalancerProfile\": + {\n \"managedOutboundIPs\": {\n \"count\": 1\n },\n \"backendPoolType\": + \"nodeIPConfiguration\"\n },\n \"podCidr\": \"10.244.0.0/16\",\n \"serviceCidr\": + \"10.0.0.0/16\",\n \"dnsServiceIP\": \"10.0.0.10\",\n \"outboundType\": + \"loadBalancer\",\n \"podCidrs\": [\n \"10.244.0.0/16\"\n ],\n \"serviceCidrs\": [\n \"10.0.0.0/16\"\n ],\n \"ipFamilies\": [\n \"IPv4\"\n ]\n \ },\n \"maxAgentPools\": 100,\n \"autoUpgradeProfile\": {\n \"nodeOSUpgradeChannel\": \"NodeImage\"\n },\n \"disableLocalAccounts\": false,\n \"httpProxyConfig\": {\n \"httpProxy\": \"http://cli-proxy-vm:3128/\",\n \"httpsProxy\": \"https://cli-proxy-vm:3129/\",\n \"noProxy\": [\n \"127.0.0.1\",\n - \ \"konnectivity\",\n \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n - \ \"10.0.0.0/16\",\n \"168.63.129.16\",\n \"localhost\",\n \"169.254.169.254\",\n - \ \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\"\n - \ ],\n \"effectiveNoProxy\": [\n \"127.0.0.1\",\n \"konnectivity\",\n - \ \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n \"10.0.0.0/16\",\n \"168.63.129.16\",\n - \ \"localhost\",\n \"169.254.169.254\",\n \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\"\n - \ ],\n \"trustedCa\": \"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\"\n + \ \"168.63.129.16\",\n \"konnectivity\",\n \"localhost\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"10.0.0.0/16\",\n \"169.254.169.254\",\n \"10.42.0.0/16\",\n + \ \"10.244.0.0/16\"\n ],\n \"effectiveNoProxy\": [\n \"127.0.0.1\",\n + \ \"168.63.129.16\",\n \"konnectivity\",\n \"localhost\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"10.0.0.0/16\",\n \"169.254.169.254\",\n \"10.42.0.0/16\",\n + \ \"10.244.0.0/16\"\n ],\n \"trustedCa\": \"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\"\n \ },\n \"securityProfile\": {},\n \"storageProfile\": {\n \"diskCSIDriver\": {\n \"enabled\": true,\n \"version\": \"v1\"\n },\n \"fileCSIDriver\": {\n \"enabled\": true\n },\n \"snapshotController\": {\n \"enabled\": true\n }\n },\n \"oidcIssuerProfile\": {\n \"enabled\": false\n \ },\n \"workloadAutoScalerProfile\": {},\n \"metricsProfile\": {\n \"costAnalysis\": - {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"65040c18c954fd00011e5d1d\"\n - \ },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n + {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"6585601f8ac0aa0001ae7fde\",\n + \ \"controlPlanePluginProfiles\": {\n \"karpenter\": {\n \"enableV2\": + true\n }\n },\n \"nodeProvisioningProfile\": {\n \"mode\": \"Manual\"\n + \ }\n },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n \ \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\n },\n \"sku\": {\n \"name\": \"Base\",\n \"tier\": \"Free\"\n }\n }" headers: azure-asyncoperation: - - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3a47%3a36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE + - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk cache-control: - no-cache content-length: - - '7042' + - '7239' content-type: - application/json date: - - Fri, 15 Sep 2023 07:47:36 GMT + - Fri, 22 Dec 2023 10:08:30 GMT expires: - '-1' pragma: @@ -2720,8 +2831,8 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.ContainerService/managedClusters/cliakstest000002?api-version=2023-10-02-preview response: @@ -2730,75 +2841,72 @@ interactions: \ \"location\": \"westus2\",\n \"name\": \"cliakstest000002\",\n \"type\": \"Microsoft.ContainerService/ManagedClusters\",\n \"properties\": {\n \"provisioningState\": \"Creating\",\n \"powerState\": {\n \"code\": \"Running\"\n },\n \"kubernetesVersion\": - \"1.26.6\",\n \"currentKubernetesVersion\": \"1.26.6\",\n \"dnsPrefix\": - \"cliakstest-clitesttb6455nk2-79a739\",\n \"fqdn\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"azurePortalFQDN\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.portal.hcp.westus2.azmk8s.io\",\n + \"1.27\",\n \"currentKubernetesVersion\": \"1.27.7\",\n \"dnsPrefix\": + \"cliakstest-clitest72xlrhjcz-79a739\",\n \"fqdn\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"azurePortalFQDN\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.portal.hcp.westus2.azmk8s.io\",\n \ \"agentPoolProfiles\": [\n {\n \"name\": \"nodepool1\",\n \"count\": 3,\n \"vmSize\": \"Standard_DS2_v2\",\n \"osDiskSizeGB\": 128,\n \"osDiskType\": \"Managed\",\n \"kubeletDiskType\": \"OS\",\n \"workloadRuntime\": \"OCIContainer\",\n \"vnetSubnetID\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet\",\n \ \"maxPods\": 110,\n \"type\": \"VirtualMachineScaleSets\",\n \"enableAutoScaling\": false,\n \"provisioningState\": \"Creating\",\n \"powerState\": {\n - \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.26.6\",\n - \ \"currentOrchestratorVersion\": \"1.26.6\",\n \"enableNodePublicIP\": + \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.27.7\",\n + \ \"currentOrchestratorVersion\": \"1.27.7\",\n \"enableNodePublicIP\": false,\n \"enableCustomCATrust\": false,\n \"mode\": \"System\",\n \ \"enableEncryptionAtHost\": false,\n \"enableUltraSSD\": false,\n \ \"osType\": \"Linux\",\n \"osSKU\": \"Ubuntu\",\n \"nodeImageVersion\": - \"AKSUbuntu-2204gen2containerd-202308.22.0\",\n \"upgradeSettings\": {},\n + \"AKSUbuntu-2204gen2containerd-202312.06.0\",\n \"upgradeSettings\": {},\n \ \"enableFIPS\": false,\n \"networkProfile\": {},\n \"securityProfile\": {\n \"sshAccess\": \"LocalUser\"\n }\n }\n ],\n \"linuxProfile\": {\n \"adminUsername\": \"azureuser\",\n \"ssh\": {\n \"publicKeys\": - [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com\\n\"\n }\n ]\n }\n },\n \"servicePrincipalProfile\": {\n \"clientId\":\"00000000-0000-0000-0000-000000000001\"\n },\n \"nodeResourceGroup\": \"MC_clitest000001_cliakstest000002_westus2\",\n \"enableRBAC\": true,\n \ \"enablePodSecurityPolicy\": false,\n \"supportPlan\": \"KubernetesOfficial\",\n - \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"loadBalancerSku\": - \"standard\",\n \"loadBalancerProfile\": {\n \"managedOutboundIPs\": - {\n \"count\": 1\n },\n \"backendPoolType\": \"nodeIPConfiguration\"\n - \ },\n \"podCidr\": \"10.244.0.0/16\",\n \"serviceCidr\": \"10.0.0.0/16\",\n - \ \"dnsServiceIP\": \"10.0.0.10\",\n \"outboundType\": \"loadBalancer\",\n - \ \"podCidrs\": [\n \"10.244.0.0/16\"\n ],\n \"serviceCidrs\": + \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"networkPolicy\": + \"none\",\n \"loadBalancerSku\": \"standard\",\n \"loadBalancerProfile\": + {\n \"managedOutboundIPs\": {\n \"count\": 1\n },\n \"backendPoolType\": + \"nodeIPConfiguration\"\n },\n \"podCidr\": \"10.244.0.0/16\",\n \"serviceCidr\": + \"10.0.0.0/16\",\n \"dnsServiceIP\": \"10.0.0.10\",\n \"outboundType\": + \"loadBalancer\",\n \"podCidrs\": [\n \"10.244.0.0/16\"\n ],\n \"serviceCidrs\": [\n \"10.0.0.0/16\"\n ],\n \"ipFamilies\": [\n \"IPv4\"\n ]\n \ },\n \"maxAgentPools\": 100,\n \"autoUpgradeProfile\": {\n \"nodeOSUpgradeChannel\": \"NodeImage\"\n },\n \"disableLocalAccounts\": false,\n \"httpProxyConfig\": {\n \"httpProxy\": \"http://cli-proxy-vm:3128/\",\n \"httpsProxy\": \"https://cli-proxy-vm:3129/\",\n \"noProxy\": [\n \"127.0.0.1\",\n - \ \"konnectivity\",\n \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n - \ \"10.0.0.0/16\",\n \"168.63.129.16\",\n \"localhost\",\n \"169.254.169.254\",\n - \ \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\"\n - \ ],\n \"effectiveNoProxy\": [\n \"127.0.0.1\",\n \"konnectivity\",\n - \ \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n \"10.0.0.0/16\",\n \"168.63.129.16\",\n - \ \"localhost\",\n \"169.254.169.254\",\n \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\"\n - \ ],\n \"trustedCa\": \"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\"\n + \ \"168.63.129.16\",\n \"konnectivity\",\n \"localhost\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"10.0.0.0/16\",\n \"169.254.169.254\",\n \"10.42.0.0/16\",\n + \ \"10.244.0.0/16\"\n ],\n \"effectiveNoProxy\": [\n \"127.0.0.1\",\n + \ \"168.63.129.16\",\n \"konnectivity\",\n \"localhost\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"10.0.0.0/16\",\n \"169.254.169.254\",\n \"10.42.0.0/16\",\n + \ \"10.244.0.0/16\"\n ],\n \"trustedCa\": \"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\"\n \ },\n \"securityProfile\": {},\n \"storageProfile\": {\n \"diskCSIDriver\": {\n \"enabled\": true,\n \"version\": \"v1\"\n },\n \"fileCSIDriver\": {\n \"enabled\": true\n },\n \"snapshotController\": {\n \"enabled\": true\n }\n },\n \"oidcIssuerProfile\": {\n \"enabled\": false\n \ },\n \"workloadAutoScalerProfile\": {},\n \"metricsProfile\": {\n \"costAnalysis\": - {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"65040c18c954fd00011e5d1d\"\n - \ },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n + {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"6585601f8ac0aa0001ae7fde\",\n + \ \"controlPlanePluginProfiles\": {\n \"karpenter\": {\n \"enableV2\": + true\n }\n },\n \"nodeProvisioningProfile\": {\n \"mode\": \"Manual\"\n + \ }\n },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n \ \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\n },\n \"sku\": {\n \"name\": \"Base\",\n \"tier\": \"Free\"\n }\n }" headers: cache-control: - no-cache content-length: - - '7042' + - '7216' content-type: - application/json date: - - Fri, 15 Sep 2023 07:47:37 GMT + - Fri, 22 Dec 2023 10:08:31 GMT expires: - '-1' pragma: - no-cache strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -2819,8 +2927,8 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleDefinitions?$filter=roleName%20eq%20%27Network%20Contributor%27&api-version=2022-05-01-preview response: @@ -2835,7 +2943,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:47:36 GMT + - Fri, 22 Dec 2023 10:08:31 GMT expires: - '-1' pragma: @@ -2875,27 +2983,22 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: PUT - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleAssignments/7e048e79-fd6d-4917-b574-f673fdcd43c1?api-version=2022-04-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleAssignments/6a395fa1-4c09-46e5-921a-6847e7d64cd3?api-version=2022-04-01 response: body: - string: '{"error":{"code":"PrincipalNotFound","message":"Principal 05f1c957878b4aba9c3ba9f44a39c6f3 - does not exist in the directory 72f988bf-86f1-41af-91ab-2d7cd011db47. Check - that you have the correct principal ID. If you are creating this principal - and then immediately assigning a role, this error might be related to a replication - delay. In this case, set the role assignment principalType property to a value, - such as ServicePrincipal, User, or Group. See https://aka.ms/docs-principaltype"}}' + string: '{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet","condition":null,"conditionVersion":null,"createdOn":"2023-12-22T10:08:32.3303175Z","updatedOn":"2023-12-22T10:08:32.6923254Z","createdBy":null,"updatedBy":"119e1aeb-4592-42d6-9507-c66df857924f","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleAssignments/6a395fa1-4c09-46e5-921a-6847e7d64cd3","type":"Microsoft.Authorization/roleAssignments","name":"6a395fa1-4c09-46e5-921a-6847e7d64cd3"}' headers: cache-control: - no-cache content-length: - - '489' + - '1041' content-type: - application/json; charset=utf-8 date: - - Fri, 15 Sep 2023 07:47:37 GMT + - Fri, 22 Dec 2023 10:08:36 GMT expires: - '-1' pragma: @@ -2907,13 +3010,13 @@ interactions: x-ms-ratelimit-remaining-subscription-writes: - '1199' status: - code: 400 - message: Bad Request + code: 201 + message: Created - request: body: null headers: Accept: - - application/json + - '*/*' Accept-Encoding: - gzip, deflate CommandName: @@ -2924,83 +3027,66 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleDefinitions?$filter=roleName%20eq%20%27Network%20Contributor%27&api-version=2022-05-01-preview + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk response: body: - string: '{"value":[{"properties":{"roleName":"Network Contributor","type":"BuiltInRole","description":"Lets - you manage networks, but not access to them.","assignableScopes":["/"],"permissions":[{"actions":["Microsoft.Authorization/*/read","Microsoft.Insights/alertRules/*","Microsoft.Network/*","Microsoft.ResourceHealth/availabilityStatuses/read","Microsoft.Resources/deployments/*","Microsoft.Resources/subscriptions/resourceGroups/read","Microsoft.Support/*"],"notActions":[],"dataActions":[],"notDataActions":[]}],"createdOn":"2015-06-02T00:18:27.3542698Z","updatedOn":"2021-11-11T20:13:44.6328966Z","createdBy":null,"updatedBy":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","type":"Microsoft.Authorization/roleDefinitions","name":"4d97b98b-1d4f-4787-a291-c67834d212e7"}]}' + string: "{\n \"name\": \"971929e6-6932-4981-82ef-49f8ecf062ad\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:08:31.0936537Z\"\n }" headers: cache-control: - no-cache content-length: - - '873' + - '126' content-type: - - application/json; charset=utf-8 + - application/json date: - - Fri, 15 Sep 2023 07:47:39 GMT + - Fri, 22 Dec 2023 10:09:01 GMT expires: - '-1' pragma: - no-cache - set-cookie: - - x-ms-gateway-slice=Production; path=/; secure; samesite=none; httponly strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: code: 200 message: OK - request: - body: '{"properties": {"roleDefinitionId": "/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7", - "principalId":"00000000-0000-0000-0000-000000000001"}}' + body: null headers: Accept: - - application/json + - '*/*' Accept-Encoding: - gzip, deflate CommandName: - aks create Connection: - keep-alive - Content-Length: - - '232' - Content-Type: - - application/json - Cookie: - - x-ms-gateway-slice=Production ParameterSetName: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) - method: PUT - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleAssignments/2a2d5647-2756-43b0-8cba-4d1e269e5d33?api-version=2022-04-01 + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) + method: GET + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk response: body: - string: '{"error":{"code":"PrincipalNotFound","message":"Principal 05f1c957878b4aba9c3ba9f44a39c6f3 - does not exist in the directory 72f988bf-86f1-41af-91ab-2d7cd011db47. Check - that you have the correct principal ID. If you are creating this principal - and then immediately assigning a role, this error might be related to a replication - delay. In this case, set the role assignment principalType property to a value, - such as ServicePrincipal, User, or Group. See https://aka.ms/docs-principaltype"}}' + string: "{\n \"name\": \"971929e6-6932-4981-82ef-49f8ecf062ad\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:08:31.0936537Z\"\n }" headers: cache-control: - no-cache content-length: - - '489' + - '126' content-type: - - application/json; charset=utf-8 + - application/json date: - - Fri, 15 Sep 2023 07:47:39 GMT + - Fri, 22 Dec 2023 10:09:31 GMT expires: - '-1' pragma: @@ -3009,16 +3095,14 @@ interactions: - max-age=31536000; includeSubDomains x-content-type-options: - nosniff - x-ms-ratelimit-remaining-subscription-writes: - - '1199' status: - code: 400 - message: Bad Request + code: 200 + message: OK - request: body: null headers: Accept: - - application/json + - '*/*' Accept-Encoding: - gzip, deflate CommandName: @@ -3029,184 +3113,29 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleDefinitions?$filter=roleName%20eq%20%27Network%20Contributor%27&api-version=2022-05-01-preview + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHaBggrBgEFBQcBAQSCAcwwggHIMGYGCCsGAQUFBzAChlpodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMElORlJBJTIwQ0ElMjAwMSg0KS5jcnQwVgYIKwYBBQUHMAKGSmh0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JZMlBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3J0MFYGCCsGAQUFBzAChkpodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CWTJQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSU5GUkElMjBDQSUyMDAxKDQpLmNydDBWBggrBgEFBQcwAoZKaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMElORlJBJTIwQ0ElMjAwMSg0KS5jcnQwVgYIKwYBBQUHMAKGSmh0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JZMlBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3J0MB0GA1UdDgQWBBTS1aFccpK8162ob3hFc-fJo76DmDAOBgNVHQ8BAf8EBAMCBaAwggE1BgNVHR8EggEsMIIBKDCCASSgggEgoIIBHIZCaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTl2Ztn_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk response: body: - string: '{"value":[{"properties":{"roleName":"Network Contributor","type":"BuiltInRole","description":"Lets - you manage networks, but not access to them.","assignableScopes":["/"],"permissions":[{"actions":["Microsoft.Authorization/*/read","Microsoft.Insights/alertRules/*","Microsoft.Network/*","Microsoft.ResourceHealth/availabilityStatuses/read","Microsoft.Resources/deployments/*","Microsoft.Resources/subscriptions/resourceGroups/read","Microsoft.Support/*"],"notActions":[],"dataActions":[],"notDataActions":[]}],"createdOn":"2015-06-02T00:18:27.3542698Z","updatedOn":"2021-11-11T20:13:44.6328966Z","createdBy":null,"updatedBy":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","type":"Microsoft.Authorization/roleDefinitions","name":"4d97b98b-1d4f-4787-a291-c67834d212e7"}]}' + string: "{\n \"name\": \"971929e6-6932-4981-82ef-49f8ecf062ad\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:08:31.0936537Z\"\n }" headers: cache-control: - no-cache content-length: - - '873' + - '126' content-type: - - application/json; charset=utf-8 + - application/json date: - - Fri, 15 Sep 2023 07:47:44 GMT + - Fri, 22 Dec 2023 10:10:02 GMT expires: - '-1' pragma: - no-cache - set-cookie: - - x-ms-gateway-slice=Production; path=/; secure; samesite=none; httponly strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding - x-content-type-options: - - nosniff - status: - code: 200 - message: OK -- request: - body: '{"properties": {"roleDefinitionId": "/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7", - "principalId":"00000000-0000-0000-0000-000000000001"}}' - headers: - Accept: - - application/json - Accept-Encoding: - - gzip, deflate - CommandName: - - aks create - Connection: - - keep-alive - Content-Length: - - '232' - Content-Type: - - application/json - Cookie: - - x-ms-gateway-slice=Production - ParameterSetName: - - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity - --yes --vnet-subnet-id -o - User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-authorization/4.0.0 Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) - method: PUT - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleAssignments/dec5cbc7-8c7a-43e1-9615-5d9f1525f4ba?api-version=2022-04-01 - response: - body: - string: '{"properties":{"roleDefinitionId":"/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7","principalId":"00000000-0000-0000-0000-000000000001","principalType":"ServicePrincipal","scope":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet","condition":null,"conditionVersion":null,"createdOn":"2023-09-15T07:47:44.8221377Z","updatedOn":"2023-09-15T07:47:45.2751506Z","createdBy":null,"updatedBy":"119e1aeb-4592-42d6-9507-c66df857924f","delegatedManagedIdentityResourceId":null,"description":null},"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet/providers/Microsoft.Authorization/roleAssignments/dec5cbc7-8c7a-43e1-9615-5d9f1525f4ba","type":"Microsoft.Authorization/roleAssignments","name":"dec5cbc7-8c7a-43e1-9615-5d9f1525f4ba"}' - headers: - cache-control: - - no-cache - content-length: - - '1041' - content-type: - - application/json; charset=utf-8 - date: - - Fri, 15 Sep 2023 07:47:46 GMT - expires: - - '-1' - pragma: - - no-cache - strict-transport-security: - - max-age=31536000; includeSubDomains - x-content-type-options: - - nosniff - x-ms-ratelimit-remaining-subscription-writes: - - '1199' - status: - code: 201 - message: Created -- request: - body: null - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - CommandName: - - aks create - Connection: - - keep-alive - ParameterSetName: - - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity - --yes --vnet-subnet-id -o - User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) - method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE - response: - body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" - headers: - cache-control: - - no-cache - content-length: - - '126' - content-type: - - application/json - date: - - Fri, 15 Sep 2023 07:48:08 GMT - expires: - - '-1' - pragma: - - no-cache - server: - - nginx - strict-transport-security: - - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding - x-content-type-options: - - nosniff - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - CommandName: - - aks create - Connection: - - keep-alive - ParameterSetName: - - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity - --yes --vnet-subnet-id -o - User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) - method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE - response: - body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" - headers: - cache-control: - - no-cache - content-length: - - '126' - content-type: - - application/json - date: - - Fri, 15 Sep 2023 07:48:38 GMT - expires: - - '-1' - pragma: - - no-cache - server: - - nginx - strict-transport-security: - - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -3227,14 +3156,14 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk response: body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" + string: "{\n \"name\": \"971929e6-6932-4981-82ef-49f8ecf062ad\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:08:31.0936537Z\"\n }" headers: cache-control: - no-cache @@ -3243,19 +3172,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:49:08 GMT + - Fri, 22 Dec 2023 10:10:32 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -3276,14 +3199,14 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk response: body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" + string: "{\n \"name\": \"971929e6-6932-4981-82ef-49f8ecf062ad\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:08:31.0936537Z\"\n }" headers: cache-control: - no-cache @@ -3292,19 +3215,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:49:38 GMT + - Fri, 22 Dec 2023 10:11:02 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -3325,14 +3242,14 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-fJo76DmDAOBgNVHQ8BAf8EBAMCBaAwggE1BgNVHR8EggEsMIIBKDCCASSgggEgoIIBHIZCaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTl2Ztn_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk response: body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" + string: "{\n \"name\": \"971929e6-6932-4981-82ef-49f8ecf062ad\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:08:31.0936537Z\"\n }" headers: cache-control: - no-cache @@ -3341,19 +3258,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:50:08 GMT + - Fri, 22 Dec 2023 10:11:32 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -3374,14 +3285,14 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk response: body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" + string: "{\n \"name\": \"971929e6-6932-4981-82ef-49f8ecf062ad\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:08:31.0936537Z\"\n }" headers: cache-control: - no-cache @@ -3390,19 +3301,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:50:39 GMT + - Fri, 22 Dec 2023 10:12:02 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -3423,14 +3328,14 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk response: body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" + string: "{\n \"name\": \"971929e6-6932-4981-82ef-49f8ecf062ad\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:08:31.0936537Z\"\n }" headers: cache-control: - no-cache @@ -3439,19 +3344,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:51:10 GMT + - Fri, 22 Dec 2023 10:12:33 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -3472,35 +3371,30 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/971929e6-6932-4981-82ef-49f8ecf062ad?api-version=2016-03-30&t=638388365113557623&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=SbUFttTRYOVFK4pKaxwJkwTAeqPLpdtXunICyJwJUqkrmcOqfkVO8BUFmD7smXVVErRizmyTJTGt9l9nqQ5w7lF5E-cWAQb0KzZonSnueUYAh3RckuuXMraqiIuKuXsgaVp_eaa3tbpwvbOjk6IyoJG10dkei2n-zCLSDpLUMa3bzAlmJyl962zYF2ulEfN2BybIHNMDMUdgWog_j2R0XxdNyzbOcM6WNVTSdOmeGH5tJzo3f2iSQED6d1ROQLmd-dfawT_8_wS9Tx-1l5uruWcZ7KdOuBrsHr7BA729MBBeZI7_IdHv86lQArPtn7xn4crFaOqASko_QuzZpQX1Sg&h=SdDI5JczI8TIGkqhkzgyftw1WS-IRXJuugS3IOR2wEk response: body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" + string: "{\n \"name\": \"971929e6-6932-4981-82ef-49f8ecf062ad\",\n \"status\": + \"Succeeded\",\n \"startTime\": \"2023-12-22T10:08:31.0936537Z\",\n \"endTime\": + \"2023-12-22T10:12:50.722256Z\"\n }" headers: cache-control: - no-cache content-length: - - '126' + - '169' content-type: - application/json date: - - Fri, 15 Sep 2023 07:51:40 GMT + - Fri, 22 Dec 2023 10:13:03 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -3521,156 +3415,8 @@ interactions: - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity --yes --vnet-subnet-id -o User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) - method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE - response: - body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" - headers: - cache-control: - - no-cache - content-length: - - '126' - content-type: - - application/json - date: - - Fri, 15 Sep 2023 07:52:10 GMT - expires: - - '-1' - pragma: - - no-cache - server: - - nginx - strict-transport-security: - - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding - x-content-type-options: - - nosniff - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - CommandName: - - aks create - Connection: - - keep-alive - ParameterSetName: - - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity - --yes --vnet-subnet-id -o - User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) - method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE - response: - body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\"\n }" - headers: - cache-control: - - no-cache - content-length: - - '126' - content-type: - - application/json - date: - - Fri, 15 Sep 2023 07:52:40 GMT - expires: - - '-1' - pragma: - - no-cache - server: - - nginx - strict-transport-security: - - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding - x-content-type-options: - - nosniff - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - CommandName: - - aks create - Connection: - - keep-alive - ParameterSetName: - - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity - --yes --vnet-subnet-id -o - User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) - method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/ffd617e8-ef71-46ae-8562-bd7c02a1a889?api-version=2016-03-30&t=2023-09-15T07%3A47%3A36&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9DTzFQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA1LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MB0GA1UdDgQWBBT6IQjGEFUZArd1dil8gnUkbgwjtjAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=ozC1I1S49YWK13fXrFhPrWoWyMtZkg4gI2osgrt-175xod0PIKJUtBMXWo691p3I6n29fKK7SKphEjDgOK1OYe8OO4-khwBvQpHtscl8__wUSmEJ16euGpAUwW7jonlIUUPMP53zpYpBhS5YZFfE9mZ8Jif8X9tHLYxCkVzv66fYTzv3tpXbssqe9mcOsnHMjRMalxjdsEwolBCwdw0owQOze8n8orCCp-EdwozhHytX7q9DvQ_EvbDsc7MAL10MCCwiaChpafUV2ds8i2Wjry3j9uXv42yEyypgJUHC3jSBjGMZULfUWGQ7ESB5wCxH8puT5xWjcc95lWKUVgK6Tw&h=7OKU_7ImXysDa4RBx9X6jQh9a8xDDiq_9QywkfB0reE - response: - body: - string: "{\n \"name\": \"e817d6ff-71ef-ae46-8562-bd7c02a1a889\",\n \"status\": - \"Succeeded\",\n \"startTime\": \"2023-09-15T07:47:36.2332158Z\",\n \"endTime\": - \"2023-09-15T07:53:06.2882797Z\"\n }" - headers: - cache-control: - - no-cache - content-length: - - '170' - content-type: - - application/json - date: - - Fri, 15 Sep 2023 07:53:10 GMT - expires: - - '-1' - pragma: - - no-cache - server: - - nginx - strict-transport-security: - - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding - x-content-type-options: - - nosniff - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - CommandName: - - aks create - Connection: - - keep-alive - ParameterSetName: - - --resource-group --name --http-proxy-config --ssh-key-value --enable-managed-identity - --yes --vnet-subnet-id -o - User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.ContainerService/managedClusters/cliakstest000002?api-version=2023-10-02-preview response: @@ -3679,33 +3425,33 @@ interactions: \ \"location\": \"westus2\",\n \"name\": \"cliakstest000002\",\n \"type\": \"Microsoft.ContainerService/ManagedClusters\",\n \"properties\": {\n \"provisioningState\": \"Succeeded\",\n \"powerState\": {\n \"code\": \"Running\"\n },\n \"kubernetesVersion\": - \"1.26.6\",\n \"currentKubernetesVersion\": \"1.26.6\",\n \"dnsPrefix\": - \"cliakstest-clitesttb6455nk2-79a739\",\n \"fqdn\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"azurePortalFQDN\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.portal.hcp.westus2.azmk8s.io\",\n + \"1.27\",\n \"currentKubernetesVersion\": \"1.27.7\",\n \"dnsPrefix\": + \"cliakstest-clitest72xlrhjcz-79a739\",\n \"fqdn\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"azurePortalFQDN\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.portal.hcp.westus2.azmk8s.io\",\n \ \"agentPoolProfiles\": [\n {\n \"name\": \"nodepool1\",\n \"count\": 3,\n \"vmSize\": \"Standard_DS2_v2\",\n \"osDiskSizeGB\": 128,\n \"osDiskType\": \"Managed\",\n \"kubeletDiskType\": \"OS\",\n \"workloadRuntime\": \"OCIContainer\",\n \"vnetSubnetID\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet\",\n \ \"maxPods\": 110,\n \"type\": \"VirtualMachineScaleSets\",\n \"enableAutoScaling\": false,\n \"provisioningState\": \"Succeeded\",\n \"powerState\": {\n - \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.26.6\",\n - \ \"currentOrchestratorVersion\": \"1.26.6\",\n \"enableNodePublicIP\": + \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.27.7\",\n + \ \"currentOrchestratorVersion\": \"1.27.7\",\n \"enableNodePublicIP\": false,\n \"enableCustomCATrust\": false,\n \"mode\": \"System\",\n \ \"enableEncryptionAtHost\": false,\n \"enableUltraSSD\": false,\n \ \"osType\": \"Linux\",\n \"osSKU\": \"Ubuntu\",\n \"nodeImageVersion\": - \"AKSUbuntu-2204gen2containerd-202308.22.0\",\n \"upgradeSettings\": {},\n + \"AKSUbuntu-2204gen2containerd-202312.06.0\",\n \"upgradeSettings\": {},\n \ \"enableFIPS\": false,\n \"networkProfile\": {},\n \"securityProfile\": {\n \"sshAccess\": \"LocalUser\"\n }\n }\n ],\n \"linuxProfile\": {\n \"adminUsername\": \"azureuser\",\n \"ssh\": {\n \"publicKeys\": - [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com\\n\"\n }\n ]\n }\n },\n \"servicePrincipalProfile\": {\n \"clientId\":\"00000000-0000-0000-0000-000000000001\"\n },\n \"nodeResourceGroup\": \"MC_clitest000001_cliakstest000002_westus2\",\n \"enableRBAC\": true,\n \ \"enablePodSecurityPolicy\": false,\n \"supportPlan\": \"KubernetesOfficial\",\n - \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"loadBalancerSku\": - \"Standard\",\n \"loadBalancerProfile\": {\n \"managedOutboundIPs\": - {\n \"count\": 1\n },\n \"effectiveOutboundIPs\": [\n {\n - \ \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/9692a162-e2b3-40cb-96db-274e14be7628\"\n + \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"networkPolicy\": + \"none\",\n \"loadBalancerSku\": \"Standard\",\n \"loadBalancerProfile\": + {\n \"managedOutboundIPs\": {\n \"count\": 1\n },\n \"effectiveOutboundIPs\": + [\n {\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/64d152a3-6c7c-4082-9bee-dac77d37ee3a\"\n \ }\n ],\n \"backendPoolType\": \"nodeIPConfiguration\"\n },\n \ \"podCidr\": \"10.244.0.0/16\",\n \"serviceCidr\": \"10.0.0.0/16\",\n \ \"dnsServiceIP\": \"10.0.0.10\",\n \"outboundType\": \"loadBalancer\",\n @@ -3718,41 +3464,38 @@ interactions: \"NodeImage\"\n },\n \"disableLocalAccounts\": false,\n \"httpProxyConfig\": {\n \"httpProxy\": \"http://cli-proxy-vm:3128/\",\n \"httpsProxy\": \"https://cli-proxy-vm:3129/\",\n \"noProxy\": [\n \"127.0.0.1\",\n - \ \"konnectivity\",\n \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n - \ \"10.0.0.0/16\",\n \"168.63.129.16\",\n \"localhost\",\n \"169.254.169.254\",\n - \ \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\"\n - \ ],\n \"effectiveNoProxy\": [\n \"127.0.0.1\",\n \"konnectivity\",\n - \ \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n \"10.0.0.0/16\",\n \"168.63.129.16\",\n - \ \"localhost\",\n \"169.254.169.254\",\n \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\"\n - \ ],\n \"trustedCa\": \"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\"\n + \ \"168.63.129.16\",\n \"konnectivity\",\n \"localhost\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"10.0.0.0/16\",\n \"169.254.169.254\",\n \"10.42.0.0/16\",\n + \ \"10.244.0.0/16\"\n ],\n \"effectiveNoProxy\": [\n \"127.0.0.1\",\n + \ \"168.63.129.16\",\n \"konnectivity\",\n \"localhost\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"10.0.0.0/16\",\n \"169.254.169.254\",\n \"10.42.0.0/16\",\n + \ \"10.244.0.0/16\"\n ],\n \"trustedCa\": \"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\"\n \ },\n \"securityProfile\": {},\n \"storageProfile\": {\n \"diskCSIDriver\": {\n \"enabled\": true,\n \"version\": \"v1\"\n },\n \"fileCSIDriver\": {\n \"enabled\": true\n },\n \"snapshotController\": {\n \"enabled\": true\n }\n },\n \"oidcIssuerProfile\": {\n \"enabled\": false\n \ },\n \"workloadAutoScalerProfile\": {},\n \"metricsProfile\": {\n \"costAnalysis\": - {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"65040c18c954fd00011e5d1d\"\n - \ },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n + {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"6585601f8ac0aa0001ae7fde\",\n + \ \"controlPlanePluginProfiles\": {\n \"karpenter\": {\n \"enableV2\": + true\n }\n },\n \"nodeProvisioningProfile\": {\n \"mode\": \"Manual\"\n + \ }\n },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n \ \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\n },\n \"sku\": {\n \"name\": \"Base\",\n \"tier\": \"Free\"\n }\n }" headers: cache-control: - no-cache content-length: - - '7695' + - '7869' content-type: - application/json date: - - Fri, 15 Sep 2023 07:53:11 GMT + - Fri, 22 Dec 2023 10:13:04 GMT expires: - '-1' pragma: - no-cache strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -3772,8 +3515,8 @@ interactions: ParameterSetName: - --resource-group --name --http-proxy-config User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.ContainerService/managedClusters/cliakstest000002?api-version=2023-10-02-preview response: @@ -3782,33 +3525,33 @@ interactions: \ \"location\": \"westus2\",\n \"name\": \"cliakstest000002\",\n \"type\": \"Microsoft.ContainerService/ManagedClusters\",\n \"properties\": {\n \"provisioningState\": \"Succeeded\",\n \"powerState\": {\n \"code\": \"Running\"\n },\n \"kubernetesVersion\": - \"1.26.6\",\n \"currentKubernetesVersion\": \"1.26.6\",\n \"dnsPrefix\": - \"cliakstest-clitesttb6455nk2-79a739\",\n \"fqdn\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"azurePortalFQDN\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.portal.hcp.westus2.azmk8s.io\",\n + \"1.27\",\n \"currentKubernetesVersion\": \"1.27.7\",\n \"dnsPrefix\": + \"cliakstest-clitest72xlrhjcz-79a739\",\n \"fqdn\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"azurePortalFQDN\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.portal.hcp.westus2.azmk8s.io\",\n \ \"agentPoolProfiles\": [\n {\n \"name\": \"nodepool1\",\n \"count\": 3,\n \"vmSize\": \"Standard_DS2_v2\",\n \"osDiskSizeGB\": 128,\n \"osDiskType\": \"Managed\",\n \"kubeletDiskType\": \"OS\",\n \"workloadRuntime\": \"OCIContainer\",\n \"vnetSubnetID\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet\",\n \ \"maxPods\": 110,\n \"type\": \"VirtualMachineScaleSets\",\n \"enableAutoScaling\": false,\n \"provisioningState\": \"Succeeded\",\n \"powerState\": {\n - \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.26.6\",\n - \ \"currentOrchestratorVersion\": \"1.26.6\",\n \"enableNodePublicIP\": + \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.27.7\",\n + \ \"currentOrchestratorVersion\": \"1.27.7\",\n \"enableNodePublicIP\": false,\n \"enableCustomCATrust\": false,\n \"mode\": \"System\",\n \ \"enableEncryptionAtHost\": false,\n \"enableUltraSSD\": false,\n \ \"osType\": \"Linux\",\n \"osSKU\": \"Ubuntu\",\n \"nodeImageVersion\": - \"AKSUbuntu-2204gen2containerd-202308.22.0\",\n \"upgradeSettings\": {},\n + \"AKSUbuntu-2204gen2containerd-202312.06.0\",\n \"upgradeSettings\": {},\n \ \"enableFIPS\": false,\n \"networkProfile\": {},\n \"securityProfile\": {\n \"sshAccess\": \"LocalUser\"\n }\n }\n ],\n \"linuxProfile\": {\n \"adminUsername\": \"azureuser\",\n \"ssh\": {\n \"publicKeys\": - [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com\\n\"\n }\n ]\n }\n },\n \"servicePrincipalProfile\": {\n \"clientId\":\"00000000-0000-0000-0000-000000000001\"\n },\n \"nodeResourceGroup\": \"MC_clitest000001_cliakstest000002_westus2\",\n \"enableRBAC\": true,\n \ \"enablePodSecurityPolicy\": false,\n \"supportPlan\": \"KubernetesOfficial\",\n - \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"loadBalancerSku\": - \"Standard\",\n \"loadBalancerProfile\": {\n \"managedOutboundIPs\": - {\n \"count\": 1\n },\n \"effectiveOutboundIPs\": [\n {\n - \ \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/9692a162-e2b3-40cb-96db-274e14be7628\"\n + \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"networkPolicy\": + \"none\",\n \"loadBalancerSku\": \"Standard\",\n \"loadBalancerProfile\": + {\n \"managedOutboundIPs\": {\n \"count\": 1\n },\n \"effectiveOutboundIPs\": + [\n {\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/64d152a3-6c7c-4082-9bee-dac77d37ee3a\"\n \ }\n ],\n \"backendPoolType\": \"nodeIPConfiguration\"\n },\n \ \"podCidr\": \"10.244.0.0/16\",\n \"serviceCidr\": \"10.0.0.0/16\",\n \ \"dnsServiceIP\": \"10.0.0.10\",\n \"outboundType\": \"loadBalancer\",\n @@ -3821,41 +3564,38 @@ interactions: \"NodeImage\"\n },\n \"disableLocalAccounts\": false,\n \"httpProxyConfig\": {\n \"httpProxy\": \"http://cli-proxy-vm:3128/\",\n \"httpsProxy\": \"https://cli-proxy-vm:3129/\",\n \"noProxy\": [\n \"127.0.0.1\",\n - \ \"konnectivity\",\n \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n - \ \"10.0.0.0/16\",\n \"168.63.129.16\",\n \"localhost\",\n \"169.254.169.254\",\n - \ \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\"\n - \ ],\n \"effectiveNoProxy\": [\n \"127.0.0.1\",\n \"konnectivity\",\n - \ \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n \"10.0.0.0/16\",\n \"168.63.129.16\",\n - \ \"localhost\",\n \"169.254.169.254\",\n \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\"\n - \ ],\n \"trustedCa\": \"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\"\n + \ \"168.63.129.16\",\n \"konnectivity\",\n \"localhost\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"10.0.0.0/16\",\n \"169.254.169.254\",\n \"10.42.0.0/16\",\n + \ \"10.244.0.0/16\"\n ],\n \"effectiveNoProxy\": [\n \"127.0.0.1\",\n + \ \"168.63.129.16\",\n \"konnectivity\",\n \"localhost\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"10.0.0.0/16\",\n \"169.254.169.254\",\n \"10.42.0.0/16\",\n + \ \"10.244.0.0/16\"\n ],\n \"trustedCa\": \"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\"\n \ },\n \"securityProfile\": {},\n \"storageProfile\": {\n \"diskCSIDriver\": {\n \"enabled\": true,\n \"version\": \"v1\"\n },\n \"fileCSIDriver\": {\n \"enabled\": true\n },\n \"snapshotController\": {\n \"enabled\": true\n }\n },\n \"oidcIssuerProfile\": {\n \"enabled\": false\n \ },\n \"workloadAutoScalerProfile\": {},\n \"metricsProfile\": {\n \"costAnalysis\": - {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"65040c18c954fd00011e5d1d\"\n - \ },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n + {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"6585601f8ac0aa0001ae7fde\",\n + \ \"controlPlanePluginProfiles\": {\n \"karpenter\": {\n \"enableV2\": + true\n }\n },\n \"nodeProvisioningProfile\": {\n \"mode\": \"Manual\"\n + \ }\n },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n \ \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\n },\n \"sku\": {\n \"name\": \"Base\",\n \"tier\": \"Free\"\n }\n }" headers: cache-control: - no-cache content-length: - - '7695' + - '7869' content-type: - application/json date: - - Fri, 15 Sep 2023 07:53:13 GMT + - Fri, 22 Dec 2023 10:13:04 GMT expires: - '-1' pragma: - no-cache strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -3863,24 +3603,24 @@ interactions: message: OK - request: body: '{"location": "westus2", "sku": {"name": "Base", "tier": "Free"}, "identity": - {"type": "SystemAssigned"}, "properties": {"kubernetesVersion": "1.26.6", "dnsPrefix": - "cliakstest-clitesttb6455nk2-79a739", "agentPoolProfiles": [{"count": 3, "vmSize": + {"type": "SystemAssigned"}, "properties": {"kubernetesVersion": "1.27", "dnsPrefix": + "cliakstest-clitest72xlrhjcz-79a739", "agentPoolProfiles": [{"count": 3, "vmSize": "Standard_DS2_v2", "osDiskSizeGB": 128, "osDiskType": "Managed", "kubeletDiskType": "OS", "workloadRuntime": "OCIContainer", "vnetSubnetID": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet", "maxPods": 110, "osType": "Linux", "osSKU": "Ubuntu", "enableAutoScaling": false, "type": "VirtualMachineScaleSets", "mode": "System", "orchestratorVersion": - "1.26.6", "upgradeSettings": {}, "powerState": {"code": "Running"}, "enableNodePublicIP": + "1.27.7", "upgradeSettings": {}, "powerState": {"code": "Running"}, "enableNodePublicIP": false, "enableCustomCATrust": false, "enableEncryptionAtHost": false, "enableUltraSSD": false, "enableFIPS": false, "networkProfile": {}, "securityProfile": {"sshAccess": "LocalUser"}, "name": "nodepool1"}], "linuxProfile": {"adminUsername": "azureuser", - "ssh": {"publicKeys": [{"keyData": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + "ssh": {"publicKeys": [{"keyData": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com\n"}]}}, "servicePrincipalProfile": {"clientId":"00000000-0000-0000-0000-000000000001"}, "oidcIssuerProfile": {"enabled": false}, "nodeResourceGroup": "MC_clitest000001_cliakstest000002_westus2", - "enableRBAC": true, "enablePodSecurityPolicy": false, "networkProfile": {"networkPlugin": - "kubenet", "podCidr": "10.244.0.0/16", "serviceCidr": "10.0.0.0/16", "dnsServiceIP": - "10.0.0.10", "outboundType": "loadBalancer", "loadBalancerSku": "Standard", - "loadBalancerProfile": {"managedOutboundIPs": {"count": 1}, "effectiveOutboundIPs": - [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/9692a162-e2b3-40cb-96db-274e14be7628"}], + "enableRBAC": true, "supportPlan": "KubernetesOfficial", "enablePodSecurityPolicy": + false, "networkProfile": {"networkPlugin": "kubenet", "networkPolicy": "none", + "podCidr": "10.244.0.0/16", "serviceCidr": "10.0.0.0/16", "dnsServiceIP": "10.0.0.10", + "outboundType": "loadBalancer", "loadBalancerSku": "Standard", "loadBalancerProfile": + {"managedOutboundIPs": {"count": 1}, "effectiveOutboundIPs": [{"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/64d152a3-6c7c-4082-9bee-dac77d37ee3a"}], "backendPoolType": "nodeIPConfiguration"}, "podCidrs": ["10.244.0.0/16"], "serviceCidrs": ["10.0.0.0/16"], "ipFamilies": ["IPv4"]}, "autoUpgradeProfile": {"nodeOSUpgradeChannel": "NodeImage"}, "identityProfile": {"kubeletidentity": {"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.ManagedIdentity/userAssignedIdentities/cliakstest000002-agentpool", @@ -3889,7 +3629,8 @@ interactions: "httpsProxy": "https://cli-proxy-vm:3129/", "noProxy": ["localhost", "127.0.0.1"], "trustedCa": "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"}, "securityProfile": {}, "storageProfile": {}, "workloadAutoScalerProfile": {}, - "metricsProfile": {"costAnalysis": {"enabled": false}}}}' + "metricsProfile": {"costAnalysis": {"enabled": false}}, "nodeProvisioningProfile": + {"mode": "Manual"}}}' headers: Accept: - application/json @@ -3900,14 +3641,14 @@ interactions: Connection: - keep-alive Content-Length: - - '5528' + - '5635' Content-Type: - application/json ParameterSetName: - --resource-group --name --http-proxy-config User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.ContainerService/managedClusters/cliakstest000002?api-version=2023-10-02-preview response: @@ -3916,33 +3657,33 @@ interactions: \ \"location\": \"westus2\",\n \"name\": \"cliakstest000002\",\n \"type\": \"Microsoft.ContainerService/ManagedClusters\",\n \"properties\": {\n \"provisioningState\": \"Updating\",\n \"powerState\": {\n \"code\": \"Running\"\n },\n \"kubernetesVersion\": - \"1.26.6\",\n \"currentKubernetesVersion\": \"1.26.6\",\n \"dnsPrefix\": - \"cliakstest-clitesttb6455nk2-79a739\",\n \"fqdn\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"azurePortalFQDN\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.portal.hcp.westus2.azmk8s.io\",\n + \"1.27\",\n \"currentKubernetesVersion\": \"1.27.7\",\n \"dnsPrefix\": + \"cliakstest-clitest72xlrhjcz-79a739\",\n \"fqdn\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"azurePortalFQDN\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.portal.hcp.westus2.azmk8s.io\",\n \ \"agentPoolProfiles\": [\n {\n \"name\": \"nodepool1\",\n \"count\": 3,\n \"vmSize\": \"Standard_DS2_v2\",\n \"osDiskSizeGB\": 128,\n \"osDiskType\": \"Managed\",\n \"kubeletDiskType\": \"OS\",\n \"workloadRuntime\": \"OCIContainer\",\n \"vnetSubnetID\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet\",\n \ \"maxPods\": 110,\n \"type\": \"VirtualMachineScaleSets\",\n \"enableAutoScaling\": false,\n \"provisioningState\": \"Updating\",\n \"powerState\": {\n - \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.26.6\",\n - \ \"currentOrchestratorVersion\": \"1.26.6\",\n \"enableNodePublicIP\": - false,\n \"enableCustomCATrust\": false,\n \"mode\": \"System\",\n - \ \"enableEncryptionAtHost\": false,\n \"enableUltraSSD\": false,\n - \ \"osType\": \"Linux\",\n \"osSKU\": \"Ubuntu\",\n \"nodeImageVersion\": - \"AKSUbuntu-2204gen2containerd-202308.22.0\",\n \"upgradeSettings\": {},\n + \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.27.7\",\n + \ \"currentOrchestratorVersion\": \"1.27.7\",\n \"enableNodePublicIP\": + false,\n \"enableCustomCATrust\": false,\n \"nodeLabels\": {},\n \"mode\": + \"System\",\n \"enableEncryptionAtHost\": false,\n \"enableUltraSSD\": + false,\n \"osType\": \"Linux\",\n \"osSKU\": \"Ubuntu\",\n \"nodeImageVersion\": + \"AKSUbuntu-2204gen2containerd-202312.06.0\",\n \"upgradeSettings\": {},\n \ \"enableFIPS\": false,\n \"networkProfile\": {},\n \"securityProfile\": {\n \"sshAccess\": \"LocalUser\"\n }\n }\n ],\n \"linuxProfile\": {\n \"adminUsername\": \"azureuser\",\n \"ssh\": {\n \"publicKeys\": - [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com\\n\"\n }\n ]\n }\n },\n \"servicePrincipalProfile\": {\n \"clientId\":\"00000000-0000-0000-0000-000000000001\"\n },\n \"nodeResourceGroup\": \"MC_clitest000001_cliakstest000002_westus2\",\n \"enableRBAC\": true,\n \ \"enablePodSecurityPolicy\": false,\n \"supportPlan\": \"KubernetesOfficial\",\n - \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"loadBalancerSku\": - \"Standard\",\n \"loadBalancerProfile\": {\n \"managedOutboundIPs\": - {\n \"count\": 1\n },\n \"effectiveOutboundIPs\": [\n {\n - \ \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/9692a162-e2b3-40cb-96db-274e14be7628\"\n + \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"networkPolicy\": + \"none\",\n \"loadBalancerSku\": \"Standard\",\n \"loadBalancerProfile\": + {\n \"managedOutboundIPs\": {\n \"count\": 1\n },\n \"effectiveOutboundIPs\": + [\n {\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/64d152a3-6c7c-4082-9bee-dac77d37ee3a\"\n \ }\n ],\n \"backendPoolType\": \"nodeIPConfiguration\"\n },\n \ \"podCidr\": \"10.244.0.0/16\",\n \"serviceCidr\": \"10.0.0.0/16\",\n \ \"dnsServiceIP\": \"10.0.0.10\",\n \"outboundType\": \"loadBalancer\",\n @@ -3954,44 +3695,41 @@ interactions: \ }\n },\n \"autoUpgradeProfile\": {\n \"nodeOSUpgradeChannel\": \"NodeImage\"\n },\n \"disableLocalAccounts\": false,\n \"httpProxyConfig\": {\n \"httpProxy\": \"http://cli-proxy-vm:3128/\",\n \"httpsProxy\": - \"https://cli-proxy-vm:3129/\",\n \"noProxy\": [\n \"localhost\",\n - \ \"127.0.0.1\",\n \"168.63.129.16\",\n \"169.254.169.254\",\n - \ \"konnectivity\",\n \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n \"10.0.0.0/16\"\n ],\n - \ \"effectiveNoProxy\": [\n \"localhost\",\n \"127.0.0.1\",\n \"168.63.129.16\",\n - \ \"169.254.169.254\",\n \"konnectivity\",\n \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n \"10.0.0.0/16\"\n ],\n - \ \"trustedCa\": \"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUZERENDQXZTZ0F3SUJBZ0lVQlJ3cGs1eTh5ckdrNmtYTjhkSHlMRUNvaHBrd0RRWUpLb1pJaHZjTkFRRUwKQlFBd0VqRVFNQTRHQTFVRUF3d0habTl2TFdKaGNqQWVGdzB5TVRFd01UTXdNekU1TlRoYUZ3MHpNVEV3TVRFdwpNekU1TlRoYU1CSXhFREFPQmdOVkJBTU1CMlp2YnkxaVlYSXdnZ0lpTUEwR0NTcUdTSWIzRFFFQkFRVUFBNElDCkR3QXdnZ0lLQW9JQ0FRRFcwRE9sVC9yci9xUEZIUU9lNndBNDkyVGh3VWxZaDhCQkszTW9VWVZLNjEvL2xXekEKeFkrYzlmazlvckUrZXhMSVpwdUg1VnNZR21MNUFyc05sVmNBMkU4MWgwSlBPYUo1eEpiZG40YldpZG9vdXRVVwpXeDNhYUJLSEt0RWdZbUNmTjliWXlZMlNWRWQvNS9HeGh0akVabHJ1aEtRdkZVa3hwR0xKK1JRQ25oNklZakQwCnNpQ0YyTjJhVUJ4RE5KaUdmeHlHSVIrY2p4Vlcrd01md05CQ0l6QVkxMnY4WmpzUXdmUWlhOE5oWEx3M0tuRm0KdzUrcHN2bU1HL1FFUUtZMXNOTnk2dS9DZkI3cmIxQ0EwcjdNNnFsNFMrWHJjZUVRcXpDUWR6NWJueGNYbmFkbwp5MDlhdm5OSGRqbmpvcHNPSkxhd2hzb3RGNWFrL1FLdjYzdU9yVFFlOHlPSWlCZ3JSUzdwejcxbVlhRGNMcXFtCmtmdDVLYnFnMHNZYmo0M09LSm5aZ3crTUtackhoSFJKNi9BcWxOclZML3pFUytHU0ozQ1lSaE5nYXdDQ0Nqd1gKanZYZnkycWFEV2NQbWZaSWVVMVNzdE05THBVRWFQNjJzUVNmb3NEdnZFbUFyUVgwcmd1WGhvZ3pRUFdGWVlEKwo4SUNFYkNFc21hVnN3MzhVUzgzbFlGVCtyTHh3cm5UK1JXSUZ2WFRXbHhCNm5JeWpsOXBhNzlkdU5ocjJxN2RzCjVOU3ZWWHg5UGNqVTQ2VUZ6QnVTbUl0Q0M0Y1NadFRWc3l6ZnpMd2hKbGlqV0czTkp5TnpHUkZQcUpQdTNJUzEKZ3VtKytqdWx4bXZNWm1vM1RqSE5JRm90a0kyd3d3ZUtIcWpYcW9STmwvVnZobE5CaXZRR2gxeGovd0lEQVFBQgpvMW93V0RBU0JnTlZIUkVFQ3pBSmdnZG1iMjh0WW1GeU1CSUdBMVVkRXdFQi93UUlNQVlCQWY4Q0FRQXdEd1lEClZSMFBBUUgvQkFVREF3Zm5nREFkQmdOVkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0RRWUoKS29aSWh2Y05BUUVMQlFBRGdnSUJBTDF3RlpTdUw4NTM3aHpUTXhSUWJjcWdEU2F4RUd0ZDJaNTVCcnVWQVloagpxQjR6STd1UVZ2SkNpeXdmQm5BNnZmejh2UDBzdGJJbkVtajh1dS9CSS81NzZqR0tWUWRQSDhqMnQvN1NQWjFKClhBWk9wc1hoVll2RmtpQlhVeW1RMnAvRjFqb2ZRRE1JQ0htdHhRUSthakJQNjBpcnFnVnpsRi95NlQySUgzOHYKbGordndIam52WW5vVmhGNEY0TlE5amp6S3Y1NUhVTk0xUEJKZkFaOTJqeXovczdPMmN2cjhNWlNkT2s5QVk1RQp5RXRlQjBTSjdLS0tUZklBVmVMQzdrRnBHR3FsRkRBNzhPSS9YakNZViswRjk4MHdNOVkxTEVUa3ZMamVSMEFyCnVzZDNIS1Vtd2EwTVEwUTNZNGxma0ZtNjJTclhvcjJURC9WZHpFZWNOTnVmV1VJTVNuaEJDNTVHWjBOTVYvR0QKRXhGZTVWQkhUZEZVNlIwb3JCOVFjVll1Mzk0MEt5NXhkbHNaUHZlMmRJNS9WOXhzY0Zad3cxWWs4K21RK3NVeQp2UVBoL2ZmK0tTQjdVVkdvTVNXUlg3YjFFMGVzZSs4QzZlaVV2OXpDR0VRbkVCcnFIQWxSUDJ2ZzQ0bXFJSnRzCjN2NUt1NW0ySmJoeWNsQVR3VUNQZkN3a2tLRTg0MzZGRitDK0ZUVTJ1OWVpL2t5QTAxYi9zRFl2cWdsS2FWK3MKbEVHRkhjd05Ea2VrS1BFUEZxNkpnZ3R0WlNidE5SMnFadzl3cExIbDVuVlVXdnBGa2hvcW1KVkphK0VBSTQ1LwpqRkh4VG9PMHp1NlBxc1p5SnM2TC84Z3BhbTcwMDV6b0VETVRjcFltMlduMFBKcEg3NE9zUHJVRDVJWVA5ZEt5Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\"\n + \"https://cli-proxy-vm:3129/\",\n \"noProxy\": [\n \"169.254.169.254\",\n + \ \"10.244.0.0/16\",\n \"konnectivity\",\n \"10.0.0.0/16\",\n \"127.0.0.1\",\n + \ \"168.63.129.16\",\n \"10.42.0.0/16\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"localhost\"\n ],\n \"effectiveNoProxy\": [\n \"169.254.169.254\",\n + \ \"10.244.0.0/16\",\n \"konnectivity\",\n \"10.0.0.0/16\",\n \"127.0.0.1\",\n + \ \"168.63.129.16\",\n \"10.42.0.0/16\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"localhost\"\n ],\n \"trustedCa\": \"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\"\n \ },\n \"securityProfile\": {},\n \"storageProfile\": {\n \"diskCSIDriver\": {\n \"enabled\": true,\n \"version\": \"v1\"\n },\n \"fileCSIDriver\": {\n \"enabled\": true\n },\n \"snapshotController\": {\n \"enabled\": true\n }\n },\n \"oidcIssuerProfile\": {\n \"enabled\": false\n \ },\n \"workloadAutoScalerProfile\": {},\n \"metricsProfile\": {\n \"costAnalysis\": - {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"65040c18c954fd00011e5d1d\"\n - \ },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n + {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"6585601f8ac0aa0001ae7fde\",\n + \ \"controlPlanePluginProfiles\": {\n \"karpenter\": {\n \"enableV2\": + true\n }\n },\n \"nodeProvisioningProfile\": {\n \"mode\": \"Manual\"\n + \ }\n },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n \ \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\n },\n \"sku\": {\n \"name\": \"Base\",\n \"tier\": \"Free\"\n }\n }" headers: azure-asyncoperation: - - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/fa72acd7-1907-4e88-98a3-755fbbf1859b?api-version=2016-03-30&t=2023-09-15T07%3a53%3a21&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=WJ95EaMXq_cyAnCZItVGjihpECiwIi3pmCuuZXQ7vnL2czT3US2KUQO5YuDH7-vgMcp4h8rs46lpzWc8mFW2to-TAUrdRdJenCk2kJC5BBQ9U4dRScnwmwyatkb-mWjqzDMi-QOhYcehoyLRLJtpucyfYdZynIAehiGMz67UAMSuKAxld8bAIkUGTDUo1K6_lOEjEgW4frSckk_u0rBEoPJx_9BlqsSAa3ASmlb0aTLYw_pRbd6Pe2FEumlh4hQH7ernWaJAROUJ96yQNoOpK9alT1glKHQsukQGFfM2-7DyCkHY_CmchEy-ZgzddhVB7QFoOzcb3DqN9My0MqJNCQ&h=GBPMqPT9qfymcYPw2KeVJDmOG0Jiy9XehFrelmPKk28 + - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/a02af078-3546-4213-846a-cd530a38efe3?api-version=2016-03-30&t=638388367891448400&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=ELHSXdKkA_BrHnzqqs9dTfuA3-YPlDNCrDQ7qmMHU8dv6Mqth0Nyyt3NiabIyFd00JfjoYXMFghokVhJGFuHzy3tXo4y1-U6hdFellwLX0YHbJ6Aeq-JnkDFgQK2XEyj7kPpfR-zJgke1rxtGo5STjKWPdUP6ueXLiKPnITbJzoLIlxEud6YQMefrNwzt_8Risim3Ts5Y9c0YMKGnAvWDDpMMN82dkuNrwvT6wJBnGPPdouEMa-vesemcuivfR55AepK-YOHfqMr1R4xQckme2akbBC3-phtDisjHMP6opQ1Vuo2vJCzh4JaZbrnmbCtqNDv-UpKeGpN4GaDEDdCZw&h=vWG06xhZi4_H5pmOCHQRF9DbDbSAfrjDyY8LQDpFBsQ cache-control: - no-cache content-length: - - '7665' + - '7862' content-type: - application/json date: - - Fri, 15 Sep 2023 07:53:20 GMT + - Fri, 22 Dec 2023 10:13:08 GMT expires: - '-1' pragma: - no-cache strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff x-ms-ratelimit-remaining-subscription-writes: @@ -4013,66 +3751,14 @@ interactions: ParameterSetName: - --resource-group --name --http-proxy-config User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) - method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/fa72acd7-1907-4e88-98a3-755fbbf1859b?api-version=2016-03-30&t=2023-09-15T07%3A53%3A21&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=WJ95EaMXq_cyAnCZItVGjihpECiwIi3pmCuuZXQ7vnL2czT3US2KUQO5YuDH7-vgMcp4h8rs46lpzWc8mFW2to-TAUrdRdJenCk2kJC5BBQ9U4dRScnwmwyatkb-mWjqzDMi-QOhYcehoyLRLJtpucyfYdZynIAehiGMz67UAMSuKAxld8bAIkUGTDUo1K6_lOEjEgW4frSckk_u0rBEoPJx_9BlqsSAa3ASmlb0aTLYw_pRbd6Pe2FEumlh4hQH7ernWaJAROUJ96yQNoOpK9alT1glKHQsukQGFfM2-7DyCkHY_CmchEy-ZgzddhVB7QFoOzcb3DqN9My0MqJNCQ&h=GBPMqPT9qfymcYPw2KeVJDmOG0Jiy9XehFrelmPKk28 - response: - body: - string: "{\n \"name\": \"d7ac72fa-0719-884e-98a3-755fbbf1859b\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:53:19.6460463Z\",\n \"error\": - {\n \"code\": \"NotLatestOperation\",\n \"message\": \"Cannot proceed - with the operation. Either the operation has been preempted by another one, - or the information needed by the operation failed to be saved (or hasn't been - saved yet).\"\n }\n }" - headers: - cache-control: - - no-cache - content-length: - - '374' - content-type: - - application/json - date: - - Fri, 15 Sep 2023 07:53:21 GMT - expires: - - '-1' - pragma: - - no-cache - server: - - nginx - strict-transport-security: - - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding - x-content-type-options: - - nosniff - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - CommandName: - - aks update - Connection: - - keep-alive - ParameterSetName: - - --resource-group --name --http-proxy-config - User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/fa72acd7-1907-4e88-98a3-755fbbf1859b?api-version=2016-03-30&t=2023-09-15T07%3A53%3A21&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=WJ95EaMXq_cyAnCZItVGjihpECiwIi3pmCuuZXQ7vnL2czT3US2KUQO5YuDH7-vgMcp4h8rs46lpzWc8mFW2to-TAUrdRdJenCk2kJC5BBQ9U4dRScnwmwyatkb-mWjqzDMi-QOhYcehoyLRLJtpucyfYdZynIAehiGMz67UAMSuKAxld8bAIkUGTDUo1K6_lOEjEgW4frSckk_u0rBEoPJx_9BlqsSAa3ASmlb0aTLYw_pRbd6Pe2FEumlh4hQH7ernWaJAROUJ96yQNoOpK9alT1glKHQsukQGFfM2-7DyCkHY_CmchEy-ZgzddhVB7QFoOzcb3DqN9My0MqJNCQ&h=GBPMqPT9qfymcYPw2KeVJDmOG0Jiy9XehFrelmPKk28 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/a02af078-3546-4213-846a-cd530a38efe3?api-version=2016-03-30&t=638388367891448400&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=ELHSXdKkA_BrHnzqqs9dTfuA3-YPlDNCrDQ7qmMHU8dv6Mqth0Nyyt3NiabIyFd00JfjoYXMFghokVhJGFuHzy3tXo4y1-U6hdFellwLX0YHbJ6Aeq-JnkDFgQK2XEyj7kPpfR-zJgke1rxtGo5STjKWPdUP6ueXLiKPnITbJzoLIlxEud6YQMefrNwzt_8Risim3Ts5Y9c0YMKGnAvWDDpMMN82dkuNrwvT6wJBnGPPdouEMa-vesemcuivfR55AepK-YOHfqMr1R4xQckme2akbBC3-phtDisjHMP6opQ1Vuo2vJCzh4JaZbrnmbCtqNDv-UpKeGpN4GaDEDdCZw&h=vWG06xhZi4_H5pmOCHQRF9DbDbSAfrjDyY8LQDpFBsQ response: body: - string: "{\n \"name\": \"d7ac72fa-0719-884e-98a3-755fbbf1859b\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:53:19.6460463Z\",\n \"error\": + string: "{\n \"name\": \"a02af078-3546-4213-846a-cd530a38efe3\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:13:08.9114111Z\",\n \"error\": {\n \"code\": \"NotLatestOperation\",\n \"message\": \"Cannot proceed with the operation. Either the operation has been preempted by another one, or the information needed by the operation failed to be saved (or hasn't been @@ -4085,19 +3771,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:53:52 GMT + - Fri, 22 Dec 2023 10:13:08 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -4117,14 +3797,14 @@ interactions: ParameterSetName: - --resource-group --name --http-proxy-config User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/fa72acd7-1907-4e88-98a3-755fbbf1859b?api-version=2016-03-30&t=2023-09-15T07%3A53%3A21&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=WJ95EaMXq_cyAnCZItVGjihpECiwIi3pmCuuZXQ7vnL2czT3US2KUQO5YuDH7-vgMcp4h8rs46lpzWc8mFW2to-TAUrdRdJenCk2kJC5BBQ9U4dRScnwmwyatkb-mWjqzDMi-QOhYcehoyLRLJtpucyfYdZynIAehiGMz67UAMSuKAxld8bAIkUGTDUo1K6_lOEjEgW4frSckk_u0rBEoPJx_9BlqsSAa3ASmlb0aTLYw_pRbd6Pe2FEumlh4hQH7ernWaJAROUJ96yQNoOpK9alT1glKHQsukQGFfM2-7DyCkHY_CmchEy-ZgzddhVB7QFoOzcb3DqN9My0MqJNCQ&h=GBPMqPT9qfymcYPw2KeVJDmOG0Jiy9XehFrelmPKk28 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/a02af078-3546-4213-846a-cd530a38efe3?api-version=2016-03-30&t=638388367891448400&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=ELHSXdKkA_BrHnzqqs9dTfuA3-YPlDNCrDQ7qmMHU8dv6Mqth0Nyyt3NiabIyFd00JfjoYXMFghokVhJGFuHzy3tXo4y1-U6hdFellwLX0YHbJ6Aeq-JnkDFgQK2XEyj7kPpfR-zJgke1rxtGo5STjKWPdUP6ueXLiKPnITbJzoLIlxEud6YQMefrNwzt_8Risim3Ts5Y9c0YMKGnAvWDDpMMN82dkuNrwvT6wJBnGPPdouEMa-vesemcuivfR55AepK-YOHfqMr1R4xQckme2akbBC3-phtDisjHMP6opQ1Vuo2vJCzh4JaZbrnmbCtqNDv-UpKeGpN4GaDEDdCZw&h=vWG06xhZi4_H5pmOCHQRF9DbDbSAfrjDyY8LQDpFBsQ response: body: - string: "{\n \"name\": \"d7ac72fa-0719-884e-98a3-755fbbf1859b\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:53:19.6460463Z\",\n \"error\": + string: "{\n \"name\": \"a02af078-3546-4213-846a-cd530a38efe3\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:13:08.9114111Z\",\n \"error\": {\n \"code\": \"NotLatestOperation\",\n \"message\": \"Cannot proceed with the operation. Either the operation has been preempted by another one, or the information needed by the operation failed to be saved (or hasn't been @@ -4137,19 +3817,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:54:21 GMT + - Fri, 22 Dec 2023 10:13:39 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -4169,14 +3843,14 @@ interactions: ParameterSetName: - --resource-group --name --http-proxy-config User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/fa72acd7-1907-4e88-98a3-755fbbf1859b?api-version=2016-03-30&t=2023-09-15T07%3A53%3A21&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9DTzFQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA1LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MB0GA1UdDgQWBBT6IQjGEFUZArd1dil8gnUkbgwjtjAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=WJ95EaMXq_cyAnCZItVGjihpECiwIi3pmCuuZXQ7vnL2czT3US2KUQO5YuDH7-vgMcp4h8rs46lpzWc8mFW2to-TAUrdRdJenCk2kJC5BBQ9U4dRScnwmwyatkb-mWjqzDMi-QOhYcehoyLRLJtpucyfYdZynIAehiGMz67UAMSuKAxld8bAIkUGTDUo1K6_lOEjEgW4frSckk_u0rBEoPJx_9BlqsSAa3ASmlb0aTLYw_pRbd6Pe2FEumlh4hQH7ernWaJAROUJ96yQNoOpK9alT1glKHQsukQGFfM2-7DyCkHY_CmchEy-ZgzddhVB7QFoOzcb3DqN9My0MqJNCQ&h=GBPMqPT9qfymcYPw2KeVJDmOG0Jiy9XehFrelmPKk28 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/a02af078-3546-4213-846a-cd530a38efe3?api-version=2016-03-30&t=638388367891448400&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-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_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=ELHSXdKkA_BrHnzqqs9dTfuA3-YPlDNCrDQ7qmMHU8dv6Mqth0Nyyt3NiabIyFd00JfjoYXMFghokVhJGFuHzy3tXo4y1-U6hdFellwLX0YHbJ6Aeq-JnkDFgQK2XEyj7kPpfR-zJgke1rxtGo5STjKWPdUP6ueXLiKPnITbJzoLIlxEud6YQMefrNwzt_8Risim3Ts5Y9c0YMKGnAvWDDpMMN82dkuNrwvT6wJBnGPPdouEMa-vesemcuivfR55AepK-YOHfqMr1R4xQckme2akbBC3-phtDisjHMP6opQ1Vuo2vJCzh4JaZbrnmbCtqNDv-UpKeGpN4GaDEDdCZw&h=vWG06xhZi4_H5pmOCHQRF9DbDbSAfrjDyY8LQDpFBsQ response: body: - string: "{\n \"name\": \"d7ac72fa-0719-884e-98a3-755fbbf1859b\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:53:19.6460463Z\",\n \"error\": + string: "{\n \"name\": \"a02af078-3546-4213-846a-cd530a38efe3\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:13:08.9114111Z\",\n \"error\": {\n \"code\": \"NotLatestOperation\",\n \"message\": \"Cannot proceed with the operation. Either the operation has been preempted by another one, or the information needed by the operation failed to be saved (or hasn't been @@ -4189,19 +3863,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:54:52 GMT + - Fri, 22 Dec 2023 10:14:09 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -4221,14 +3889,14 @@ interactions: ParameterSetName: - --resource-group --name --http-proxy-config User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/fa72acd7-1907-4e88-98a3-755fbbf1859b?api-version=2016-03-30&t=2023-09-15T07%3A53%3A21&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9DTzFQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA1LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MB0GA1UdDgQWBBT6IQjGEFUZArd1dil8gnUkbgwjtjAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=WJ95EaMXq_cyAnCZItVGjihpECiwIi3pmCuuZXQ7vnL2czT3US2KUQO5YuDH7-vgMcp4h8rs46lpzWc8mFW2to-TAUrdRdJenCk2kJC5BBQ9U4dRScnwmwyatkb-mWjqzDMi-QOhYcehoyLRLJtpucyfYdZynIAehiGMz67UAMSuKAxld8bAIkUGTDUo1K6_lOEjEgW4frSckk_u0rBEoPJx_9BlqsSAa3ASmlb0aTLYw_pRbd6Pe2FEumlh4hQH7ernWaJAROUJ96yQNoOpK9alT1glKHQsukQGFfM2-7DyCkHY_CmchEy-ZgzddhVB7QFoOzcb3DqN9My0MqJNCQ&h=GBPMqPT9qfymcYPw2KeVJDmOG0Jiy9XehFrelmPKk28 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/a02af078-3546-4213-846a-cd530a38efe3?api-version=2016-03-30&t=638388367891448400&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-fJo76DmDAOBgNVHQ8BAf8EBAMCBaAwggE1BgNVHR8EggEsMIIBKDCCASSgggEgoIIBHIZCaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTl2Ztn_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=ELHSXdKkA_BrHnzqqs9dTfuA3-YPlDNCrDQ7qmMHU8dv6Mqth0Nyyt3NiabIyFd00JfjoYXMFghokVhJGFuHzy3tXo4y1-U6hdFellwLX0YHbJ6Aeq-JnkDFgQK2XEyj7kPpfR-zJgke1rxtGo5STjKWPdUP6ueXLiKPnITbJzoLIlxEud6YQMefrNwzt_8Risim3Ts5Y9c0YMKGnAvWDDpMMN82dkuNrwvT6wJBnGPPdouEMa-vesemcuivfR55AepK-YOHfqMr1R4xQckme2akbBC3-phtDisjHMP6opQ1Vuo2vJCzh4JaZbrnmbCtqNDv-UpKeGpN4GaDEDdCZw&h=vWG06xhZi4_H5pmOCHQRF9DbDbSAfrjDyY8LQDpFBsQ response: body: - string: "{\n \"name\": \"d7ac72fa-0719-884e-98a3-755fbbf1859b\",\n \"status\": - \"InProgress\",\n \"startTime\": \"2023-09-15T07:53:19.6460463Z\",\n \"error\": + string: "{\n \"name\": \"a02af078-3546-4213-846a-cd530a38efe3\",\n \"status\": + \"InProgress\",\n \"startTime\": \"2023-12-22T10:13:08.9114111Z\",\n \"error\": {\n \"code\": \"NotLatestOperation\",\n \"message\": \"Cannot proceed with the operation. Either the operation has been preempted by another one, or the information needed by the operation failed to be saved (or hasn't been @@ -4241,19 +3909,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:55:23 GMT + - Fri, 22 Dec 2023 10:14:39 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -4273,15 +3935,15 @@ interactions: ParameterSetName: - --resource-group --name --http-proxy-config User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/fa72acd7-1907-4e88-98a3-755fbbf1859b?api-version=2016-03-30&t=2023-09-15T07%3A53%3A21&c=MIIHADCCBeigAwIBAgITfAOt9JON98CjYPdc9QAAA630kzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjMwODAzMDE0MDQxWhcNMjQwNzI4MDE0MDQxWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKipopHvwrhlzUyEj8K9SzP-KaE4JxtdBJXyUTvKIkSiKKo5ed4nZoS8_lU5seMfZyXygEoF28j21995G21eW8pECHtdlucHibosuXyLYB0uLggka2khgGgRwjX1fj-Y2QE-kRjtmHLfZd9dBTNi8RumIZ_O_0rK4iFT8JtFu3uo6ug9fiLfTQoRJGf_2H9oXDvu9pToaiwHOD9iIn7hyTp074WUEfQEGPxJcSOLBMSnRwwjd8oj1jEuxP8e78qyh5inv9jbf8KLHT76QL8_Ih-I2hUoqmtLbaTTBUk9FZi-19Fy4Hdt6NZwwmwWzATFSjhQrIKYhpwYtxlqFdMl4YECAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJJDo9KyjKG4aDx14yKEmJ1XRvp_un1CwNEW6KgHKM-Tm9vuaH6LGfmO_idOwmXeJmwf7s6SphXwqlPgz0TJ1AizxH1ZyMtKcWUuT_z5YimmsrZTYI3meB_pNAZ1A-RrE7qhjkQuY2jtehE5y100y_IBy_NXCUns26MYl8O86cFtcEAROXCHbDZ7ZeTsKyMsIvYpLpt5oxm3JjrSdn6__RTe91cku07ep_oU01UxjWPZO4ikfSlZX2VsLr7ve1KKttmvg0QUWscKlRMiX8wz5vFh8scKWq84WRESj2e89n6oNVvtb2Pxy8hu_9U2FgU1euzED-f7Y4omjwQ6gGGouEs&s=WJ95EaMXq_cyAnCZItVGjihpECiwIi3pmCuuZXQ7vnL2czT3US2KUQO5YuDH7-vgMcp4h8rs46lpzWc8mFW2to-TAUrdRdJenCk2kJC5BBQ9U4dRScnwmwyatkb-mWjqzDMi-QOhYcehoyLRLJtpucyfYdZynIAehiGMz67UAMSuKAxld8bAIkUGTDUo1K6_lOEjEgW4frSckk_u0rBEoPJx_9BlqsSAa3ASmlb0aTLYw_pRbd6Pe2FEumlh4hQH7ernWaJAROUJ96yQNoOpK9alT1glKHQsukQGFfM2-7DyCkHY_CmchEy-ZgzddhVB7QFoOzcb3DqN9My0MqJNCQ&h=GBPMqPT9qfymcYPw2KeVJDmOG0Jiy9XehFrelmPKk28 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.ContainerService/locations/westus2/operations/a02af078-3546-4213-846a-cd530a38efe3?api-version=2016-03-30&t=638388367891448400&c=MIIHHjCCBgagAwIBAgITOgI8r7Mf_biwA5ZedQAEAjyvszANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSU5GUkEgQ0EgMDEwHhcNMjMxMTAxMDk0NjIyWhcNMjQxMDI2MDk0NjIyWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMAibMEzENtdXD_9bnRFedXnHGYU2WVoSNV1T8o5EJpU1WPqMGp0-Te7u-pOZ18zukWdKhar_J0Q8cPTu3ERTvdGhQijltdB6E_J0wNDTwsi6NNDvaxwn4ZT8b2mCQybEZh8xYvc5QKAxQZxZUwJ7z2I6NhYBAwKOnexT6W3RpOHjR0DOunQlnnJBRaXTzoMRu9y_MMSS14WLxt9jMq2FxivtpAP4tYZNqSyp6tbuYoN1O-5fyph6Tbm3YEnesFPQdchCZcuvlSKfwrlNSNNioLx0atlHNVRkvgMQ_eJNVF3com1NrZ34BY9K_A-e0yc19LrOgBOup-IPk3J5HeNPPECAwEAAaOCBAswggQHMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHaBggrBgEFBQcBAQSCAcwwggHIMGYGCCsGAQUFBzAChlpodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMElORlJBJTIwQ0ElMjAwMSg0KS5jcnQwVgYIKwYBBQUHMAKGSmh0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JZMlBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3J0MFYGCCsGAQUFBzAChkpodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CWTJQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSU5GUkElMjBDQSUyMDAxKDQpLmNydDBWBggrBgEFBQcwAoZKaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMElORlJBJTIwQ0ElMjAwMSg0KS5jcnQwVgYIKwYBBQUHMAKGSmh0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JZMlBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3J0MB0GA1UdDgQWBBTS1aFccpK8162ob3hFc-fJo76DmDAOBgNVHQ8BAf8EBAMCBaAwggE1BgNVHR8EggEsMIIBKDCCASSgggEgoIIBHIZCaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JshjRodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJTkZSQSUyMENBJTIwMDEoNCkuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTl2Ztn_PjsurvwwKidileIud8-YzAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALszOCwOHYrcy035-scPtqcAdZCMfIz4dO7xVe3eBVGYgiK-GRi4yks9l8jjYRWIyK-0r4Ta4DZJNEWNwDPuS9lEb7gryEmzYpKkEN1GVpkZkIUpSbalDFucJDXz2ZHvczBlfLFKipvWHWkRSUYgu-rf-3_VpAbFQbRE_ZxpQSTp1GHDD2nrbXEzpU3O58ESJfL99UlgYO12XqeHlPy6k5_7ILX9UrUyuJwliRI56FbKhM-wCXSlPbwt-7U8FvsYyWiovfAU1KqfaDlNtt4u9ZYoKcVyjJjRkUm3ZpTfNoY9qTWSM0iEcRya-U2MImx3c0qvgUsWji-plEv_LL9WkKc&s=ELHSXdKkA_BrHnzqqs9dTfuA3-YPlDNCrDQ7qmMHU8dv6Mqth0Nyyt3NiabIyFd00JfjoYXMFghokVhJGFuHzy3tXo4y1-U6hdFellwLX0YHbJ6Aeq-JnkDFgQK2XEyj7kPpfR-zJgke1rxtGo5STjKWPdUP6ueXLiKPnITbJzoLIlxEud6YQMefrNwzt_8Risim3Ts5Y9c0YMKGnAvWDDpMMN82dkuNrwvT6wJBnGPPdouEMa-vesemcuivfR55AepK-YOHfqMr1R4xQckme2akbBC3-phtDisjHMP6opQ1Vuo2vJCzh4JaZbrnmbCtqNDv-UpKeGpN4GaDEDdCZw&h=vWG06xhZi4_H5pmOCHQRF9DbDbSAfrjDyY8LQDpFBsQ response: body: - string: "{\n \"name\": \"d7ac72fa-0719-884e-98a3-755fbbf1859b\",\n \"status\": - \"Succeeded\",\n \"startTime\": \"2023-09-15T07:53:19.6460463Z\",\n \"endTime\": - \"2023-09-15T07:55:40.5362424Z\",\n \"error\": {\n \"code\": \"NotLatestOperation\",\n + string: "{\n \"name\": \"a02af078-3546-4213-846a-cd530a38efe3\",\n \"status\": + \"Succeeded\",\n \"startTime\": \"2023-12-22T10:13:08.9114111Z\",\n \"endTime\": + \"2023-12-22T10:15:02.2198374Z\",\n \"error\": {\n \"code\": \"NotLatestOperation\",\n \ \"message\": \"Cannot proceed with the operation. Either the operation has been preempted by another one, or the information needed by the operation failed to be saved (or hasn't been saved yet).\"\n }\n }" @@ -4293,19 +3955,13 @@ interactions: content-type: - application/json date: - - Fri, 15 Sep 2023 07:55:54 GMT + - Fri, 22 Dec 2023 10:15:09 GMT expires: - '-1' pragma: - no-cache - server: - - nginx strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: @@ -4325,8 +3981,8 @@ interactions: ParameterSetName: - --resource-group --name --http-proxy-config User-Agent: - - AZURECLI/2.52.0 azsdk-python-azure-mgmt-containerservice/25.0.0b Python/3.8.10 - (Linux-6.2.0-1011-azure-x86_64-with-glibc2.29) + - AZURECLI/2.55.0 azsdk-python-azure-mgmt-containerservice/28.0.0b Python/3.8.10 + (Linux-6.2.0-1016-azure-x86_64-with-glibc2.29) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.ContainerService/managedClusters/cliakstest000002?api-version=2023-10-02-preview response: @@ -4335,33 +3991,33 @@ interactions: \ \"location\": \"westus2\",\n \"name\": \"cliakstest000002\",\n \"type\": \"Microsoft.ContainerService/ManagedClusters\",\n \"properties\": {\n \"provisioningState\": \"Succeeded\",\n \"powerState\": {\n \"code\": \"Running\"\n },\n \"kubernetesVersion\": - \"1.26.6\",\n \"currentKubernetesVersion\": \"1.26.6\",\n \"dnsPrefix\": - \"cliakstest-clitesttb6455nk2-79a739\",\n \"fqdn\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"azurePortalFQDN\": \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.portal.hcp.westus2.azmk8s.io\",\n + \"1.27\",\n \"currentKubernetesVersion\": \"1.27.7\",\n \"dnsPrefix\": + \"cliakstest-clitest72xlrhjcz-79a739\",\n \"fqdn\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"azurePortalFQDN\": \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.portal.hcp.westus2.azmk8s.io\",\n \ \"agentPoolProfiles\": [\n {\n \"name\": \"nodepool1\",\n \"count\": 3,\n \"vmSize\": \"Standard_DS2_v2\",\n \"osDiskSizeGB\": 128,\n \"osDiskType\": \"Managed\",\n \"kubeletDiskType\": \"OS\",\n \"workloadRuntime\": \"OCIContainer\",\n \"vnetSubnetID\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest000001/providers/Microsoft.Network/virtualNetworks/cliakstest000002/subnets/aks-subnet\",\n \ \"maxPods\": 110,\n \"type\": \"VirtualMachineScaleSets\",\n \"enableAutoScaling\": false,\n \"provisioningState\": \"Succeeded\",\n \"powerState\": {\n - \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.26.6\",\n - \ \"currentOrchestratorVersion\": \"1.26.6\",\n \"enableNodePublicIP\": + \ \"code\": \"Running\"\n },\n \"orchestratorVersion\": \"1.27.7\",\n + \ \"currentOrchestratorVersion\": \"1.27.7\",\n \"enableNodePublicIP\": false,\n \"enableCustomCATrust\": false,\n \"mode\": \"System\",\n \ \"enableEncryptionAtHost\": false,\n \"enableUltraSSD\": false,\n \ \"osType\": \"Linux\",\n \"osSKU\": \"Ubuntu\",\n \"nodeImageVersion\": - \"AKSUbuntu-2204gen2containerd-202308.22.0\",\n \"upgradeSettings\": {},\n + \"AKSUbuntu-2204gen2containerd-202312.06.0\",\n \"upgradeSettings\": {},\n \ \"enableFIPS\": false,\n \"networkProfile\": {},\n \"securityProfile\": {\n \"sshAccess\": \"LocalUser\"\n }\n }\n ],\n \"linuxProfile\": {\n \"adminUsername\": \"azureuser\",\n \"ssh\": {\n \"publicKeys\": - [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoxQy8U1ArW8QpfBE5S5k6L1bS9zeHm2SJYVzQCAL2ffeY8YpjyiqFpVbnPX7tgd3E2XFMg28mI1tAEQj0QgwCXSMVNE+0El8FpWoYVJHBGquD/UIXvhPDUaspk0uwPz5sp8htkSRph134csoJYoXnI5Vq0vspf/ARYOPfoSMHM4oqh+30uk5rh/QgE0r0JWZxC33xl5Aw0mmPmC7fZob++LIOyH9cHLUlc43Xe5LNpeEty3purz0MtSaBtL5tgYxrTyRT/lhfJLIVFl7fToKQZhye/5ZYa5CNiKZb6oMEIekb/E/KaFEkd721+y9egIlW7nuNiqW+RCykA6gomy3r + [\n {\n \"keyData\": \"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/314l8NE/rEfJ10S8oDI4rM7uTS3rCTxNGL5cHu0oPScMbSei3ynXjnKX0wRvuc/BSAzgkvkP4HYApcFus3wzidm6g5BSRdH0rkPCH52XTNZd1V3xRBWGf3z19Av0FC1c9RSePHy44CsvaT5EJIGKqc06Ayd69eRSlndt0aH2LSxqo2nTKxXzxeiZfowe7g24v69krskFOE9sNt+g0Pnyv50zP/VByG/Wt/iCNIdtlghVZa7DFyzgHFvnk2e4LOSQTrONhK3WVSBY58Qr1uHPNljumfhwdwxP73jiweozPSjl05IOfzmRpxcbmp/UYF6U4sh7l9+9iY4LzsE8ftq9 azcli_aks_live_test@example.com\\n\"\n }\n ]\n }\n },\n \"servicePrincipalProfile\": {\n \"clientId\":\"00000000-0000-0000-0000-000000000001\"\n },\n \"nodeResourceGroup\": \"MC_clitest000001_cliakstest000002_westus2\",\n \"enableRBAC\": true,\n \ \"enablePodSecurityPolicy\": false,\n \"supportPlan\": \"KubernetesOfficial\",\n - \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"loadBalancerSku\": - \"Standard\",\n \"loadBalancerProfile\": {\n \"managedOutboundIPs\": - {\n \"count\": 1\n },\n \"effectiveOutboundIPs\": [\n {\n - \ \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/9692a162-e2b3-40cb-96db-274e14be7628\"\n + \ \"networkProfile\": {\n \"networkPlugin\": \"kubenet\",\n \"networkPolicy\": + \"none\",\n \"loadBalancerSku\": \"Standard\",\n \"loadBalancerProfile\": + {\n \"managedOutboundIPs\": {\n \"count\": 1\n },\n \"effectiveOutboundIPs\": + [\n {\n \"id\": \"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MC_clitest000001_cliakstest000002_westus2/providers/Microsoft.Network/publicIPAddresses/64d152a3-6c7c-4082-9bee-dac77d37ee3a\"\n \ }\n ],\n \"backendPoolType\": \"nodeIPConfiguration\"\n },\n \ \"podCidr\": \"10.244.0.0/16\",\n \"serviceCidr\": \"10.0.0.0/16\",\n \ \"dnsServiceIP\": \"10.0.0.10\",\n \"outboundType\": \"loadBalancer\",\n @@ -4373,42 +4029,39 @@ interactions: \ }\n },\n \"autoUpgradeProfile\": {\n \"nodeOSUpgradeChannel\": \"NodeImage\"\n },\n \"disableLocalAccounts\": false,\n \"httpProxyConfig\": {\n \"httpProxy\": \"http://cli-proxy-vm:3128/\",\n \"httpsProxy\": - \"https://cli-proxy-vm:3129/\",\n \"noProxy\": [\n \"localhost\",\n - \ \"127.0.0.1\",\n \"168.63.129.16\",\n \"169.254.169.254\",\n - \ \"konnectivity\",\n \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n \"10.0.0.0/16\"\n ],\n - \ \"effectiveNoProxy\": [\n \"localhost\",\n \"127.0.0.1\",\n \"168.63.129.16\",\n - \ \"169.254.169.254\",\n \"konnectivity\",\n \"cliakstest-clitesttb6455nk2-79a739-8ywlk5ru.hcp.westus2.azmk8s.io\",\n - \ \"10.42.0.0/16\",\n \"10.244.0.0/16\",\n \"10.0.0.0/16\"\n ],\n - \ \"trustedCa\": \"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUZERENDQXZTZ0F3SUJBZ0lVQlJ3cGs1eTh5ckdrNmtYTjhkSHlMRUNvaHBrd0RRWUpLb1pJaHZjTkFRRUwKQlFBd0VqRVFNQTRHQTFVRUF3d0habTl2TFdKaGNqQWVGdzB5TVRFd01UTXdNekU1TlRoYUZ3MHpNVEV3TVRFdwpNekU1TlRoYU1CSXhFREFPQmdOVkJBTU1CMlp2YnkxaVlYSXdnZ0lpTUEwR0NTcUdTSWIzRFFFQkFRVUFBNElDCkR3QXdnZ0lLQW9JQ0FRRFcwRE9sVC9yci9xUEZIUU9lNndBNDkyVGh3VWxZaDhCQkszTW9VWVZLNjEvL2xXekEKeFkrYzlmazlvckUrZXhMSVpwdUg1VnNZR21MNUFyc05sVmNBMkU4MWgwSlBPYUo1eEpiZG40YldpZG9vdXRVVwpXeDNhYUJLSEt0RWdZbUNmTjliWXlZMlNWRWQvNS9HeGh0akVabHJ1aEtRdkZVa3hwR0xKK1JRQ25oNklZakQwCnNpQ0YyTjJhVUJ4RE5KaUdmeHlHSVIrY2p4Vlcrd01md05CQ0l6QVkxMnY4WmpzUXdmUWlhOE5oWEx3M0tuRm0KdzUrcHN2bU1HL1FFUUtZMXNOTnk2dS9DZkI3cmIxQ0EwcjdNNnFsNFMrWHJjZUVRcXpDUWR6NWJueGNYbmFkbwp5MDlhdm5OSGRqbmpvcHNPSkxhd2hzb3RGNWFrL1FLdjYzdU9yVFFlOHlPSWlCZ3JSUzdwejcxbVlhRGNMcXFtCmtmdDVLYnFnMHNZYmo0M09LSm5aZ3crTUtackhoSFJKNi9BcWxOclZML3pFUytHU0ozQ1lSaE5nYXdDQ0Nqd1gKanZYZnkycWFEV2NQbWZaSWVVMVNzdE05THBVRWFQNjJzUVNmb3NEdnZFbUFyUVgwcmd1WGhvZ3pRUFdGWVlEKwo4SUNFYkNFc21hVnN3MzhVUzgzbFlGVCtyTHh3cm5UK1JXSUZ2WFRXbHhCNm5JeWpsOXBhNzlkdU5ocjJxN2RzCjVOU3ZWWHg5UGNqVTQ2VUZ6QnVTbUl0Q0M0Y1NadFRWc3l6ZnpMd2hKbGlqV0czTkp5TnpHUkZQcUpQdTNJUzEKZ3VtKytqdWx4bXZNWm1vM1RqSE5JRm90a0kyd3d3ZUtIcWpYcW9STmwvVnZobE5CaXZRR2gxeGovd0lEQVFBQgpvMW93V0RBU0JnTlZIUkVFQ3pBSmdnZG1iMjh0WW1GeU1CSUdBMVVkRXdFQi93UUlNQVlCQWY4Q0FRQXdEd1lEClZSMFBBUUgvQkFVREF3Zm5nREFkQmdOVkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0RRWUoKS29aSWh2Y05BUUVMQlFBRGdnSUJBTDF3RlpTdUw4NTM3aHpUTXhSUWJjcWdEU2F4RUd0ZDJaNTVCcnVWQVloagpxQjR6STd1UVZ2SkNpeXdmQm5BNnZmejh2UDBzdGJJbkVtajh1dS9CSS81NzZqR0tWUWRQSDhqMnQvN1NQWjFKClhBWk9wc1hoVll2RmtpQlhVeW1RMnAvRjFqb2ZRRE1JQ0htdHhRUSthakJQNjBpcnFnVnpsRi95NlQySUgzOHYKbGordndIam52WW5vVmhGNEY0TlE5amp6S3Y1NUhVTk0xUEJKZkFaOTJqeXovczdPMmN2cjhNWlNkT2s5QVk1RQp5RXRlQjBTSjdLS0tUZklBVmVMQzdrRnBHR3FsRkRBNzhPSS9YakNZViswRjk4MHdNOVkxTEVUa3ZMamVSMEFyCnVzZDNIS1Vtd2EwTVEwUTNZNGxma0ZtNjJTclhvcjJURC9WZHpFZWNOTnVmV1VJTVNuaEJDNTVHWjBOTVYvR0QKRXhGZTVWQkhUZEZVNlIwb3JCOVFjVll1Mzk0MEt5NXhkbHNaUHZlMmRJNS9WOXhzY0Zad3cxWWs4K21RK3NVeQp2UVBoL2ZmK0tTQjdVVkdvTVNXUlg3YjFFMGVzZSs4QzZlaVV2OXpDR0VRbkVCcnFIQWxSUDJ2ZzQ0bXFJSnRzCjN2NUt1NW0ySmJoeWNsQVR3VUNQZkN3a2tLRTg0MzZGRitDK0ZUVTJ1OWVpL2t5QTAxYi9zRFl2cWdsS2FWK3MKbEVHRkhjd05Ea2VrS1BFUEZxNkpnZ3R0WlNidE5SMnFadzl3cExIbDVuVlVXdnBGa2hvcW1KVkphK0VBSTQ1LwpqRkh4VG9PMHp1NlBxc1p5SnM2TC84Z3BhbTcwMDV6b0VETVRjcFltMlduMFBKcEg3NE9zUHJVRDVJWVA5ZEt5Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\"\n + \"https://cli-proxy-vm:3129/\",\n \"noProxy\": [\n \"169.254.169.254\",\n + \ \"10.244.0.0/16\",\n \"konnectivity\",\n \"10.0.0.0/16\",\n \"127.0.0.1\",\n + \ \"168.63.129.16\",\n \"10.42.0.0/16\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"localhost\"\n ],\n \"effectiveNoProxy\": [\n \"169.254.169.254\",\n + \ \"10.244.0.0/16\",\n \"konnectivity\",\n \"10.0.0.0/16\",\n \"127.0.0.1\",\n + \ \"168.63.129.16\",\n \"10.42.0.0/16\",\n \"cliakstest-clitest72xlrhjcz-79a739-rwy9orqh.hcp.westus2.azmk8s.io\",\n + \ \"localhost\"\n ],\n \"trustedCa\": \"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUZERENDQXZTZ0F3SUJBZ0lVQlJ3cGs1eTh5ckdrNmtYTjhkSHlMRUNvaHBrd0RRWUpLb1pJaHZjTkFRRUwKQlFBd0VqRVFNQTRHQTFVRUF3d0habTl2TFdKaGNqQWVGdzB5TVRFd01UTXdNekU1TlRoYUZ3MHpNVEV3TVRFdwpNekU1TlRoYU1CSXhFREFPQmdOVkJBTU1CMlp2YnkxaVlYSXdnZ0lpTUEwR0NTcUdTSWIzRFFFQkFRVUFBNElDCkR3QXdnZ0lLQW9JQ0FRRFcwRE9sVC9yci9xUEZIUU9lNndBNDkyVGh3VWxZaDhCQkszTW9VWVZLNjEvL2xXekEKeFkrYzlmazlvckUrZXhMSVpwdUg1VnNZR21MNUFyc05sVmNBMkU4MWgwSlBPYUo1eEpiZG40YldpZG9vdXRVVwpXeDNhYUJLSEt0RWdZbUNmTjliWXlZMlNWRWQvNS9HeGh0akVabHJ1aEtRdkZVa3hwR0xKK1JRQ25oNklZakQwCnNpQ0YyTjJhVUJ4RE5KaUdmeHlHSVIrY2p4Vlcrd01md05CQ0l6QVkxMnY4WmpzUXdmUWlhOE5oWEx3M0tuRm0KdzUrcHN2bU1HL1FFUUtZMXNOTnk2dS9DZkI3cmIxQ0EwcjdNNnFsNFMrWHJjZUVRcXpDUWR6NWJueGNYbmFkbwp5MDlhdm5OSGRqbmpvcHNPSkxhd2hzb3RGNWFrL1FLdjYzdU9yVFFlOHlPSWlCZ3JSUzdwejcxbVlhRGNMcXFtCmtmdDVLYnFnMHNZYmo0M09LSm5aZ3crTUtackhoSFJKNi9BcWxOclZML3pFUytHU0ozQ1lSaE5nYXdDQ0Nqd1gKanZYZnkycWFEV2NQbWZaSWVVMVNzdE05THBVRWFQNjJzUVNmb3NEdnZFbUFyUVgwcmd1WGhvZ3pRUFdGWVlEKwo4SUNFYkNFc21hVnN3MzhVUzgzbFlGVCtyTHh3cm5UK1JXSUZ2WFRXbHhCNm5JeWpsOXBhNzlkdU5ocjJxN2RzCjVOU3ZWWHg5UGNqVTQ2VUZ6QnVTbUl0Q0M0Y1NadFRWc3l6ZnpMd2hKbGlqV0czTkp5TnpHUkZQcUpQdTNJUzEKZ3VtKytqdWx4bXZNWm1vM1RqSE5JRm90a0kyd3d3ZUtIcWpYcW9STmwvVnZobE5CaXZRR2gxeGovd0lEQVFBQgpvMW93V0RBU0JnTlZIUkVFQ3pBSmdnZG1iMjh0WW1GeU1CSUdBMVVkRXdFQi93UUlNQVlCQWY4Q0FRQXdEd1lEClZSMFBBUUgvQkFVREF3Zm5nREFkQmdOVkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0RRWUoKS29aSWh2Y05BUUVMQlFBRGdnSUJBTDF3RlpTdUw4NTM3aHpUTXhSUWJjcWdEU2F4RUd0ZDJaNTVCcnVWQVloagpxQjR6STd1UVZ2SkNpeXdmQm5BNnZmejh2UDBzdGJJbkVtajh1dS9CSS81NzZqR0tWUWRQSDhqMnQvN1NQWjFKClhBWk9wc1hoVll2RmtpQlhVeW1RMnAvRjFqb2ZRRE1JQ0htdHhRUSthakJQNjBpcnFnVnpsRi95NlQySUgzOHYKbGordndIam52WW5vVmhGNEY0TlE5amp6S3Y1NUhVTk0xUEJKZkFaOTJqeXovczdPMmN2cjhNWlNkT2s5QVk1RQp5RXRlQjBTSjdLS0tUZklBVmVMQzdrRnBHR3FsRkRBNzhPSS9YakNZViswRjk4MHdNOVkxTEVUa3ZMamVSMEFyCnVzZDNIS1Vtd2EwTVEwUTNZNGxma0ZtNjJTclhvcjJURC9WZHpFZWNOTnVmV1VJTVNuaEJDNTVHWjBOTVYvR0QKRXhGZTVWQkhUZEZVNlIwb3JCOVFjVll1Mzk0MEt5NXhkbHNaUHZlMmRJNS9WOXhzY0Zad3cxWWs4K21RK3NVeQp2UVBoL2ZmK0tTQjdVVkdvTVNXUlg3YjFFMGVzZSs4QzZlaVV2OXpDR0VRbkVCcnFIQWxSUDJ2ZzQ0bXFJSnRzCjN2NUt1NW0ySmJoeWNsQVR3VUNQZkN3a2tLRTg0MzZGRitDK0ZUVTJ1OWVpL2t5QTAxYi9zRFl2cWdsS2FWK3MKbEVHRkhjd05Ea2VrS1BFUEZxNkpnZ3R0WlNidE5SMnFadzl3cExIbDVuVlVXdnBGa2hvcW1KVkphK0VBSTQ1LwpqRkh4VG9PMHp1NlBxc1p5SnM2TC84Z3BhbTcwMDV6b0VETVRjcFltMlduMFBKcEg3NE9zUHJVRDVJWVA5ZEt5Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\"\n \ },\n \"securityProfile\": {},\n \"storageProfile\": {\n \"diskCSIDriver\": {\n \"enabled\": true,\n \"version\": \"v1\"\n },\n \"fileCSIDriver\": {\n \"enabled\": true\n },\n \"snapshotController\": {\n \"enabled\": true\n }\n },\n \"oidcIssuerProfile\": {\n \"enabled\": false\n \ },\n \"workloadAutoScalerProfile\": {},\n \"metricsProfile\": {\n \"costAnalysis\": - {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"65040c18c954fd00011e5d1d\"\n - \ },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n + {\n \"enabled\": false\n }\n },\n \"resourceUID\": \"6585601f8ac0aa0001ae7fde\",\n + \ \"controlPlanePluginProfiles\": {\n \"karpenter\": {\n \"enableV2\": + true\n }\n },\n \"nodeProvisioningProfile\": {\n \"mode\": \"Manual\"\n + \ }\n },\n \"identity\": {\n \"type\": \"SystemAssigned\",\n \"principalId\":\"00000000-0000-0000-0000-000000000001\",\n \ \"tenantId\": \"72f988bf-86f1-41af-91ab-2d7cd011db47\"\n },\n \"sku\": {\n \"name\": \"Base\",\n \"tier\": \"Free\"\n }\n }" headers: cache-control: - no-cache content-length: - - '7667' + - '7841' content-type: - application/json date: - - Fri, 15 Sep 2023 07:55:55 GMT + - Fri, 22 Dec 2023 10:15:10 GMT expires: - '-1' pragma: - no-cache strict-transport-security: - max-age=31536000; includeSubDomains - transfer-encoding: - - chunked - vary: - - Accept-Encoding x-content-type-options: - nosniff status: diff --git a/src/aks-preview/azext_aks_preview/tests/latest/test_agentpool_decorator.py b/src/aks-preview/azext_aks_preview/tests/latest/test_agentpool_decorator.py index 471390b86ed..401769ee56c 100644 --- a/src/aks-preview/azext_aks_preview/tests/latest/test_agentpool_decorator.py +++ b/src/aks-preview/azext_aks_preview/tests/latest/test_agentpool_decorator.py @@ -27,15 +27,27 @@ DecoratorMode, ) from azure.cli.command_modules.acs.agentpool_decorator import AKSAgentPoolParamDict -from azure.cli.command_modules.acs.tests.latest.mocks import MockCLI, MockClient, MockCmd -from azure.cli.core.azclierror import CLIInternalError, InvalidArgumentValueError, MutuallyExclusiveArgumentError +from azure.cli.command_modules.acs.tests.latest.mocks import ( + MockCLI, + MockClient, + MockCmd, +) +from azure.cli.core.azclierror import ( + CLIInternalError, + InvalidArgumentValueError, + MutuallyExclusiveArgumentError, +) class AKSPreviewAgentPoolContextCommonTestCase(unittest.TestCase): def _remove_defaults_in_agentpool(self, agentpool): self.defaults_in_agentpool = {} for attr_name, attr_value in vars(agentpool).items(): - if not attr_name.startswith("_") and attr_name != "name" and attr_value is not None: + if ( + not attr_name.startswith("_") + and attr_name != "name" + and attr_value is not None + ): self.defaults_in_agentpool[attr_name] = attr_value setattr(agentpool, attr_name, None) return agentpool @@ -47,7 +59,11 @@ def _restore_defaults_in_agentpool(self, agentpool): return agentpool def create_initialized_agentpool_instance( - self, nodepool_name="nodepool1", remove_defaults=True, restore_defaults=True, **kwargs + self, + nodepool_name="nodepool1", + remove_defaults=True, + restore_defaults=True, + **kwargs ): """Helper function to create a properly initialized agentpool instance. @@ -91,7 +107,9 @@ def common_get_zones(self): # custom value ctx_2 = AKSPreviewAgentPoolContext( self.cmd, - AKSAgentPoolParamDict({"zones": "test_zones", "node_zones": "test_node_zones"}), + AKSAgentPoolParamDict( + {"zones": "test_zones", "node_zones": "test_node_zones"} + ), self.models, DecoratorMode.CREATE, self.agentpool_decorator_mode, @@ -124,14 +142,18 @@ def common_get_message_of_the_day(self): self.agentpool_decorator_mode, ) self.assertEqual(ctx_1.get_message_of_the_day(), None) - agentpool_1 = self.create_initialized_agentpool_instance(message_of_the_day="test_message_of_the_day") + agentpool_1 = self.create_initialized_agentpool_instance( + message_of_the_day="test_message_of_the_day" + ) ctx_1.attach_agentpool(agentpool_1) self.assertEqual(ctx_1.get_message_of_the_day(), "test_message_of_the_day") # custom ctx_2 = AKSPreviewAgentPoolContext( self.cmd, - AKSAgentPoolParamDict({"message_of_the_day": get_test_data_file_path("motd.txt")}), + AKSAgentPoolParamDict( + {"message_of_the_day": get_test_data_file_path("motd.txt")} + ), self.models, DecoratorMode.CREATE, self.agentpool_decorator_mode, @@ -162,7 +184,9 @@ def common_get_gpu_instance_profile(self): self.agentpool_decorator_mode, ) self.assertEqual(ctx_1.get_gpu_instance_profile(), None) - agentpool_1 = self.create_initialized_agentpool_instance(gpu_instance_profile="test_gpu_instance_profile") + agentpool_1 = self.create_initialized_agentpool_instance( + gpu_instance_profile="test_gpu_instance_profile" + ) ctx_1.attach_agentpool(agentpool_1) self.assertEqual(ctx_1.get_gpu_instance_profile(), "test_gpu_instance_profile") @@ -175,8 +199,12 @@ def common_get_workload_runtime(self): DecoratorMode.CREATE, self.agentpool_decorator_mode, ) - self.assertEqual(ctx_1.get_workload_runtime(), CONST_WORKLOAD_RUNTIME_OCI_CONTAINER) - agentpool_1 = self.create_initialized_agentpool_instance(workload_runtime="test_workload_runtime") + self.assertEqual( + ctx_1.get_workload_runtime(), CONST_WORKLOAD_RUNTIME_OCI_CONTAINER + ) + agentpool_1 = self.create_initialized_agentpool_instance( + workload_runtime="test_workload_runtime" + ) ctx_1.attach_agentpool(agentpool_1) self.assertEqual(ctx_1.get_workload_runtime(), "test_workload_runtime") @@ -190,7 +218,9 @@ def common_get_enable_custom_ca_trust(self): self.agentpool_decorator_mode, ) self.assertEqual(ctx_1.get_enable_custom_ca_trust(), True) - agentpool_1 = self.create_initialized_agentpool_instance(enable_custom_ca_trust=False) + agentpool_1 = self.create_initialized_agentpool_instance( + enable_custom_ca_trust=False + ) ctx_1.attach_agentpool(agentpool_1) self.assertEqual(ctx_1.get_enable_custom_ca_trust(), False) @@ -203,14 +233,18 @@ def common_get_enable_custom_ca_trust(self): self.agentpool_decorator_mode, ) self.assertEqual(ctx_2.get_enable_custom_ca_trust(), True) - agentpool_2 = self.create_initialized_agentpool_instance(enable_custom_ca_trust=False) + agentpool_2 = self.create_initialized_agentpool_instance( + enable_custom_ca_trust=False + ) ctx_2.attach_agentpool(agentpool_2) self.assertEqual(ctx_2.get_enable_custom_ca_trust(), True) # custom ctx_3 = AKSPreviewAgentPoolContext( self.cmd, - AKSAgentPoolParamDict({"enable_custom_ca_trust": True, "disable_custom_ca_trust": True}), + AKSAgentPoolParamDict( + {"enable_custom_ca_trust": True, "disable_custom_ca_trust": True} + ), self.models, DecoratorMode.UPDATE, self.agentpool_decorator_mode, @@ -228,14 +262,18 @@ def common_get_disable_custom_ca_trust(self): self.agentpool_decorator_mode, ) self.assertEqual(ctx_1.get_disable_custom_ca_trust(), True) - agentpool_1 = self.create_initialized_agentpool_instance(enable_custom_ca_trust=True) + agentpool_1 = self.create_initialized_agentpool_instance( + enable_custom_ca_trust=True + ) ctx_1.attach_agentpool(agentpool_1) self.assertEqual(ctx_1.get_disable_custom_ca_trust(), True) # custom ctx_2 = AKSPreviewAgentPoolContext( self.cmd, - AKSAgentPoolParamDict({"enable_custom_ca_trust": True, "disable_custom_ca_trust": True}), + AKSAgentPoolParamDict( + {"enable_custom_ca_trust": True, "disable_custom_ca_trust": True} + ), self.models, DecoratorMode.UPDATE, self.agentpool_decorator_mode, @@ -355,7 +393,10 @@ def common_get_os_sku(self): ctx_5.attach_agentpool(agentpool_5) self.assertEqual(ctx_5.get_os_sku(), None) -class AKSPreviewAgentPoolContextStandaloneModeTestCase(AKSPreviewAgentPoolContextCommonTestCase): + +class AKSPreviewAgentPoolContextStandaloneModeTestCase( + AKSPreviewAgentPoolContextCommonTestCase +): def setUp(self): # manually register CUSTOM_MGMT_AKS_PREVIEW register_aks_preview_resource_type() @@ -363,7 +404,9 @@ def setUp(self): self.cmd = MockCmd(self.cli_ctx) self.resource_type = CUSTOM_MGMT_AKS_PREVIEW self.agentpool_decorator_mode = AgentPoolDecoratorMode.STANDALONE - self.models = AKSPreviewAgentPoolModels(self.cmd, self.resource_type, self.agentpool_decorator_mode) + self.models = AKSPreviewAgentPoolModels( + self.cmd, self.resource_type, self.agentpool_decorator_mode + ) def test_get_zones(self): self.common_get_zones() @@ -392,7 +435,10 @@ def test_get_enable_artifact_streaming(self): def test_get_os_sku(self): self.common_get_os_sku() -class AKSPreviewAgentPoolContextManagedClusterModeTestCase(AKSPreviewAgentPoolContextCommonTestCase): + +class AKSPreviewAgentPoolContextManagedClusterModeTestCase( + AKSPreviewAgentPoolContextCommonTestCase +): def setUp(self): # manually register CUSTOM_MGMT_AKS_PREVIEW register_aks_preview_resource_type() @@ -400,7 +446,9 @@ def setUp(self): self.cmd = MockCmd(self.cli_ctx) self.resource_type = CUSTOM_MGMT_AKS_PREVIEW self.agentpool_decorator_mode = AgentPoolDecoratorMode.MANAGED_CLUSTER - self.models = AKSPreviewAgentPoolModels(self.cmd, self.resource_type, self.agentpool_decorator_mode) + self.models = AKSPreviewAgentPoolModels( + self.cmd, self.resource_type, self.agentpool_decorator_mode + ) def test_get_zones(self): self.common_get_zones() @@ -429,11 +477,16 @@ def test_get_enable_artifact_streaming(self): def test_get_os_sku(self): self.common_get_os_sku() + class AKSPreviewAgentPoolAddDecoratorCommonTestCase(unittest.TestCase): def _remove_defaults_in_agentpool(self, agentpool): self.defaults_in_agentpool = {} for attr_name, attr_value in vars(agentpool).items(): - if not attr_name.startswith("_") and attr_name != "name" and attr_value is not None: + if ( + not attr_name.startswith("_") + and attr_name != "name" + and attr_value is not None + ): self.defaults_in_agentpool[attr_name] = attr_value setattr(agentpool, attr_name, None) return agentpool @@ -445,7 +498,11 @@ def _restore_defaults_in_agentpool(self, agentpool): return agentpool def create_initialized_agentpool_instance( - self, nodepool_name="nodepool1", remove_defaults=True, restore_defaults=True, **kwargs + self, + nodepool_name="nodepool1", + remove_defaults=True, + restore_defaults=True, + **kwargs ): """Helper function to create a properly initialized agentpool instance. @@ -514,7 +571,10 @@ def common_set_up_gpu_propertes(self): dec_1 = AKSPreviewAgentPoolAddDecorator( self.cmd, self.client, - {"gpu_instance_profile": "test_gpu_instance_profile", "workload_runtime": "test_workload_runtime"}, + { + "gpu_instance_profile": "test_gpu_instance_profile", + "workload_runtime": "test_workload_runtime", + }, self.resource_type, self.agentpool_decorator_mode, ) @@ -573,7 +633,10 @@ def common_set_up_artifact_streaming(self): ) self.assertEqual(dec_agentpool_1, ground_truth_agentpool_1) -class AKSPreviewAgentPoolAddDecoratorStandaloneModeTestCase(AKSPreviewAgentPoolAddDecoratorCommonTestCase): + +class AKSPreviewAgentPoolAddDecoratorStandaloneModeTestCase( + AKSPreviewAgentPoolAddDecoratorCommonTestCase +): def setUp(self): # manually register CUSTOM_MGMT_AKS_PREVIEW register_aks_preview_resource_type() @@ -581,7 +644,9 @@ def setUp(self): self.cmd = MockCmd(self.cli_ctx) self.resource_type = CUSTOM_MGMT_AKS_PREVIEW self.agentpool_decorator_mode = AgentPoolDecoratorMode.STANDALONE - self.models = AKSPreviewAgentPoolModels(self.cmd, self.resource_type, self.agentpool_decorator_mode) + self.models = AKSPreviewAgentPoolModels( + self.cmd, self.resource_type, self.agentpool_decorator_mode + ) self.client = MockClient() def test_set_up_preview_vm_properties(self): @@ -669,7 +734,9 @@ def test_construct_agentpool_profile_preview(self): dec_1.context.raw_param.print_usage_statistics() -class AKSPreviewAgentPoolAddDecoratorManagedClusterModeTestCase(AKSPreviewAgentPoolAddDecoratorCommonTestCase): +class AKSPreviewAgentPoolAddDecoratorManagedClusterModeTestCase( + AKSPreviewAgentPoolAddDecoratorCommonTestCase +): def setUp(self): # manually register CUSTOM_MGMT_AKS_PREVIEW register_aks_preview_resource_type() @@ -677,7 +744,9 @@ def setUp(self): self.cmd = MockCmd(self.cli_ctx) self.resource_type = CUSTOM_MGMT_AKS_PREVIEW self.agentpool_decorator_mode = AgentPoolDecoratorMode.MANAGED_CLUSTER - self.models = AKSPreviewAgentPoolModels(self.cmd, self.resource_type, self.agentpool_decorator_mode) + self.models = AKSPreviewAgentPoolModels( + self.cmd, self.resource_type, self.agentpool_decorator_mode + ) self.client = MockClient() def test_set_up_preview_vm_properties(self): @@ -769,7 +838,11 @@ class AKSPreviewAgentPoolUpdateDecoratorCommonTestCase(unittest.TestCase): def _remove_defaults_in_agentpool(self, agentpool): self.defaults_in_agentpool = {} for attr_name, attr_value in vars(agentpool).items(): - if not attr_name.startswith("_") and attr_name != "name" and attr_value is not None: + if ( + not attr_name.startswith("_") + and attr_name != "name" + and attr_value is not None + ): self.defaults_in_agentpool[attr_name] = attr_value setattr(agentpool, attr_name, None) return agentpool @@ -781,7 +854,11 @@ def _restore_defaults_in_agentpool(self, agentpool): return agentpool def create_initialized_agentpool_instance( - self, nodepool_name="nodepool1", remove_defaults=True, restore_defaults=True, **kwargs + self, + nodepool_name="nodepool1", + remove_defaults=True, + restore_defaults=True, + **kwargs ): """Helper function to create a properly initialized agentpool instance. @@ -893,7 +970,9 @@ def common_update_artifact_streaming(self): self.assertEqual(dec_agentpool_2, grond_truth_agentpool_2) -class AKSPreviewAgentPoolUpdateDecoratorStandaloneModeTestCase(AKSPreviewAgentPoolUpdateDecoratorCommonTestCase): +class AKSPreviewAgentPoolUpdateDecoratorStandaloneModeTestCase( + AKSPreviewAgentPoolUpdateDecoratorCommonTestCase +): def setUp(self): # manually register CUSTOM_MGMT_AKS_PREVIEW register_aks_preview_resource_type() @@ -901,7 +980,9 @@ def setUp(self): self.cmd = MockCmd(self.cli_ctx) self.resource_type = CUSTOM_MGMT_AKS_PREVIEW self.agentpool_decorator_mode = AgentPoolDecoratorMode.STANDALONE - self.models = AKSPreviewAgentPoolModels(self.cmd, self.resource_type, self.agentpool_decorator_mode) + self.models = AKSPreviewAgentPoolModels( + self.cmd, self.resource_type, self.agentpool_decorator_mode + ) self.client = MockClient() def test_update_custom_ca_trust(self): @@ -948,7 +1029,9 @@ def test_update_agentpool_profile_preview(self): self.agentpool_decorator_mode, ) self.client.get = Mock( - return_value=self.create_initialized_agentpool_instance(nodepool_name="test_nodepool_name") + return_value=self.create_initialized_agentpool_instance( + nodepool_name="test_nodepool_name" + ) ) dec_agentpool_1 = dec_1.update_agentpool_profile_preview() ground_truth_agentpool_1 = self.create_initialized_agentpool_instance( @@ -959,7 +1042,9 @@ def test_update_agentpool_profile_preview(self): dec_1.context.raw_param.print_usage_statistics() -class AKSPreviewAgentPoolUpdateDecoratorManagedClusterModeTestCase(AKSPreviewAgentPoolUpdateDecoratorCommonTestCase): +class AKSPreviewAgentPoolUpdateDecoratorManagedClusterModeTestCase( + AKSPreviewAgentPoolUpdateDecoratorCommonTestCase +): def setUp(self): # manually register CUSTOM_MGMT_AKS_PREVIEW register_aks_preview_resource_type() @@ -967,7 +1052,9 @@ def setUp(self): self.cmd = MockCmd(self.cli_ctx) self.resource_type = CUSTOM_MGMT_AKS_PREVIEW self.agentpool_decorator_mode = AgentPoolDecoratorMode.MANAGED_CLUSTER - self.models = AKSPreviewAgentPoolModels(self.cmd, self.resource_type, self.agentpool_decorator_mode) + self.models = AKSPreviewAgentPoolModels( + self.cmd, self.resource_type, self.agentpool_decorator_mode + ) self.client = MockClient() def test_update_custom_ca_trust(self): diff --git a/src/aks-preview/azext_aks_preview/tests/latest/test_aks_commands.py b/src/aks-preview/azext_aks_preview/tests/latest/test_aks_commands.py index d614fbd33ce..a81c18c19b1 100644 --- a/src/aks-preview/azext_aks_preview/tests/latest/test_aks_commands.py +++ b/src/aks-preview/azext_aks_preview/tests/latest/test_aks_commands.py @@ -8,28 +8,23 @@ import subprocess import tempfile import time -import unittest +from azext_aks_preview._consts import CONST_CUSTOM_CA_TEST_CERT +from azext_aks_preview._format import aks_machine_list_table_format from azext_aks_preview.tests.latest.custom_preparers import ( AKSCustomResourceGroupPreparer, ) -from azext_aks_preview._format import aks_machine_list_table_format - -from azext_aks_preview._consts import ( - CONST_CUSTOM_CA_TEST_CERT, -) from azext_aks_preview.tests.latest.recording_processors import KeyReplacer from azure.cli.command_modules.acs._format import version_to_tuple -from azure.cli.core.azclierror import AzureInternalError, BadRequestError, ClientRequestError +from azure.cli.core.azclierror import ClientRequestError from azure.cli.testsdk import CliTestError, ScenarioTest, live_only from azure.cli.testsdk.scenario_tests import AllowLargeResponse -from azure.core.exceptions import HttpResponseError from knack.util import CLIError def _get_test_data_file(filename): curr_dir = os.path.dirname(os.path.realpath(__file__)) - return os.path.join(curr_dir, 'data', filename) + return os.path.join(curr_dir, "data", filename) class AzureKubernetesServiceScenarioTest(ScenarioTest): @@ -41,19 +36,27 @@ def __init__(self, method_name): def _get_versions(self, location): """Return the previous and current Kubernetes minor release versions, such as ("1.11.6", "1.12.4").""" versions = self.cmd( - "az aks get-versions -l {} --query 'values[*].patchVersions.keys(@)[]'".format(location)).get_output_in_json() + "az aks get-versions -l {} --query 'values[*].patchVersions.keys(@)[]'".format( + location + ) + ).get_output_in_json() # sort by semantic version, from newest to oldest versions = sorted(versions, key=version_to_tuple, reverse=True) upgrade_version = versions[0] # find the first version that doesn't start with the latest major.minor. - prefix = upgrade_version[:upgrade_version.rfind('.')] + prefix = upgrade_version[: upgrade_version.rfind(".")] create_version = next(x for x in versions if not x.startswith(prefix)) return create_version, upgrade_version - def _get_version_in_range(self, location: str, min_version: str, max_version: str) -> str: + def _get_version_in_range( + self, location: str, min_version: str, max_version: str + ) -> str: """Return the version which is greater than min_version and less than max_version.""" versions = self.cmd( - "az aks get-versions -l {} --query 'values[*].patchVersions.keys(@)[]'".format(location)).get_output_in_json() + "az aks get-versions -l {} --query 'values[*].patchVersions.keys(@)[]'".format( + location + ) + ).get_output_in_json() versions = sorted(versions, key=version_to_tuple, reverse=True) for version in versions: if version > min_version and version < max_version: @@ -74,1228 +77,1884 @@ def generate_ssh_keys(cls): acs_base_dir = os.getenv("ACS_BASE_DIR", None) if acs_base_dir: pre_generated_ssh_key_path = os.path.join( - acs_base_dir, "tests/latest/data/.ssh/id_rsa.pub") + acs_base_dir, "tests/latest/data/.ssh/id_rsa.pub" + ) if os.path.exists(pre_generated_ssh_key_path): - return pre_generated_ssh_key_path.replace('\\', '\\\\') + return pre_generated_ssh_key_path.replace("\\", "\\\\") # In the CLI check-in pipeline scenario, the following fake ssh-key will be used. Each test case will read the ssh-key from # a different temporary file during execution, so there will be no race conditions caused by concurrent reading and # writing/creating of the same file. TEST_SSH_KEY_PUB = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCbIg1guRHbI0lV11wWDt1r2cUdcNd27CJsg+SfgC7miZeubtwUhbsPdhMQsfDyhOWHq1+ZL0M+nJZV63d/1dhmhtgyOqejUwrPlzKhydsbrsdUor+JmNJDdW01v7BXHyuymT8G4s09jCasNOwiufbP/qp72ruu0bIA1nySsvlf9pCQAuFkAnVnf/rFhUlOkhtRpwcq8SUNY2zRHR/EKb/4NWY1JzR4sa3q2fWIJdrrX0DvLoa5g9bIEd4Df79ba7v+yiUBOS0zT2ll+z4g9izHK3EO5d8hL4jYxcjKs+wcslSYRWrascfscLgMlMGh0CdKeNTDjHpGPncaf3Z+FwwwjWeuiNBxv7bJo13/8B/098KlVDl4GZqsoBCEjPyJfV6hO0y/LkRGkk7oHWKgeWAfKtfLItRp00eZ4fcJNK9kCaSMmEugoZWcI7NGbZXzqFWqbpRI7NcDP9+WIQ+i9U5vqWsqd/zng4kbuAJ6UuKqIzB0upYrLShfQE3SAck8oaLhJqqq56VfDuASNpJKidV+zq27HfSBmbXnkR/5AK337dc3MXKJypoK/QPMLKUAP5XLPbs+NddJQV7EZXd29DLgp+fRIg3edpKdO7ZErWhv7d+3Kws+e1Y+ypmR2WIVSwVyBEUfgv2C8Ts9gnTF4pNcEY/S2aBicz5Ew2+jdyGNQQ== test@example.com\n" # pylint: disable=line-too-long _, pathname = tempfile.mkstemp() - with open(pathname, 'w') as key_file: + with open(pathname, "w") as key_file: key_file.write(TEST_SSH_KEY_PUB) - return pathname.replace('\\', '\\\\') + return pathname.replace("\\", "\\\\") @AllowLargeResponse() def test_get_version(self): - versions_cmd = 'aks get-versions -l westus2' + versions_cmd = "aks get-versions -l westus2" versions = self.cmd(versions_cmd).get_output_in_json() assert len(versions["values"]) > 0 @AllowLargeResponse() def test_get_os_options(self): - osOptions_cmd = 'aks get-os-options -l westus2' - self.cmd(osOptions_cmd, checks=[ - self.check( - 'type', 'Microsoft.ContainerService/locations/osOptions') - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_create_and_update_with_managed_nat_gateway_outbound(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--outbound-type=managedNATGateway ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.outboundType', 'managedNATGateway'), - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--nat-gateway-managed-outbound-ip-count 2 ' \ - '--nat-gateway-idle-timeout 30 ' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.outboundType', 'managedNATGateway'), - self.check( - 'networkProfile.natGatewayProfile.idleTimeoutInMinutes', 30), - self.check( - 'networkProfile.natGatewayProfile.managedOutboundIpProfile.count', 2), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_update_outbound_from_slb_to_natgateway(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--outbound-type=loadbalancer --load-balancer-managed-outbound-ip-count 2 ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.outboundType', 'loadBalancer'), - self.check('networkProfile.loadBalancerProfile.managedOutboundIPs.count', 2), - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--nat-gateway-managed-outbound-ip-count 2 ' \ - '--nat-gateway-idle-timeout 30 ' \ - '--outbound-type managedNATGateway ' \ - '--aks-custom-header AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-OutBoundTypeMigrationPreview' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.outboundType', 'managedNATGateway'), - self.check('networkProfile.natGatewayProfile.idleTimeoutInMinutes', 30), - self.check('networkProfile.natGatewayProfile.managedOutboundIpProfile.count', 2), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_and_update_with_managed_aad(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile.managed', True), - self.check( - 'aadProfile.adminGroupObjectIDs[0]', '00000000-0000-0000-0000-000000000001') - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--aad-admin-group-object-ids 00000000-0000-0000-0000-000000000002 ' \ - '--aad-tenant-id 00000000-0000-0000-0000-000000000003 -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile.managed', True), - self.check( - 'aadProfile.adminGroupObjectIDs[0]', '00000000-0000-0000-0000-000000000002'), - self.check('aadProfile.tenantId', - '00000000-0000-0000-0000-000000000003') - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='canadacentral') - def test_aks_create_aadv1_and_update_with_managed_aad(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--aad-server-app-id 00000000-0000-0000-0000-000000000001 ' \ - '--aad-server-app-secret fake-secret ' \ - '--aad-client-app-id 00000000-0000-0000-0000-000000000002 ' \ - '--aad-tenant-id d5b55040-0c14-48cc-a028-91457fc190d9 ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AADv1AllowCreate ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile.managed', None), - self.check('aadProfile.serverAppId', - '00000000-0000-0000-0000-000000000001'), - self.check('aadProfile.clientAppId', - '00000000-0000-0000-0000-000000000002'), - self.check('aadProfile.tenantId', - 'd5b55040-0c14-48cc-a028-91457fc190d9') - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--enable-aad ' \ - '--aad-admin-group-object-ids 00000000-0000-0000-0000-000000000003 ' \ - '--aad-tenant-id 00000000-0000-0000-0000-000000000004 -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile.managed', True), - self.check( - 'aadProfile.adminGroupObjectIDs[0]', '00000000-0000-0000-0000-000000000003'), - self.check('aadProfile.tenantId', - '00000000-0000-0000-0000-000000000004') - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='canadacentral') - def test_aks_create_nonaad_and_update_with_managed_aad(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets --node-count=1 ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile', None) - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--enable-aad ' \ - '--aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 ' \ - '--aad-tenant-id 00000000-0000-0000-0000-000000000002 -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile.managed', True), - self.check( - 'aadProfile.adminGroupObjectIDs[0]', '00000000-0000-0000-0000-000000000001'), - self.check('aadProfile.tenantId', - '00000000-0000-0000-0000-000000000002') - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_and_update_with_managed_aad_enable_azure_rbac(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile.managed', True), - self.check( - 'aadProfile.adminGroupObjectIDs[0]', '00000000-0000-0000-0000-000000000001') - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--enable-azure-rbac -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile.enableAzureRbac', True) - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--disable-azure-rbac -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile.enableAzureRbac', False) - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_and_update_with_node_restriction(self, resource_group, resource_group_location): - specific_version = self._get_version_in_range(resource_group_location, "1.22.0", "1.24.0") - if specific_version == "": - # supported versions do not meet test requirements, skip - return - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'k8s_version': specific_version - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '-k {k8s_version} --enable-node-restriction ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.nodeRestriction.enabled', True), - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--disable-node-restriction -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.nodeRestriction.enabled', False) - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--enable-node-restriction -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.nodeRestriction.enabled', True) - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_and_update_with_vpa(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - _, create_version = self._get_versions(resource_group_location) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'k8s_version': create_version - }) - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--enable-vpa ' \ - '--kubernetes-version={k8s_version} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-VPAPreview ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('workloadAutoScalerProfile.verticalPodAutoscaler.enabled', True), - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-VPAPreview ' \ - '--disable-vpa -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('workloadAutoScalerProfile.verticalPodAutoscaler.enabled', False) - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-VPAPreview ' \ - '--enable-vpa -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('workloadAutoScalerProfile.verticalPodAutoscaler.enabled', True) - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_ingress_appgw_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '-a ingress-appgw --appgw-subnet-cidr 10.232.0.0/16 ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ingressApplicationGateway.enabled', True), - self.check( - 'addonProfiles.ingressApplicationGateway.config.subnetCIDR', "10.232.0.0/16") - ]) + osOptions_cmd = "aks get-os-options -l westus2" + self.cmd( + osOptions_cmd, + checks=[ + self.check("type", "Microsoft.ContainerService/locations/osOptions") + ], + ) - @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_byo_subnet_with_ingress_appgw_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - vnet_name = self.create_random_name('cliakstest', 16) - appgw_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'aks_name': aks_name, - 'vnet_name': vnet_name, - 'appgw_name': appgw_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_create_and_update_with_managed_nat_gateway_outbound( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - # create virtual network - create_vnet = 'network vnet create --resource-group={resource_group} --name={vnet_name} ' \ - '--address-prefix 11.0.0.0/16 --subnet-name aks-subnet --subnet-prefix 11.0.0.0/24 -o json' - vnet = self.cmd(create_vnet, checks=[ - self.check('newVNet.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_subnet = 'network vnet subnet create -n appgw-subnet --resource-group={resource_group} --vnet-name {vnet_name} ' \ - '--address-prefixes 11.0.1.0/24 -o json' - self.cmd(create_subnet, checks=[ - self.check('provisioningState', 'Succeeded') - ]) - - vnet_id = vnet['newVNet']["id"] - assert vnet_id is not None - self.kwargs.update({ - 'vnet_id': vnet_id, - }) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--outbound-type=managedNATGateway " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.outboundType", "managedNATGateway"), + ], + ) - # create aks cluster - create_cmd = 'aks create --resource-group={resource_group} --name={aks_name} --enable-managed-identity ' \ - '--vnet-subnet-id {vnet_id}/subnets/aks-subnet -a ingress-appgw ' \ - '--appgw-name gateway --appgw-subnet-id {vnet_id}/subnets/appgw-subnet ' \ - '--yes --ssh-key-value={ssh_key_value} -o json' - aks_cluster = self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ingressApplicationGateway.enabled', True), - self.check( - 'addonProfiles.ingressApplicationGateway.config.applicationGatewayName', "gateway"), - self.check('addonProfiles.ingressApplicationGateway.config.subnetId', - vnet_id + '/subnets/appgw-subnet') - ]).get_output_in_json() - - addon_client_id = aks_cluster["addonProfiles"]["ingressApplicationGateway"]["identity"]["clientId"] - - self.kwargs.update({ - 'addon_client_id': addon_client_id, - }) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--nat-gateway-managed-outbound-ip-count 2 " + "--nat-gateway-idle-timeout 30 " + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.outboundType", "managedNATGateway"), + self.check("networkProfile.natGatewayProfile.idleTimeoutInMinutes", 30), + self.check( + "networkProfile.natGatewayProfile.managedOutboundIpProfile.count", 2 + ), + ], + ) - @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_byo_appgw_with_ingress_appgw_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - vnet_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'aks_name': aks_name, - 'vnet_name': vnet_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - # create virtual network - create_vnet = 'network vnet create --resource-group={resource_group} --name={vnet_name} ' \ - '--address-prefix 11.0.0.0/16 --subnet-name aks-subnet --subnet-prefix 11.0.0.0/24 -o json' - vnet = self.cmd(create_vnet, checks=[ - self.check('newVNet.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_subnet = 'network vnet subnet create -n appgw-subnet --resource-group={resource_group} --vnet-name {vnet_name} ' \ - '--address-prefixes 11.0.1.0/24 -o json' - self.cmd(create_subnet, checks=[ - self.check('provisioningState', 'Succeeded') - ]) - - show_subnet = 'network vnet subnet show -n appgw-subnet --resource-group={resource_group} --vnet-name {vnet_name} ' - subnet_details = self.cmd(show_subnet).get_output_in_json() - if subnet_details.get("networkSecurityGroup"): - # clean up nsg set by policy, otherwise would block creating appgw - update_subnet = 'network vnet subnet update -n appgw-subnet --resource-group={resource_group} --vnet-name {vnet_name} ' \ - '--nsg ""' - self.cmd(update_subnet, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkSecurityGroup', None), - ]) - - vnet_id = vnet['newVNet']["id"] - assert vnet_id is not None - self.kwargs.update({ - 'vnet_id': vnet_id, - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_update_outbound_from_slb_to_natgateway( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - # create public ip for app gateway - create_pip = 'network public-ip create -n appgw-ip -g {resource_group} ' \ - '--allocation-method Static --sku Standard -o json' - self.cmd(create_pip, checks=[ - self.check('publicIp.provisioningState', 'Succeeded') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--outbound-type=loadbalancer --load-balancer-managed-outbound-ip-count 2 " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.outboundType", "loadBalancer"), + self.check( + "networkProfile.loadBalancerProfile.managedOutboundIPs.count", 2 + ), + ], + ) - # create app gateway - # add priority since this is a mandatory parameter since 2021-08-01 API version for network operations - create_appgw = 'network application-gateway create -n appgw -g {resource_group} ' \ - '--sku Standard_v2 --public-ip-address appgw-ip --subnet {vnet_id}/subnets/appgw-subnet --priority 1001' - self.cmd(create_appgw) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--nat-gateway-managed-outbound-ip-count 2 " + "--nat-gateway-idle-timeout 30 " + "--outbound-type managedNATGateway " + "--aks-custom-header AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-OutBoundTypeMigrationPreview" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.outboundType", "managedNATGateway"), + self.check("networkProfile.natGatewayProfile.idleTimeoutInMinutes", 30), + self.check( + "networkProfile.natGatewayProfile.managedOutboundIpProfile.count", 2 + ), + ], + ) - # construct group id - from msrestazure.tools import parse_resource_id, resource_id - parsed_vnet_id = parse_resource_id(vnet_id) - group_id = resource_id(subscription=parsed_vnet_id["subscription"], - resource_group=parsed_vnet_id["resource_group"]) - appgw_id = group_id + "/providers/Microsoft.Network/applicationGateways/appgw" + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_and_update_with_managed_aad( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - self.kwargs.update({ - 'appgw_id': appgw_id, - 'appgw_group_id': group_id - }) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile.managed", True), + self.check( + "aadProfile.adminGroupObjectIDs[0]", + "00000000-0000-0000-0000-000000000001", + ), + ], + ) - # create aks cluster - create_cmd = 'aks create -n {aks_name} -g {resource_group} --enable-managed-identity ' \ - '--vnet-subnet-id {vnet_id}/subnets/aks-subnet ' \ - '-a ingress-appgw --appgw-id {appgw_id} --yes ' \ - '--ssh-key-value={ssh_key_value} -o json' - aks_cluster = self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ingressApplicationGateway.enabled', True), - self.check( - 'addonProfiles.ingressApplicationGateway.config.applicationGatewayId', appgw_id) - ]).get_output_in_json() - - addon_client_id = aks_cluster["addonProfiles"]["ingressApplicationGateway"]["identity"]["clientId"] - - self.kwargs.update({ - 'addon_client_id': addon_client_id, - }) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_openservicemesh_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-OpenServiceMesh ' \ - '-a open-service-mesh --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh.enabled', True), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--aad-admin-group-object-ids 00000000-0000-0000-0000-000000000002 " + "--aad-tenant-id 00000000-0000-0000-0000-000000000003 -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile.managed", True), + self.check( + "aadProfile.adminGroupObjectIDs[0]", + "00000000-0000-0000-0000-000000000002", + ), + self.check( + "aadProfile.tenantId", "00000000-0000-0000-0000-000000000003" + ), + ], + ) - @live_only() # live only is required for test environment setup like `az login` @AllowLargeResponse() - def test_aks_addon_list_available(self): - list_available_cmd = 'aks addon list-available -o json' - addon_list = self.cmd(list_available_cmd).get_output_in_json() - assert len(addon_list) == 11 - assert addon_list[0]['name'] == "http_application_routing" - assert addon_list[1]['name'] == "monitoring" - assert addon_list[2]['name'] == "virtual-node" - assert addon_list[3]['name'] == "kube-dashboard" - assert addon_list[4]['name'] == "azure-policy" - assert addon_list[5]['name'] == "ingress-appgw" - assert addon_list[6]['name'] == "confcom" - assert addon_list[7]['name'] == "open-service-mesh" - assert addon_list[8]['name'] == "azure-keyvault-secrets-provider" - assert addon_list[9]['name'] == "gitops" - assert addon_list[10]['name'] == "web_application_routing" - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_list_all_disabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh', None), - ]) - - list_cmd = 'aks addon list --resource-group={resource_group} --name={name} -o json' - addon_list = self.cmd(list_cmd).get_output_in_json() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="canadacentral" + ) + def test_aks_create_aadv1_and_update_with_managed_aad( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - assert len(addon_list) > 0 + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--aad-server-app-id 00000000-0000-0000-0000-000000000001 " + "--aad-server-app-secret fake-secret " + "--aad-client-app-id 00000000-0000-0000-0000-000000000002 " + "--aad-tenant-id d5b55040-0c14-48cc-a028-91457fc190d9 " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AADv1AllowCreate " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile.managed", None), + self.check( + "aadProfile.serverAppId", "00000000-0000-0000-0000-000000000001" + ), + self.check( + "aadProfile.clientAppId", "00000000-0000-0000-0000-000000000002" + ), + self.check( + "aadProfile.tenantId", "d5b55040-0c14-48cc-a028-91457fc190d9" + ), + ], + ) - for addon in addon_list: - assert not addon["enabled"] + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--enable-aad " + "--aad-admin-group-object-ids 00000000-0000-0000-0000-000000000003 " + "--aad-tenant-id 00000000-0000-0000-0000-000000000004 -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile.managed", True), + self.check( + "aadProfile.adminGroupObjectIDs[0]", + "00000000-0000-0000-0000-000000000003", + ), + self.check( + "aadProfile.tenantId", "00000000-0000-0000-0000-000000000004" + ), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_list_confcom_enabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} ' \ - '-a confcom -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "false") - ]) - - list_cmd = 'aks addon list --resource-group={resource_group} --name={name} -o json' - addon_list = self.cmd(list_cmd).get_output_in_json() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="canadacentral" + ) + def test_aks_create_nonaad_and_update_with_managed_aad( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - assert len(addon_list) > 0 + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets --node-count=1 " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile", None), + ], + ) - for addon in addon_list: - if addon["name"] == "confcom": - assert addon["enabled"] - else: - assert not addon["enabled"] + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--enable-aad " + "--aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 " + "--aad-tenant-id 00000000-0000-0000-0000-000000000002 -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile.managed", True), + self.check( + "aadProfile.adminGroupObjectIDs[0]", + "00000000-0000-0000-0000-000000000001", + ), + self.check( + "aadProfile.tenantId", "00000000-0000-0000-0000-000000000002" + ), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_list_openservicemesh_enabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} ' \ - '-a open-service-mesh -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh.enabled', True), - ]) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_and_update_with_managed_aad_enable_azure_rbac( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - list_cmd = 'aks addon list --resource-group={resource_group} --name={name} -o json' - addon_list = self.cmd(list_cmd).get_output_in_json() + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile.managed", True), + self.check( + "aadProfile.adminGroupObjectIDs[0]", + "00000000-0000-0000-0000-000000000001", + ), + ], + ) - assert len(addon_list) > 0 + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--enable-azure-rbac -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile.enableAzureRbac", True), + ], + ) - for addon in addon_list: - if addon["name"] == "open-service-mesh": - assert addon["enabled"] - else: - assert not addon["enabled"] + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--disable-azure-rbac -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile.enableAzureRbac", False), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_show_all_disabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh', None), - ]) - - show_cmd = 'aks addon show --resource-group={resource_group} --name={name} ' \ - '-a open-service-mesh -o json' - - with self.assertRaisesRegexp(CLIError, 'Addon "open-service-mesh" is not enabled in this cluster.'): - self.cmd(show_cmd) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_and_update_with_node_restriction( + self, resource_group, resource_group_location + ): + specific_version = self._get_version_in_range( + resource_group_location, "1.22.0", "1.24.0" + ) + if specific_version == "": + # supported versions do not meet test requirements, skip + return + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "k8s_version": specific_version, + } + ) - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_show_confcom_enabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} ' \ - '-a confcom -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "false") - ]) - - show_cmd = 'aks addon show --resource-group={resource_group} --name={name} ' \ - '-a confcom -o json' - - self.cmd(show_cmd, checks=[ - self.check("api_key", "ACCSGXDevicePlugin"), - self.check("name", "confcom"), - self.exists('config') - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_show_openservicemesh_enabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} ' \ - '-a open-service-mesh -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh.enabled', True), - ]) - - show_cmd = 'aks addon show --resource-group={resource_group} --name={name} ' \ - '-a open-service-mesh -o json' - - self.cmd(show_cmd, checks=[ - self.check("api_key", "openServiceMesh"), - self.check("name", "open-service-mesh"), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_enable_with_openservicemesh(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh', None), - ]) - - enable_cmd = 'aks addon enable --addon open-service-mesh --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh.enabled', True), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_disable_openservicemesh(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} ' \ - '-a open-service-mesh -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh.enabled', True), - ]) - - disable_cmd = 'aks addon disable --addon open-service-mesh --resource-group={resource_group} --name={name} -o json' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh.enabled', False), - self.check('addonProfiles.openServiceMesh.config', None) - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_enable_with_azurekeyvaultsecretsprovider(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.azureKeyvaultSecretsProvider', None) - ]) - - enable_cmd = 'aks addon enable --addon azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "false") - ]) - - disable_cmd = 'aks addon disable --addon azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', False), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config', None) - ]) - - enable_with_secret_rotation_cmd = 'aks addon enable --addon azure-keyvault-secrets-provider --enable-secret-rotation --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_with_secret_rotation_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "true") - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "-k {k8s_version} --enable-node-restriction " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.nodeRestriction.enabled", True), + ], + ) - # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_enable_confcom_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} ' \ - '-o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin', None) - ]) - - enable_cmd = 'aks addon enable --addon confcom --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "false") - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_disable_confcom_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} ' \ - '-a confcom -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "false") - ]) - - disable_cmd = 'aks addon disable --addon confcom --resource-group={resource_group} --name={name} -o json' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', False), - self.check('addonProfiles.ACCSGXDevicePlugin.config', None) - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_update_all_disabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} ' \ - '-o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin', None) - ]) - - update_cmd = 'aks addon update --addon confcom --resource-group={resource_group} --name={name} -o json' - with self.assertRaisesRegexp(CLIError, 'Addon "confcom" is not enabled in this cluster.'): - self.cmd(update_cmd) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--disable-node-restriction -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.nodeRestriction.enabled", False), + ], + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--enable-node-restriction -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.nodeRestriction.enabled", True), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_update_with_confcom(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin', None) - ]) - - enable_cmd = 'aks addon enable --addon confcom --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "false") - ]) - - update_cmd = 'aks addon update --resource-group={resource_group} --name={name} ' \ - '-a confcom --enable-sgxquotehelper -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "true") - ]) - - delete_cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(delete_cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_update_with_azurekeyvaultsecretsprovider(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.azureKeyvaultSecretsProvider', None) - ]) - - enable_cmd = 'aks addon enable --addon azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "false") - ]) - - update_with_secret_rotation_cmd = 'aks addon update --addon azure-keyvault-secrets-provider --enable-secret-rotation --resource-group={resource_group} --name={name} -o json' - self.cmd(update_with_secret_rotation_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "true") - ]) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_and_update_with_vpa( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + _, create_version = self._get_versions(resource_group_location) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "k8s_version": create_version, + } + ) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--enable-vpa " + "--kubernetes-version={k8s_version} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-VPAPreview " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "workloadAutoScalerProfile.verticalPodAutoscaler.enabled", True + ), + ], + ) - # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_enable_addon_with_openservicemesh(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh', None), - ]) - - enable_cmd = 'aks enable-addons --addons open-service-mesh --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh.enabled', True), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_disable_addon_openservicemesh(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '-a open-service-mesh --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh.enabled', True), - ]) - - disable_cmd = 'aks disable-addons --addons open-service-mesh --resource-group={resource_group} --name={name} -o json' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh.enabled', False), - self.check('addonProfiles.openServiceMesh.config', None) - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_azurekeyvaultsecretsprovider_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '-a azure-keyvault-secrets-provider --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "false"), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval', "2m") - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-VPAPreview " + "--disable-vpa -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "workloadAutoScalerProfile.verticalPodAutoscaler.enabled", False + ), + ], + ) - # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_addon_with_azurekeyvaultsecretsprovider_with_secret_rotation(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '-a azure-keyvault-secrets-provider --enable-secret-rotation --rotation-poll-interval 30m ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "true"), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval', "30m") - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-VPAPreview " + "--enable-vpa -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "workloadAutoScalerProfile.verticalPodAutoscaler.enabled", True + ), + ], + ) - # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_enable_addon_with_azurekeyvaultsecretsprovider(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.azureKeyvaultSecretsProvider', None) - ]) - - enable_cmd = 'aks enable-addons --addons azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "false") - ]) - - update_enable_cmd = 'aks update --resource-group={resource_group} --name={name} --enable-secret-rotation --rotation-poll-interval 120s -o json' - self.cmd(update_enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "true"), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval', "120s") - ]) - - update_disable_cmd = 'aks update --resource-group={resource_group} --name={name} --disable-secret-rotation -o json' - self.cmd(update_disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "false"), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval', "120s") - ]) - - disable_cmd = 'aks disable-addons --addons azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', False), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config', None) - ]) - - enable_with_secret_rotation_cmd = 'aks enable-addons --addons azure-keyvault-secrets-provider --enable-secret-rotation --rotation-poll-interval 1h --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_with_secret_rotation_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "true"), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval', "1h") - ]) + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_ingress_appgw_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_confcom_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '-a confcom --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "false") - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_confcom_addon_helper_enabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '-a confcom --enable-sgxquotehelper --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "true") - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_enable_addons_confcom_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin', None) - ]) - - enable_cmd = 'aks enable-addons --addons confcom --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "false") - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_disable_addons_confcom_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '-a confcom --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', True), - self.check( - 'addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled', "false") - ]) - - disable_cmd = 'aks disable-addons --addons confcom --resource-group={resource_group} --name={name} -o json' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.ACCSGXDevicePlugin.enabled', False), - self.check('addonProfiles.ACCSGXDevicePlugin.config', None) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "-a ingress-appgw --appgw-subnet-cidr 10.232.0.0/16 " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ingressApplicationGateway.enabled", True), + self.check( + "addonProfiles.ingressApplicationGateway.config.subnetCIDR", + "10.232.0.0/16", + ), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_virtual_node_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - vnet_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'aks_name': aks_name, - 'vnet_name': vnet_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_byo_subnet_with_ingress_appgw_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + vnet_name = self.create_random_name("cliakstest", 16) + appgw_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "aks_name": aks_name, + "vnet_name": vnet_name, + "appgw_name": appgw_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create virtual network - create_vnet = 'network vnet create --resource-group={resource_group} --name={vnet_name} ' \ - '--address-prefix 11.0.0.0/16 --subnet-name aks-subnet --subnet-prefix 11.0.0.0/24 -o json' - vnet = self.cmd(create_vnet, checks=[ - self.check('newVNet.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_subnet = 'network vnet subnet create -n aci-subnet --resource-group={resource_group} --vnet-name {vnet_name} ' \ - '--address-prefixes 11.0.1.0/24 -o json' - self.cmd(create_subnet, checks=[ - self.check('provisioningState', 'Succeeded') - ]) - - vnet_id = vnet['newVNet']["id"] + create_vnet = ( + "network vnet create --resource-group={resource_group} --name={vnet_name} " + "--address-prefix 11.0.0.0/16 --subnet-name aks-subnet --subnet-prefix 11.0.0.0/24 -o json" + ) + vnet = self.cmd( + create_vnet, checks=[self.check("newVNet.provisioningState", "Succeeded")] + ).get_output_in_json() + + create_subnet = ( + "network vnet subnet create -n appgw-subnet --resource-group={resource_group} --vnet-name {vnet_name} " + "--address-prefixes 11.0.1.0/24 -o json" + ) + self.cmd(create_subnet, checks=[self.check("provisioningState", "Succeeded")]) + + vnet_id = vnet["newVNet"]["id"] assert vnet_id is not None - self.kwargs.update({ - 'vnet_id': vnet_id, - }) + self.kwargs.update( + { + "vnet_id": vnet_id, + } + ) # create aks cluster - create_cmd = 'aks create --resource-group={resource_group} --name={aks_name} --enable-managed-identity ' \ - '--vnet-subnet-id {vnet_id}/subnets/aks-subnet --network-plugin azure ' \ - '-a virtual-node --aci-subnet-name aci-subnet --yes ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.aciConnectorLinux.enabled', True), - self.check( - 'addonProfiles.aciConnectorLinux.config.SubnetName', "aci-subnet") - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={aks_name} --enable-managed-identity " + "--vnet-subnet-id {vnet_id}/subnets/aks-subnet -a ingress-appgw " + "--appgw-name gateway --appgw-subnet-id {vnet_id}/subnets/appgw-subnet " + "--yes --ssh-key-value={ssh_key_value} -o json" + ) + aks_cluster = self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ingressApplicationGateway.enabled", True), + self.check( + "addonProfiles.ingressApplicationGateway.config.applicationGatewayName", + "gateway", + ), + self.check( + "addonProfiles.ingressApplicationGateway.config.subnetId", + vnet_id + "/subnets/appgw-subnet", + ), + ], + ).get_output_in_json() - # list addons - list_cmd = 'aks addon list --resource-group={resource_group} --name={aks_name} -o json' - addon_list = self.cmd(list_cmd).get_output_in_json() + addon_client_id = aks_cluster["addonProfiles"]["ingressApplicationGateway"][ + "identity" + ]["clientId"] - # check virtual node addon - assert len(addon_list) > 0 + self.kwargs.update( + { + "addon_client_id": addon_client_id, + } + ) + + @live_only() + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_byo_appgw_with_ingress_appgw_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + vnet_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "aks_name": aks_name, + "vnet_name": vnet_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + # create virtual network + create_vnet = ( + "network vnet create --resource-group={resource_group} --name={vnet_name} " + "--address-prefix 11.0.0.0/16 --subnet-name aks-subnet --subnet-prefix 11.0.0.0/24 -o json" + ) + vnet = self.cmd( + create_vnet, checks=[self.check("newVNet.provisioningState", "Succeeded")] + ).get_output_in_json() + + create_subnet = ( + "network vnet subnet create -n appgw-subnet --resource-group={resource_group} --vnet-name {vnet_name} " + "--address-prefixes 11.0.1.0/24 -o json" + ) + self.cmd(create_subnet, checks=[self.check("provisioningState", "Succeeded")]) + + show_subnet = "network vnet subnet show -n appgw-subnet --resource-group={resource_group} --vnet-name {vnet_name} " + subnet_details = self.cmd(show_subnet).get_output_in_json() + if subnet_details.get("networkSecurityGroup"): + # clean up nsg set by policy, otherwise would block creating appgw + update_subnet = ( + "network vnet subnet update -n appgw-subnet --resource-group={resource_group} --vnet-name {vnet_name} " + '--nsg ""' + ) + self.cmd( + update_subnet, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkSecurityGroup", None), + ], + ) + + vnet_id = vnet["newVNet"]["id"] + assert vnet_id is not None + self.kwargs.update( + { + "vnet_id": vnet_id, + } + ) + + # create public ip for app gateway + create_pip = ( + "network public-ip create -n appgw-ip -g {resource_group} " + "--allocation-method Static --sku Standard -o json" + ) + self.cmd( + create_pip, checks=[self.check("publicIp.provisioningState", "Succeeded")] + ) + + # create app gateway + # add priority since this is a mandatory parameter since 2021-08-01 API version for network operations + create_appgw = ( + "network application-gateway create -n appgw -g {resource_group} " + "--sku Standard_v2 --public-ip-address appgw-ip --subnet {vnet_id}/subnets/appgw-subnet --priority 1001" + ) + self.cmd(create_appgw) + + # construct group id + from msrestazure.tools import parse_resource_id, resource_id + + parsed_vnet_id = parse_resource_id(vnet_id) + group_id = resource_id( + subscription=parsed_vnet_id["subscription"], + resource_group=parsed_vnet_id["resource_group"], + ) + appgw_id = group_id + "/providers/Microsoft.Network/applicationGateways/appgw" + + self.kwargs.update({"appgw_id": appgw_id, "appgw_group_id": group_id}) + + # create aks cluster + create_cmd = ( + "aks create -n {aks_name} -g {resource_group} --enable-managed-identity " + "--vnet-subnet-id {vnet_id}/subnets/aks-subnet " + "-a ingress-appgw --appgw-id {appgw_id} --yes " + "--ssh-key-value={ssh_key_value} -o json" + ) + aks_cluster = self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ingressApplicationGateway.enabled", True), + self.check( + "addonProfiles.ingressApplicationGateway.config.applicationGatewayId", + appgw_id, + ), + ], + ).get_output_in_json() + + addon_client_id = aks_cluster["addonProfiles"]["ingressApplicationGateway"][ + "identity" + ]["clientId"] + + self.kwargs.update( + { + "addon_client_id": addon_client_id, + } + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_openservicemesh_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-OpenServiceMesh " + "-a open-service-mesh --ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh.enabled", True), + ], + ) + + @live_only() # live only is required for test environment setup like `az login` + @AllowLargeResponse() + def test_aks_addon_list_available(self): + list_available_cmd = "aks addon list-available -o json" + addon_list = self.cmd(list_available_cmd).get_output_in_json() + assert len(addon_list) == 11 + assert addon_list[0]["name"] == "http_application_routing" + assert addon_list[1]["name"] == "monitoring" + assert addon_list[2]["name"] == "virtual-node" + assert addon_list[3]["name"] == "kube-dashboard" + assert addon_list[4]["name"] == "azure-policy" + assert addon_list[5]["name"] == "ingress-appgw" + assert addon_list[6]["name"] == "confcom" + assert addon_list[7]["name"] == "open-service-mesh" + assert addon_list[8]["name"] == "azure-keyvault-secrets-provider" + assert addon_list[9]["name"] == "gitops" + assert addon_list[10]["name"] == "web_application_routing" + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_list_all_disabled(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} -o json" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh", None), + ], + ) + + list_cmd = ( + "aks addon list --resource-group={resource_group} --name={name} -o json" + ) + addon_list = self.cmd(list_cmd).get_output_in_json() + + assert len(addon_list) > 0 + + for addon in addon_list: + assert not addon["enabled"] + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_list_confcom_enabled( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} " + "-a confcom -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "false", + ), + ], + ) + + list_cmd = ( + "aks addon list --resource-group={resource_group} --name={name} -o json" + ) + addon_list = self.cmd(list_cmd).get_output_in_json() + + assert len(addon_list) > 0 + + for addon in addon_list: + if addon["name"] == "confcom": + assert addon["enabled"] + else: + assert not addon["enabled"] + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_list_openservicemesh_enabled( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} " + "-a open-service-mesh -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh.enabled", True), + ], + ) + + list_cmd = ( + "aks addon list --resource-group={resource_group} --name={name} -o json" + ) + addon_list = self.cmd(list_cmd).get_output_in_json() + + assert len(addon_list) > 0 + + for addon in addon_list: + if addon["name"] == "open-service-mesh": + assert addon["enabled"] + else: + assert not addon["enabled"] + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_show_all_disabled(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} -o json" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh", None), + ], + ) + + show_cmd = ( + "aks addon show --resource-group={resource_group} --name={name} " + "-a open-service-mesh -o json" + ) + + with self.assertRaisesRegexp( + CLIError, 'Addon "open-service-mesh" is not enabled in this cluster.' + ): + self.cmd(show_cmd) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_show_confcom_enabled( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} " + "-a confcom -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "false", + ), + ], + ) + + show_cmd = ( + "aks addon show --resource-group={resource_group} --name={name} " + "-a confcom -o json" + ) + + self.cmd( + show_cmd, + checks=[ + self.check("api_key", "ACCSGXDevicePlugin"), + self.check("name", "confcom"), + self.exists("config"), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_show_openservicemesh_enabled( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} " + "-a open-service-mesh -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh.enabled", True), + ], + ) + + show_cmd = ( + "aks addon show --resource-group={resource_group} --name={name} " + "-a open-service-mesh -o json" + ) + + self.cmd( + show_cmd, + checks=[ + self.check("api_key", "openServiceMesh"), + self.check("name", "open-service-mesh"), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_enable_with_openservicemesh( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} -o json" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh", None), + ], + ) + + enable_cmd = "aks addon enable --addon open-service-mesh --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh.enabled", True), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_disable_openservicemesh( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} " + "-a open-service-mesh -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh.enabled", True), + ], + ) + + disable_cmd = "aks addon disable --addon open-service-mesh --resource-group={resource_group} --name={name} -o json" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh.enabled", False), + self.check("addonProfiles.openServiceMesh.config", None), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_enable_with_azurekeyvaultsecretsprovider( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider", None), + ], + ) + + enable_cmd = "aks addon enable --addon azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "false", + ), + ], + ) + + disable_cmd = "aks addon disable --addon azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", False), + self.check("addonProfiles.azureKeyvaultSecretsProvider.config", None), + ], + ) + + enable_with_secret_rotation_cmd = "aks addon enable --addon azure-keyvault-secrets-provider --enable-secret-rotation --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_with_secret_rotation_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "true", + ), + ], + ) + + # delete + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_enable_confcom_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} " + "-o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin", None), + ], + ) + + enable_cmd = "aks addon enable --addon confcom --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "false", + ), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_disable_confcom_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} " + "-a confcom -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "false", + ), + ], + ) + + disable_cmd = "aks addon disable --addon confcom --resource-group={resource_group} --name={name} -o json" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", False), + self.check("addonProfiles.ACCSGXDevicePlugin.config", None), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_update_all_disabled( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} " + "-o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin", None), + ], + ) + + update_cmd = "aks addon update --addon confcom --resource-group={resource_group} --name={name} -o json" + with self.assertRaisesRegexp( + CLIError, 'Addon "confcom" is not enabled in this cluster.' + ): + self.cmd(update_cmd) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_update_with_confcom( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin", None), + ], + ) + + enable_cmd = "aks addon enable --addon confcom --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "false", + ), + ], + ) + + update_cmd = ( + "aks addon update --resource-group={resource_group} --name={name} " + "-a confcom --enable-sgxquotehelper -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "true", + ), + ], + ) + + delete_cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + delete_cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_update_with_azurekeyvaultsecretsprovider( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider", None), + ], + ) + + enable_cmd = "aks addon enable --addon azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "false", + ), + ], + ) + + update_with_secret_rotation_cmd = "aks addon update --addon azure-keyvault-secrets-provider --enable-secret-rotation --resource-group={resource_group} --name={name} -o json" + self.cmd( + update_with_secret_rotation_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "true", + ), + ], + ) + + # delete + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_enable_addon_with_openservicemesh( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh", None), + ], + ) + + enable_cmd = "aks enable-addons --addons open-service-mesh --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh.enabled", True), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_disable_addon_openservicemesh( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "-a open-service-mesh --ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh.enabled", True), + ], + ) + + disable_cmd = "aks disable-addons --addons open-service-mesh --resource-group={resource_group} --name={name} -o json" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh.enabled", False), + self.check("addonProfiles.openServiceMesh.config", None), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_azurekeyvaultsecretsprovider_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "-a azure-keyvault-secrets-provider --ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "false", + ), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval", + "2m", + ), + ], + ) + + # delete + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_addon_with_azurekeyvaultsecretsprovider_with_secret_rotation( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "-a azure-keyvault-secrets-provider --enable-secret-rotation --rotation-poll-interval 30m " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "true", + ), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval", + "30m", + ), + ], + ) + + # delete + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_enable_addon_with_azurekeyvaultsecretsprovider( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider", None), + ], + ) + + enable_cmd = "aks enable-addons --addons azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "false", + ), + ], + ) + + update_enable_cmd = "aks update --resource-group={resource_group} --name={name} --enable-secret-rotation --rotation-poll-interval 120s -o json" + self.cmd( + update_enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "true", + ), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval", + "120s", + ), + ], + ) + + update_disable_cmd = "aks update --resource-group={resource_group} --name={name} --disable-secret-rotation -o json" + self.cmd( + update_disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "false", + ), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval", + "120s", + ), + ], + ) + + disable_cmd = "aks disable-addons --addons azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", False), + self.check("addonProfiles.azureKeyvaultSecretsProvider.config", None), + ], + ) + + enable_with_secret_rotation_cmd = "aks enable-addons --addons azure-keyvault-secrets-provider --enable-secret-rotation --rotation-poll-interval 1h --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_with_secret_rotation_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "true", + ), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.rotationPollInterval", + "1h", + ), + ], + ) + + # delete + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_confcom_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "-a confcom --ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "false", + ), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_confcom_addon_helper_enabled( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "-a confcom --enable-sgxquotehelper --ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "true", + ), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_enable_addons_confcom_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin", None), + ], + ) + + enable_cmd = "aks enable-addons --addons confcom --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "false", + ), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_disable_addons_confcom_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "-a confcom --ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", True), + self.check( + "addonProfiles.ACCSGXDevicePlugin.config.ACCSGXQuoteHelperEnabled", + "false", + ), + ], + ) + + disable_cmd = "aks disable-addons --addons confcom --resource-group={resource_group} --name={name} -o json" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.ACCSGXDevicePlugin.enabled", False), + self.check("addonProfiles.ACCSGXDevicePlugin.config", None), + ], + ) + + @live_only() + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_virtual_node_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + vnet_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "aks_name": aks_name, + "vnet_name": vnet_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + # create virtual network + create_vnet = ( + "network vnet create --resource-group={resource_group} --name={vnet_name} " + "--address-prefix 11.0.0.0/16 --subnet-name aks-subnet --subnet-prefix 11.0.0.0/24 -o json" + ) + vnet = self.cmd( + create_vnet, checks=[self.check("newVNet.provisioningState", "Succeeded")] + ).get_output_in_json() + + create_subnet = ( + "network vnet subnet create -n aci-subnet --resource-group={resource_group} --vnet-name {vnet_name} " + "--address-prefixes 11.0.1.0/24 -o json" + ) + self.cmd(create_subnet, checks=[self.check("provisioningState", "Succeeded")]) + + vnet_id = vnet["newVNet"]["id"] + assert vnet_id is not None + self.kwargs.update( + { + "vnet_id": vnet_id, + } + ) + + # create aks cluster + create_cmd = ( + "aks create --resource-group={resource_group} --name={aks_name} --enable-managed-identity " + "--vnet-subnet-id {vnet_id}/subnets/aks-subnet --network-plugin azure " + "-a virtual-node --aci-subnet-name aci-subnet --yes " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.aciConnectorLinux.enabled", True), + self.check( + "addonProfiles.aciConnectorLinux.config.SubnetName", "aci-subnet" + ), + ], + ) + + # list addons + list_cmd = ( + "aks addon list --resource-group={resource_group} --name={aks_name} -o json" + ) + addon_list = self.cmd(list_cmd).get_output_in_json() + + # check virtual node addon + assert len(addon_list) > 0 for addon in addon_list: if addon["name"] == "virtual-node": assert addon["enabled"] @@ -1303,899 +1962,1250 @@ def test_aks_create_with_virtual_node_addon(self, resource_group, resource_group assert not addon["enabled"] # delete - cmd = 'aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = "aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait" + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_stop_and_start(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - - stop_cmd = 'aks stop --resource-group={resource_group} --name={name}' + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + stop_cmd = "aks stop --resource-group={resource_group} --name={name}" self.cmd(stop_cmd) - start_cmd = 'aks start --resource-group={resource_group} --name={name}' + start_cmd = "aks start --resource-group={resource_group} --name={name}" self.cmd(start_cmd) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_stop_and_start_private_cluster(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_stop_and_start_private_cluster( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --enable-private-cluster' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --enable-private-cluster" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) - stop_cmd = 'aks stop --resource-group={resource_group} --name={name}' + stop_cmd = "aks stop --resource-group={resource_group} --name={name}" self.cmd(stop_cmd) - start_cmd = 'aks start --resource-group={resource_group} --name={name}' + start_cmd = "aks start --resource-group={resource_group} --name={name}" self.cmd(start_cmd) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) def test_aks_abort(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --no-wait' + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --no-wait" self.cmd(create_cmd) - abort_cmd = 'aks operation-abort --resource-group={resource_group} --name={name}' + abort_cmd = ( + "aks operation-abort --resource-group={resource_group} --name={name}" + ) self.cmd(abort_cmd, checks=[self.is_empty()]) time.sleep(10) - show_cmd = 'aks show --resource-group={resource_group} --name={name}' - self.cmd(show_cmd, checks=[self.check('provisioningState', 'Canceled')]) + show_cmd = "aks show --resource-group={resource_group} --name={name}" + self.cmd(show_cmd, checks=[self.check("provisioningState", "Canceled")]) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_nodepool_abort(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets --node-count=1 ' \ - '--ssh-key-value={ssh_key_value} ' \ - '-o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets --node-count=1 " + "--ssh-key-value={ssh_key_value} " + "-o json" + ) + self.cmd(create_cmd, checks=[self.check("provisioningState", "Succeeded")]) # add nodepool - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={node_pool_name} --node-count=2', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={node_pool_name} --node-count=2", + checks=[self.check("provisioningState", "Succeeded")], + ) # stop nodepool - self.cmd('aks nodepool stop --no-wait --resource-group={resource_group} --cluster-name={name} --nodepool-name={node_pool_name} --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/PreviewStartStopAgentPool') + self.cmd( + "aks nodepool stop --no-wait --resource-group={resource_group} --cluster-name={name} --nodepool-name={node_pool_name} --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/PreviewStartStopAgentPool" + ) - abort_cmd = 'aks nodepool operation-abort --resource-group={resource_group} --cluster-name={name} --nodepool-name={node_pool_name}' + abort_cmd = "aks nodepool operation-abort --resource-group={resource_group} --cluster-name={name} --nodepool-name={node_pool_name}" self.cmd(abort_cmd, checks=[self.is_empty()]) time.sleep(10) - get_nodepool_cmd = 'aks nodepool show ' \ - '--resource-group={resource_group} ' \ - '--cluster-name={name} ' \ - '-n {node_pool_name} ' - self.cmd(get_nodepool_cmd, checks=[ - self.check('provisioningState', 'Canceled'), - self.check('powerState.code', 'Running') - ]) + get_nodepool_cmd = ( + "aks nodepool show " + "--resource-group={resource_group} " + "--cluster-name={name} " + "-n {node_pool_name} " + ) + self.cmd( + get_nodepool_cmd, + checks=[ + self.check("provisioningState", "Canceled"), + self.check("powerState.code", "Running"), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_machine_cmds(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-managed-identity ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.openServiceMesh', None), - ]) - - node_pool_name = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-managed-identity " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.openServiceMesh", None), + ], + ) + + node_pool_name = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # add nodepool - self.cmd('aks nodepool add ' \ - ' --resource-group={resource_group} ' \ - ' --cluster-name={name} ' \ - ' --name={node_pool_name} --node-count=2', checks=[ - self.check('provisioningState', 'Succeeded') - ]) - - list_cmd = 'aks machine list ' \ - ' --resource-group={resource_group} ' \ - ' --cluster-name={name} --nodepool-name={node_pool_name} -o json' + self.cmd( + "aks nodepool add " + " --resource-group={resource_group} " + " --cluster-name={name} " + " --name={node_pool_name} --node-count=2", + checks=[self.check("provisioningState", "Succeeded")], + ) + + list_cmd = ( + "aks machine list " + " --resource-group={resource_group} " + " --cluster-name={name} --nodepool-name={node_pool_name} -o json" + ) machine_list = self.cmd(list_cmd).get_output_in_json() assert len(machine_list) == 2 aks_machine_list_table_format(machine_list) machine_name = machine_list[0]["name"] - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'machine_name': machine_name, - }) - show_cmd = 'aks machine show '\ - '--resource-group={resource_group} --cluster-name={name} ' \ - '--nodepool-name={node_pool_name} --machine-name={machine_name} -o json' + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "ssh_key_value": self.generate_ssh_keys(), + "machine_name": machine_name, + } + ) + show_cmd = ( + "aks machine show " + "--resource-group={resource_group} --cluster-name={name} " + "--nodepool-name={node_pool_name} --machine-name={machine_name} -o json" + ) machine_show = self.cmd(show_cmd).get_output_in_json() assert machine_show["name"] == machine_name - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_create_with_guardrails(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--guardrails-level Warning --guardrails-version "v1.0.0" ' \ - '--enable-addons azure-policy --ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/GuardrailsPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('guardrailsProfile.level', 'Warning'), - self.check('guardrailsProfile.version','v1.0.0') - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + '--guardrails-level Warning --guardrails-version "v1.0.0" ' + "--enable-addons azure-policy --ssh-key-value={ssh_key_value} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/GuardrailsPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("guardrailsProfile.level", "Warning"), + self.check("guardrailsProfile.version", "v1.0.0"), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_update_with_guardrails(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} ' \ - '--enable-addons azure-policy ' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--guardrails-level Warning --guardrails-version "v1.0.0" ' \ - '--guardrails-excluded-ns test-ns1 ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/GuardrailsPreview' - - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('guardrailsProfile.level', 'Warning'), - self.check('guardrailsProfile.version','v1.0.0'), - self.check('guardrailsProfile.excludedNamespaces[0]','test-ns1') - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_managed_disk(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--node-osdisk-type=Managed ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].osDiskType', 'Managed'), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_ephemeral_disk(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--node-osdisk-type=Ephemeral --node-osdisk-size 60 ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].osDiskType', 'Ephemeral'), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} " + "--enable-addons azure-policy " + ) + self.cmd(create_cmd, checks=[self.check("provisioningState", "Succeeded")]) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + '--guardrails-level Warning --guardrails-version "v1.0.0" ' + "--guardrails-excluded-ns test-ns1 " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/GuardrailsPreview" + ) + + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("guardrailsProfile.level", "Warning"), + self.check("guardrailsProfile.version", "v1.0.0"), + self.check("guardrailsProfile.excludedNamespaces[0]", "test-ns1"), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_managed_disk( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--node-osdisk-type=Managed " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].osDiskType", "Managed"), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_ephemeral_disk( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--node-osdisk-type=Ephemeral --node-osdisk-size 60 " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].osDiskType", "Ephemeral"), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) def test_aks_create_with_ossku(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--os-sku CBLMariner ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].osSku', 'CBLMariner'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--os-sku CBLMariner " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].osSku", "CBLMariner"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_nodepool_add_with_workload_runtime(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - node_pool_name_second = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'node_pool_name_second': node_pool_name_second, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--nodepool-name {node_pool_name} -c 1 ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name_second} ' - '--workload-runtime WasmWasi', - checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('workloadRuntime', 'WasmWasi'), - ]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_nodepool_add_with_workload_runtime( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + node_pool_name_second = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "node_pool_name_second": node_pool_name_second, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--nodepool-name {node_pool_name} -c 1 " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name_second} " + "--workload-runtime WasmWasi", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("workloadRuntime", "WasmWasi"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) def test_aks_nodepool_add_with_ossku(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - node_pool_name_second = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'node_pool_name_second': node_pool_name_second, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--nodepool-name {node_pool_name} -c 1 ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + node_pool_name_second = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "node_pool_name_second": node_pool_name_second, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--nodepool-name {node_pool_name} -c 1 " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # nodepool get-upgrades - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name_second} ' - '--os-sku CBLMariner', - checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('osSku', 'CBLMariner'), - ]) + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name_second} " + "--os-sku CBLMariner", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("osSku", "CBLMariner"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_nodepool_add_with_ossku_windows2022(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_nodepool_add_with_ossku_windows2022( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) + aks_name = self.create_random_name("cliakstest", 16) _, create_version = self._get_versions(resource_group_location) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'windows_admin_username': 'azureuser1', - 'windows_admin_password': 'replace-Password1234$', - 'windows_nodepool_name': 'npwin', - 'k8s_version': create_version, - 'ssh_key_value': self.generate_ssh_keys() - }) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "windows_admin_username": "azureuser1", + "windows_admin_password": "replace-Password1234$", + "windows_nodepool_name": "npwin", + "k8s_version": create_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 ' \ - '--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} ' \ - '--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure ' \ - '--ssh-key-value={ssh_key_value} --kubernetes-version={k8s_version}' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.adminUsername', 'azureuser1') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 " + "--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} " + "--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure " + "--ssh-key-value={ssh_key_value} --kubernetes-version={k8s_version}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.adminUsername", "azureuser1"), + ], + ) # add Windows2022 nodepool - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={windows_nodepool_name} ' - '--node-count=1 ' - '--os-type Windows ' - '--os-sku Windows2022 ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKSWindows2022Preview', - checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('osSku', 'Windows2022'), - ]) + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={windows_nodepool_name} " + "--node-count=1 " + "--os-type Windows " + "--os-sku Windows2022 " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKSWindows2022Preview", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("osSku", "Windows2022"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_nodepool_add_with_disable_windows_outbound_nat(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_nodepool_add_with_disable_windows_outbound_nat( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) + aks_name = self.create_random_name("cliakstest", 16) _, create_version = self._get_versions(resource_group_location) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'windows_admin_username': 'azureuser1', - 'windows_admin_password': 'replace-Password1234$', - 'windows_nodepool_name': 'npwin', - 'k8s_version': create_version, - 'ssh_key_value': self.generate_ssh_keys() - }) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "windows_admin_username": "azureuser1", + "windows_admin_password": "replace-Password1234$", + "windows_nodepool_name": "npwin", + "k8s_version": create_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 ' \ - '--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} ' \ - '--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure ' \ - '--ssh-key-value={ssh_key_value} --kubernetes-version={k8s_version} ' \ - '--outbound-type=managedNATGateway ' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.adminUsername', 'azureuser1') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 " + "--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} " + "--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure " + "--ssh-key-value={ssh_key_value} --kubernetes-version={k8s_version} " + "--outbound-type=managedNATGateway " + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.adminUsername", "azureuser1"), + ], + ) # add Windows2019 nodepool # Windows2022 does not support this feature yet - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={windows_nodepool_name} ' - '--node-count=1 ' - '--os-type Windows ' - '--os-sku Windows2019 ' - '--disable-windows-outbound-nat ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/DisableWindowsOutboundNATPreview', - checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.disableOutboundNat', True), - ]) + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={windows_nodepool_name} " + "--node-count=1 " + "--os-type Windows " + "--os-sku Windows2019 " + "--disable-windows-outbound-nat " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/DisableWindowsOutboundNATPreview", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.disableOutboundNat", True), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_create_add_nodepool_with_motd(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - node_pool_name_second = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'node_pool_name_second': node_pool_name_second, - 'ssh_key_value': self.generate_ssh_keys(), - 'message_of_the_day': _get_test_data_file("motd.txt") - }) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_create_add_nodepool_with_motd( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + node_pool_name_second = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "node_pool_name_second": node_pool_name_second, + "ssh_key_value": self.generate_ssh_keys(), + "message_of_the_day": _get_test_data_file("motd.txt"), + } + ) # 1. create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--nodepool-name {node_pool_name} -c 1 ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--message-of-the-day={message_of_the_day}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].messageOfTheDay', 'VU5BVVRIT1JJWkVEIEFDQ0VTUyBUTyBUSElTIERFVklDRSBJUyBQUk9ISUJJVEVECgpZb3UgbXVzdCBoYXZlIGV4cGxpY2l0LCBhdXRob3JpemVkIHBlcm1pc3Npb24gdG8gYWNjZXNzIG9yIGNvbmZpZ3VyZSB0aGlzIGRldmljZS4gVW5hdXRob3JpemVkIGF0dGVtcHRzIGFuZCBhY3Rpb25zIHRvIGFjY2VzcyBvciB1c2UgdGhpcyBzeXN0ZW0gbWF5IHJlc3VsdCBpbiBjaXZpbCBhbmQvb3IgY3JpbWluYWwgcGVuYWx0aWVzLiBBbGwgYWN0aXZpdGllcyBwZXJmb3JtZWQgb24gdGhpcyBkZXZpY2UgYXJlIGxvZ2dlZCBhbmQgbW9uaXRvcmVkLgo=') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--nodepool-name {node_pool_name} -c 1 " + "--ssh-key-value={ssh_key_value} " + "--message-of-the-day={message_of_the_day}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "agentPoolProfiles[0].messageOfTheDay", + "VU5BVVRIT1JJWkVEIEFDQ0VTUyBUTyBUSElTIERFVklDRSBJUyBQUk9ISUJJVEVECgpZb3UgbXVzdCBoYXZlIGV4cGxpY2l0LCBhdXRob3JpemVkIHBlcm1pc3Npb24gdG8gYWNjZXNzIG9yIGNvbmZpZ3VyZSB0aGlzIGRldmljZS4gVW5hdXRob3JpemVkIGF0dGVtcHRzIGFuZCBhY3Rpb25zIHRvIGFjY2VzcyBvciB1c2UgdGhpcyBzeXN0ZW0gbWF5IHJlc3VsdCBpbiBjaXZpbCBhbmQvb3IgY3JpbWluYWwgcGVuYWx0aWVzLiBBbGwgYWN0aXZpdGllcyBwZXJmb3JtZWQgb24gdGhpcyBkZXZpY2UgYXJlIGxvZ2dlZCBhbmQgbW9uaXRvcmVkLgo=", + ), + ], + ) # nodepool get-upgrades - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name_second} ' - '--message-of-the-day={message_of_the_day}', - checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('messageOfTheDay', 'VU5BVVRIT1JJWkVEIEFDQ0VTUyBUTyBUSElTIERFVklDRSBJUyBQUk9ISUJJVEVECgpZb3UgbXVzdCBoYXZlIGV4cGxpY2l0LCBhdXRob3JpemVkIHBlcm1pc3Npb24gdG8gYWNjZXNzIG9yIGNvbmZpZ3VyZSB0aGlzIGRldmljZS4gVW5hdXRob3JpemVkIGF0dGVtcHRzIGFuZCBhY3Rpb25zIHRvIGFjY2VzcyBvciB1c2UgdGhpcyBzeXN0ZW0gbWF5IHJlc3VsdCBpbiBjaXZpbCBhbmQvb3IgY3JpbWluYWwgcGVuYWx0aWVzLiBBbGwgYWN0aXZpdGllcyBwZXJmb3JtZWQgb24gdGhpcyBkZXZpY2UgYXJlIGxvZ2dlZCBhbmQgbW9uaXRvcmVkLgo=') - ]) + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name_second} " + "--message-of-the-day={message_of_the_day}", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "messageOfTheDay", + "VU5BVVRIT1JJWkVEIEFDQ0VTUyBUTyBUSElTIERFVklDRSBJUyBQUk9ISUJJVEVECgpZb3UgbXVzdCBoYXZlIGV4cGxpY2l0LCBhdXRob3JpemVkIHBlcm1pc3Npb24gdG8gYWNjZXNzIG9yIGNvbmZpZ3VyZSB0aGlzIGRldmljZS4gVW5hdXRob3JpemVkIGF0dGVtcHRzIGFuZCBhY3Rpb25zIHRvIGFjY2VzcyBvciB1c2UgdGhpcyBzeXN0ZW0gbWF5IHJlc3VsdCBpbiBjaXZpbCBhbmQvb3IgY3JpbWluYWwgcGVuYWx0aWVzLiBBbGwgYWN0aXZpdGllcyBwZXJmb3JtZWQgb24gdGhpcyBkZXZpY2UgYXJlIGxvZ2dlZCBhbmQgbW9uaXRvcmVkLgo=", + ), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) def test_aks_custom_ca_trust_flow(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - node_pool_name_second = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'node_pool_name_second': node_pool_name_second, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + node_pool_name_second = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "node_pool_name_second": node_pool_name_second, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # 1. create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--nodepool-name {node_pool_name} -c 1 ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--enable-custom-ca-trust' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].enableCustomCaTrust', 'True') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--nodepool-name {node_pool_name} -c 1 " + "--ssh-key-value={ssh_key_value} " + "--enable-custom-ca-trust" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].enableCustomCaTrust", "True"), + ], + ) # 2. add nodepool - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name_second} ' - '--os-type Linux ' - '--enable-custom-ca-trust', - checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('enableCustomCaTrust', 'True'), - ]) + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name_second} " + "--os-type Linux " + "--enable-custom-ca-trust", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("enableCustomCaTrust", "True"), + ], + ) # delete - self.cmd('aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_create_add_nodepool_with_custom_ca_trust_certificates(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - node_pool_name_second = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'node_pool_name_second': node_pool_name_second, - 'ssh_key_value': self.generate_ssh_keys(), - 'custom_ca_trust_certificates': _get_test_data_file("certs.txt") - }) + self.cmd( + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_create_add_nodepool_with_custom_ca_trust_certificates( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + node_pool_name_second = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "node_pool_name_second": node_pool_name_second, + "ssh_key_value": self.generate_ssh_keys(), + "custom_ca_trust_certificates": _get_test_data_file("certs.txt"), + } + ) # 1. create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--nodepool-name {node_pool_name} -c 1 ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/CustomCATrustPreview ' \ - '--custom-ca-trust-certificates={custom_ca_trust_certificates}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.customCaTrustCertificates', [CONST_CUSTOM_CA_TEST_CERT for _ in range(2)]), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--nodepool-name {node_pool_name} -c 1 " + "--ssh-key-value={ssh_key_value} " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/CustomCATrustPreview " + "--custom-ca-trust-certificates={custom_ca_trust_certificates}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "securityProfile.customCaTrustCertificates", + [CONST_CUSTOM_CA_TEST_CERT for _ in range(2)], + ), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_nodepool_drain_timeout(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - np_name = self.create_random_name('clinp', 12) - self.kwargs.update({ - 'name': aks_name, - 'resource_group': resource_group, - 'nodepool_name': np_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + np_name = self.create_random_name("clinp", 12) + self.kwargs.update( + { + "name": aks_name, + "resource_group": resource_group, + "nodepool_name": np_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--ssh-key-value={ssh_key_value} -c 1' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - - add_nodepool_cmd = 'aks nodepool add -g {resource_group} --cluster-name {name} -n {nodepool_name} ' \ - '--mode user --drain-timeout 10' - self.cmd(add_nodepool_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('upgradeSettings.drainTimeoutInMinutes', 10), - ]) - - update_nodepool_cmd = 'aks nodepool update -g {resource_group} --cluster-name {name} -n {nodepool_name} ' \ - '--drain-timeout 60' - self.cmd(update_nodepool_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('upgradeSettings.drainTimeoutInMinutes', 60), - ]) - - #actually running an upgrade is too expensive for these tests. + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--ssh-key-value={ssh_key_value} -c 1" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + add_nodepool_cmd = ( + "aks nodepool add -g {resource_group} --cluster-name {name} -n {nodepool_name} " + "--mode user --drain-timeout 10" + ) + self.cmd( + add_nodepool_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("upgradeSettings.drainTimeoutInMinutes", 10), + ], + ) + + update_nodepool_cmd = ( + "aks nodepool update -g {resource_group} --cluster-name {name} -n {nodepool_name} " + "--drain-timeout 60" + ) + self.cmd( + update_nodepool_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("upgradeSettings.drainTimeoutInMinutes", 60), + ], + ) + + # actually running an upgrade is too expensive for these tests. # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_nodepool_node_soak_duration(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - np_name = self.create_random_name('clinp', 12) - self.kwargs.update({ - 'name': aks_name, - 'resource_group': resource_group, - 'nodepool_name': np_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_nodepool_node_soak_duration( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + np_name = self.create_random_name("clinp", 12) + self.kwargs.update( + { + "name": aks_name, + "resource_group": resource_group, + "nodepool_name": np_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--ssh-key-value={ssh_key_value} -c 1' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - - add_nodepool_cmd = 'aks nodepool add -g {resource_group} --cluster-name {name} -n {nodepool_name} ' \ - '--mode user --node-soak-duration 5' - self.cmd(add_nodepool_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('upgradeSettings.nodeSoakDurationInMinutes', 5), - ]) - - update_nodepool_cmd = 'aks nodepool update -g {resource_group} --cluster-name {name} -n {nodepool_name} ' \ - '--node-soak-duration 10' - self.cmd(update_nodepool_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('upgradeSettings.nodeSoakDurationInMinutes', 10), - ]) - - #actually running an upgrade is too expensive for these tests. + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--ssh-key-value={ssh_key_value} -c 1" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + add_nodepool_cmd = ( + "aks nodepool add -g {resource_group} --cluster-name {name} -n {nodepool_name} " + "--mode user --node-soak-duration 5" + ) + self.cmd( + add_nodepool_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("upgradeSettings.nodeSoakDurationInMinutes", 5), + ], + ) + + update_nodepool_cmd = ( + "aks nodepool update -g {resource_group} --cluster-name {name} -n {nodepool_name} " + "--node-soak-duration 10" + ) + self.cmd( + update_nodepool_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("upgradeSettings.nodeSoakDurationInMinutes", 10), + ], + ) + + # actually running an upgrade is too expensive for these tests. # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) def test_aks_nodepool_stop_and_start(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'nodepool_name': nodepool_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "nodepool_name": nodepool_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create aks cluster - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # add nodepool - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool_name} --node-count=2', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool_name} --node-count=2", + checks=[self.check("provisioningState", "Succeeded")], + ) # stop nodepool - self.cmd('aks nodepool stop --resource-group={resource_group} --cluster-name={name} --nodepool-name={nodepool_name} --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/PreviewStartStopAgentPool', checks=[ - self.check('powerState.code', 'Stopped') - ]) + self.cmd( + "aks nodepool stop --resource-group={resource_group} --cluster-name={name} --nodepool-name={nodepool_name} --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/PreviewStartStopAgentPool", + checks=[self.check("powerState.code", "Stopped")], + ) # start nodepool - self.cmd('aks nodepool start --resource-group={resource_group} --cluster-name={name} --nodepool-name={nodepool_name} --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/PreviewStartStopAgentPool', checks=[ - self.check('powerState.code', 'Running') - ]) + self.cmd( + "aks nodepool start --resource-group={resource_group} --cluster-name={name} --nodepool-name={nodepool_name} --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/PreviewStartStopAgentPool", + checks=[self.check("powerState.code", "Running")], + ) # delete AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_nodepool_add_with_gpu_instance_profile(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - node_pool_name_second = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'node_pool_name_second': node_pool_name_second, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--nodepool-name {node_pool_name} -c 1 ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_nodepool_add_with_gpu_instance_profile( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + node_pool_name_second = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "node_pool_name_second": node_pool_name_second, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--nodepool-name {node_pool_name} -c 1 " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # nodepool get-upgrades - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name_second} ' - '--gpu-instance-profile=MIG3g ' - '-c 1 ' - '--aks-custom-headers UseGPUDedicatedVHD=true ' - '--node-vm-size=standard_nd96asr_v4', - checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('gpuInstanceProfile', 'MIG3g'), - ]) + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name_second} " + "--gpu-instance-profile=MIG3g " + "-c 1 " + "--aks-custom-headers UseGPUDedicatedVHD=true " + "--node-vm-size=standard_nd96asr_v4", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("gpuInstanceProfile", "MIG3g"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_nodepool_get_upgrades(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--nodepool-name {node_pool_name} -c 1 ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--nodepool-name {node_pool_name} -c 1 " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # nodepool get-upgrades - self.cmd('aks nodepool get-upgrades ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--nodepool-name={node_pool_name}', - checks=[ - # if rerun the recording, please update latestNodeImageVersion to the latest value - self.check_pattern('latestNodeImageVersion', - 'AKSUbuntu-(\d{{2}})04gen2containerd-202([0-9])(0[1-9]|1[012]).(0[1-9]|[12]\d|3[01]).(\d)'), - self.check( - 'type', "Microsoft.ContainerService/managedClusters/agentPools/upgradeProfiles") - ]) + self.cmd( + "aks nodepool get-upgrades " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--nodepool-name={node_pool_name}", + checks=[ + self.exists("latestNodeImageVersion"), + self.check( + "type", + "Microsoft.ContainerService/managedClusters/agentPools/upgradeProfiles", + ), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus2') - def test_aks_nodepool_delete_with_ignore_pod_disruption_budget(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - node_pool_name_second = self.create_random_name('c', 6) - node_pool_name_third = self.create_random_name('c', 6) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'node_pool_name': node_pool_name, - 'node_pool_name_second': node_pool_name_second, - 'node_pool_name_third': node_pool_name_third, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--nodepool-name {node_pool_name} -c 1 ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '-c 1 ' - '--name={node_pool_name_second}', - checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '-c 1 ' - '--name={node_pool_name_third}', - checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus2" + ) + def test_aks_nodepool_delete_with_ignore_pod_disruption_budget( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + node_pool_name_second = self.create_random_name("c", 6) + node_pool_name_third = self.create_random_name("c", 6) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "node_pool_name": node_pool_name, + "node_pool_name_second": node_pool_name_second, + "node_pool_name_third": node_pool_name_third, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--nodepool-name {node_pool_name} -c 1 " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "-c 1 " + "--name={node_pool_name_second}", + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "-c 1 " + "--name={node_pool_name_third}", + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # nodepool delete the third self.cmd( - 'aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={node_pool_name_third} --ignore-pod-disruption-budget=false --no-wait', checks=[self.is_empty()]) + "aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={node_pool_name_third} --ignore-pod-disruption-budget=false --no-wait", + checks=[self.is_empty()], + ) # nodepool delete the second self.cmd( - 'aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={node_pool_name_second} --ignore-pod-disruption-budget=true', checks=[self.is_empty()]) - + "aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={node_pool_name_second} --ignore-pod-disruption-budget=true", + checks=[self.is_empty()], + ) # delete the cluster self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_nodepool_snapshot(self, resource_group, resource_group_location): - create_version, upgrade_version = self._get_versions( - resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - aks_name2 = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('c', 6) - nodepool_name2 = self.create_random_name('c', 6) - snapshot_name = self.create_random_name('s', 16) + create_version, upgrade_version = self._get_versions(resource_group_location) + aks_name = self.create_random_name("cliakstest", 16) + aks_name2 = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("c", 6) + nodepool_name2 = self.create_random_name("c", 6) + snapshot_name = self.create_random_name("s", 16) tagVar = "test" tagVal = "value" - tags = tagVar+"="+tagVal - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'aks_name2': aks_name2, - 'location': resource_group_location, - 'nodepool_name': nodepool_name, - 'nodepool_name2': nodepool_name2, - 'snapshot_name': snapshot_name, - 'k8s_version': create_version, - 'upgrade_k8s_version': upgrade_version, - 'ssh_key_value': self.generate_ssh_keys(), - 'tags': tags - }) + tags = tagVar + "=" + tagVal + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "aks_name2": aks_name2, + "location": resource_group_location, + "nodepool_name": nodepool_name, + "nodepool_name2": nodepool_name2, + "snapshot_name": snapshot_name, + "k8s_version": create_version, + "upgrade_k8s_version": upgrade_version, + "ssh_key_value": self.generate_ssh_keys(), + "tags": tags, + } + ) # create an aks cluster not using snapshot - create_cmd = 'aks create --resource-group {resource_group} --name {name} --location {location} ' \ - '--nodepool-name {nodepool_name} ' \ - '--node-count 1 ' \ - '--ssh-key-value={ssh_key_value} -o json' - response = self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]).get_output_in_json() + create_cmd = ( + "aks create --resource-group {resource_group} --name {name} --location {location} " + "--nodepool-name {nodepool_name} " + "--node-count 1 " + "--ssh-key-value={ssh_key_value} -o json" + ) + response = self.cmd( + create_cmd, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() cluster_resource_id = response["id"] assert cluster_resource_id is not None nodepool_resource_id = cluster_resource_id + "/agentPools/" + nodepool_name - self.kwargs.update({ - 'nodepool_resource_id': nodepool_resource_id, - }) + self.kwargs.update( + { + "nodepool_resource_id": nodepool_resource_id, + } + ) print("The nodepool resource id %s " % nodepool_resource_id) # create snapshot from the nodepool - create_snapshot_cmd = 'aks nodepool snapshot create --resource-group {resource_group} --name {snapshot_name} --location {location} ' \ - '--nodepool-id {nodepool_resource_id} -o json' - response = self.cmd(create_snapshot_cmd, checks=[ - self.check('creationData.sourceResourceId', nodepool_resource_id) - ]).get_output_in_json() + create_snapshot_cmd = ( + "aks nodepool snapshot create --resource-group {resource_group} --name {snapshot_name} --location {location} " + "--nodepool-id {nodepool_resource_id} -o json" + ) + response = self.cmd( + create_snapshot_cmd, + checks=[self.check("creationData.sourceResourceId", nodepool_resource_id)], + ).get_output_in_json() snapshot_resource_id = response["id"] assert snapshot_resource_id is not None - self.kwargs.update({ - 'snapshot_resource_id': snapshot_resource_id, - }) + self.kwargs.update( + { + "snapshot_resource_id": snapshot_resource_id, + } + ) print("The snapshot resource id %s " % snapshot_resource_id) # update tags on nodepool snapshot - update_snapshot_cmd = 'aks nodepool snapshot update --resource-group {resource_group} --name {snapshot_name} --tags {tags} -o json' - response = self.cmd(update_snapshot_cmd, checks=[ - self.check('tags', {tagVar: tagVal}) - ]).get_output_in_json() + update_snapshot_cmd = "aks nodepool snapshot update --resource-group {resource_group} --name {snapshot_name} --tags {tags} -o json" + response = self.cmd( + update_snapshot_cmd, checks=[self.check("tags", {tagVar: tagVal})] + ).get_output_in_json() # delete the original AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) # show the snapshot - show_snapshot_cmd = 'aks nodepool snapshot show --resource-group {resource_group} --name {snapshot_name} -o json' - response = self.cmd(show_snapshot_cmd, checks=[ - self.check('creationData.sourceResourceId', nodepool_resource_id) - ]).get_output_in_json() + show_snapshot_cmd = "aks nodepool snapshot show --resource-group {resource_group} --name {snapshot_name} -o json" + response = self.cmd( + show_snapshot_cmd, + checks=[self.check("creationData.sourceResourceId", nodepool_resource_id)], + ).get_output_in_json() # list the snapshots - list_snapshot_cmd = 'aks nodepool snapshot list --resource-group {resource_group} -o json' + list_snapshot_cmd = ( + "aks nodepool snapshot list --resource-group {resource_group} -o json" + ) response = self.cmd(list_snapshot_cmd, checks=[]).get_output_in_json() assert len(response) > 0 # create another aks cluster using this snapshot - create_cmd = 'aks create --resource-group {resource_group} --name {aks_name2} --location {location} ' \ - '--nodepool-name {nodepool_name} ' \ - '--node-count 1 --snapshot-id {snapshot_resource_id} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'agentPoolProfiles[0].creationData.sourceResourceId', snapshot_resource_id) - ]).get_output_in_json() + create_cmd = ( + "aks create --resource-group {resource_group} --name {aks_name2} --location {location} " + "--nodepool-name {nodepool_name} " + "--node-count 1 --snapshot-id {snapshot_resource_id} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "agentPoolProfiles[0].creationData.sourceResourceId", + snapshot_resource_id, + ), + ], + ).get_output_in_json() # add a new nodepool to this cluster using this snapshot - add_nodepool_cmd = 'aks nodepool add --resource-group={resource_group} --cluster-name={aks_name2} --name={nodepool_name2} --node-count 1 ' \ - '--snapshot-id {snapshot_resource_id} -o json' - self.cmd(add_nodepool_cmd, - checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('creationData.sourceResourceId', - snapshot_resource_id) - ]) + add_nodepool_cmd = ( + "aks nodepool add --resource-group={resource_group} --cluster-name={aks_name2} --name={nodepool_name2} --node-count 1 " + "--snapshot-id {snapshot_resource_id} -o json" + ) + self.cmd( + add_nodepool_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("creationData.sourceResourceId", snapshot_resource_id), + ], + ) # upgrade the nodepool2 using this snapshot again # upgrade_node_image_only_nodepool_cmd = 'aks nodepool upgrade ' \ @@ -2217,315 +3227,393 @@ def test_aks_nodepool_snapshot(self, resource_group, resource_group_location): # delete the 2nd AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {aks_name2} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {aks_name2} --yes --no-wait", + checks=[self.is_empty()], + ) # delete the snapshot - delete_snapshot_cmd = 'aks nodepool snapshot delete --resource-group {resource_group} --name {snapshot_name} --yes --no-wait' - self.cmd(delete_snapshot_cmd, checks=[ - self.is_empty() - ]) + delete_snapshot_cmd = "aks nodepool snapshot delete --resource-group {resource_group} --name {snapshot_name} --yes --no-wait" + self.cmd(delete_snapshot_cmd, checks=[self.is_empty()]) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', preserve_default_location=True) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) def test_aks_snapshot(self, resource_group, resource_group_location): print(resource_group_location) - create_version, upgrade_version = self._get_versions( - resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - aks_name2 = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('c', 6) - snapshot_name = self.create_random_name('s', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'aks_name2': aks_name2, - 'location': resource_group_location, - 'nodepool_name': nodepool_name, - 'snapshot_name': snapshot_name, - 'k8s_version': create_version, - 'upgrade_k8s_version': upgrade_version, - 'ssh_key_value': self.generate_ssh_keys() - }) + create_version, upgrade_version = self._get_versions(resource_group_location) + aks_name = self.create_random_name("cliakstest", 16) + aks_name2 = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("c", 6) + snapshot_name = self.create_random_name("s", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "aks_name2": aks_name2, + "location": resource_group_location, + "nodepool_name": nodepool_name, + "snapshot_name": snapshot_name, + "k8s_version": create_version, + "upgrade_k8s_version": upgrade_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create an aks cluster not using snapshot - create_cmd = 'aks create --resource-group {resource_group} --name {name} --location {location} ' \ - '--nodepool-name {nodepool_name} ' \ - '--node-count 1 ' \ - '-k {upgrade_k8s_version} ' \ - '--ssh-key-value={ssh_key_value} -o json' - response = self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]).get_output_in_json() + create_cmd = ( + "aks create --resource-group {resource_group} --name {name} --location {location} " + "--nodepool-name {nodepool_name} " + "--node-count 1 " + "-k {upgrade_k8s_version} " + "--ssh-key-value={ssh_key_value} -o json" + ) + response = self.cmd( + create_cmd, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() cluster_resource_id = response["id"] assert cluster_resource_id is not None - self.kwargs.update({ - 'cluster_resource_id': cluster_resource_id, - }) + self.kwargs.update( + { + "cluster_resource_id": cluster_resource_id, + } + ) print("The cluster resource id %s " % cluster_resource_id) # create snapshot from the cluster - create_snapshot_cmd = 'aks snapshot create --resource-group {resource_group} --name {snapshot_name} --location {location} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview ' \ - '--cluster-id {cluster_resource_id} -o json' - response = self.cmd(create_snapshot_cmd, checks=[ - self.check('creationData.sourceResourceId', cluster_resource_id) - ]).get_output_in_json() + create_snapshot_cmd = ( + "aks snapshot create --resource-group {resource_group} --name {snapshot_name} --location {location} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview " + "--cluster-id {cluster_resource_id} -o json" + ) + response = self.cmd( + create_snapshot_cmd, + checks=[self.check("creationData.sourceResourceId", cluster_resource_id)], + ).get_output_in_json() snapshot_resource_id = response["id"] assert snapshot_resource_id is not None - self.kwargs.update({ - 'snapshot_resource_id': snapshot_resource_id, - }) + self.kwargs.update( + { + "snapshot_resource_id": snapshot_resource_id, + } + ) print("The snapshot resource id %s " % snapshot_resource_id) # delete the original AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) # show the snapshot - show_snapshot_cmd = 'aks snapshot show --resource-group {resource_group} --name {snapshot_name} -o json' - response = self.cmd(show_snapshot_cmd, checks=[ - self.check('creationData.sourceResourceId', cluster_resource_id) - ]).get_output_in_json() + show_snapshot_cmd = "aks snapshot show --resource-group {resource_group} --name {snapshot_name} -o json" + response = self.cmd( + show_snapshot_cmd, + checks=[self.check("creationData.sourceResourceId", cluster_resource_id)], + ).get_output_in_json() # list the snapshots - list_snapshot_cmd = 'aks snapshot list --resource-group {resource_group} -o json' + list_snapshot_cmd = ( + "aks snapshot list --resource-group {resource_group} -o json" + ) response = self.cmd(list_snapshot_cmd, checks=[]).get_output_in_json() assert len(response) > 0 # create another aks cluster using this snapshot - create_cmd = 'aks create --resource-group {resource_group} --name {aks_name2} --location {location} ' \ - '--nodepool-name {nodepool_name} ' \ - '--node-count 1 --cluster-snapshot-id {snapshot_resource_id} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'creationData.sourceResourceId', snapshot_resource_id), - self.check( - 'kubernetesVersion', upgrade_version) - ]).get_output_in_json() + create_cmd = ( + "aks create --resource-group {resource_group} --name {aks_name2} --location {location} " + "--nodepool-name {nodepool_name} " + "--node-count 1 --cluster-snapshot-id {snapshot_resource_id} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("creationData.sourceResourceId", snapshot_resource_id), + self.check("kubernetesVersion", upgrade_version), + ], + ).get_output_in_json() # delete the 2nd AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {aks_name2} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {aks_name2} --yes --no-wait", + checks=[self.is_empty()], + ) # delete the snapshot - delete_snapshot_cmd = 'aks snapshot delete --resource-group {resource_group} --name {snapshot_name} --yes --no-wait' - self.cmd(delete_snapshot_cmd, checks=[ - self.is_empty() - ]) + delete_snapshot_cmd = "aks snapshot delete --resource-group {resource_group} --name {snapshot_name} --yes --no-wait" + self.cmd(delete_snapshot_cmd, checks=[self.is_empty()]) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', preserve_default_location=True) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) def test_aks_snapshot_upgrade(self, resource_group, resource_group_location): print(resource_group_location) - create_version, upgrade_version = self._get_versions( - resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - aks_name2 = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('c', 6) - snapshot_name = self.create_random_name('s', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'aks_name2': aks_name2, - 'location': resource_group_location, - 'nodepool_name': nodepool_name, - 'snapshot_name': snapshot_name, - 'k8s_version': create_version, - 'upgrade_k8s_version': upgrade_version, - 'ssh_key_value': self.generate_ssh_keys() - }) + create_version, upgrade_version = self._get_versions(resource_group_location) + aks_name = self.create_random_name("cliakstest", 16) + aks_name2 = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("c", 6) + snapshot_name = self.create_random_name("s", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "aks_name2": aks_name2, + "location": resource_group_location, + "nodepool_name": nodepool_name, + "snapshot_name": snapshot_name, + "k8s_version": create_version, + "upgrade_k8s_version": upgrade_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create an aks cluster not using snapshot - create_cmd = 'aks create --resource-group {resource_group} --name {name} --location {location} ' \ - '--nodepool-name {nodepool_name} ' \ - '--node-count 1 ' \ - '-k {upgrade_k8s_version} ' \ - '--ssh-key-value={ssh_key_value} -o json' - response = self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]).get_output_in_json() + create_cmd = ( + "aks create --resource-group {resource_group} --name {name} --location {location} " + "--nodepool-name {nodepool_name} " + "--node-count 1 " + "-k {upgrade_k8s_version} " + "--ssh-key-value={ssh_key_value} -o json" + ) + response = self.cmd( + create_cmd, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() cluster_resource_id = response["id"] assert cluster_resource_id is not None - self.kwargs.update({ - 'cluster_resource_id': cluster_resource_id, - }) + self.kwargs.update( + { + "cluster_resource_id": cluster_resource_id, + } + ) print("The cluster resource id %s " % cluster_resource_id) # create snapshot from the cluster - create_snapshot_cmd = 'aks snapshot create --resource-group {resource_group} --name {snapshot_name} --location {location} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview ' \ - '--cluster-id {cluster_resource_id} -o json' - response = self.cmd(create_snapshot_cmd, checks=[ - self.check('creationData.sourceResourceId', cluster_resource_id) - ]).get_output_in_json() + create_snapshot_cmd = ( + "aks snapshot create --resource-group {resource_group} --name {snapshot_name} --location {location} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview " + "--cluster-id {cluster_resource_id} -o json" + ) + response = self.cmd( + create_snapshot_cmd, + checks=[self.check("creationData.sourceResourceId", cluster_resource_id)], + ).get_output_in_json() snapshot_resource_id = response["id"] assert snapshot_resource_id is not None - self.kwargs.update({ - 'snapshot_resource_id': snapshot_resource_id, - }) + self.kwargs.update( + { + "snapshot_resource_id": snapshot_resource_id, + } + ) print("The snapshot resource id %s " % snapshot_resource_id) # delete the original AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) # show the snapshot - show_snapshot_cmd = 'aks snapshot show --resource-group {resource_group} --name {snapshot_name} -o json' - response = self.cmd(show_snapshot_cmd, checks=[ - self.check('creationData.sourceResourceId', cluster_resource_id) - ]).get_output_in_json() + show_snapshot_cmd = "aks snapshot show --resource-group {resource_group} --name {snapshot_name} -o json" + response = self.cmd( + show_snapshot_cmd, + checks=[self.check("creationData.sourceResourceId", cluster_resource_id)], + ).get_output_in_json() # list the snapshots - list_snapshot_cmd = 'aks snapshot list --resource-group {resource_group} -o json' + list_snapshot_cmd = ( + "aks snapshot list --resource-group {resource_group} -o json" + ) response = self.cmd(list_snapshot_cmd, checks=[]).get_output_in_json() assert len(response) > 0 # create another aks cluster not using snapshot - create_cmd = 'aks create --resource-group {resource_group} --name {aks_name2} --location {location} ' \ - '--nodepool-name {nodepool_name} ' \ - '--node-count 1 ' \ - '-k {k8s_version} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'kubernetesVersion', create_version) - ]).get_output_in_json() + create_cmd = ( + "aks create --resource-group {resource_group} --name {aks_name2} --location {location} " + "--nodepool-name {nodepool_name} " + "--node-count 1 " + "-k {k8s_version} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("kubernetesVersion", create_version), + ], + ).get_output_in_json() # upgrade the second aks cluster using this snapshot - upgrade_cmd = 'aks upgrade --resource-group {resource_group} --name {aks_name2} ' \ - '--cluster-snapshot-id {snapshot_resource_id} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview --yes -o json' - self.cmd(upgrade_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'creationData.sourceResourceId', snapshot_resource_id), - self.check( - 'kubernetesVersion', upgrade_version) - ]).get_output_in_json() + upgrade_cmd = ( + "aks upgrade --resource-group {resource_group} --name {aks_name2} " + "--cluster-snapshot-id {snapshot_resource_id} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview --yes -o json" + ) + self.cmd( + upgrade_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("creationData.sourceResourceId", snapshot_resource_id), + self.check("kubernetesVersion", upgrade_version), + ], + ).get_output_in_json() # delete the 2nd AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {aks_name2} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {aks_name2} --yes --no-wait", + checks=[self.is_empty()], + ) # delete the snapshot - delete_snapshot_cmd = 'aks snapshot delete --resource-group {resource_group} --name {snapshot_name} --yes --no-wait' - self.cmd(delete_snapshot_cmd, checks=[ - self.is_empty() - ]) + delete_snapshot_cmd = "aks snapshot delete --resource-group {resource_group} --name {snapshot_name} --yes --no-wait" + self.cmd(delete_snapshot_cmd, checks=[self.is_empty()]) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', preserve_default_location=True) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) def test_aks_snapshot_update(self, resource_group, resource_group_location): print(resource_group_location) - create_version, upgrade_version = self._get_versions( - resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - aks_name2 = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('c', 6) - snapshot_name = self.create_random_name('s', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'aks_name2': aks_name2, - 'location': resource_group_location, - 'nodepool_name': nodepool_name, - 'snapshot_name': snapshot_name, - 'k8s_version': upgrade_version, - 'ssh_key_value': self.generate_ssh_keys() - }) + create_version, upgrade_version = self._get_versions(resource_group_location) + aks_name = self.create_random_name("cliakstest", 16) + aks_name2 = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("c", 6) + snapshot_name = self.create_random_name("s", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "aks_name2": aks_name2, + "location": resource_group_location, + "nodepool_name": nodepool_name, + "snapshot_name": snapshot_name, + "k8s_version": upgrade_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create an aks cluster not using snapshot - create_cmd = 'aks create --resource-group {resource_group} --name {name} --location {location} ' \ - '--nodepool-name {nodepool_name} ' \ - '--node-count 1 ' \ - '-k {k8s_version} ' \ - '--ssh-key-value={ssh_key_value} -o json' - response = self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]).get_output_in_json() + create_cmd = ( + "aks create --resource-group {resource_group} --name {name} --location {location} " + "--nodepool-name {nodepool_name} " + "--node-count 1 " + "-k {k8s_version} " + "--ssh-key-value={ssh_key_value} -o json" + ) + response = self.cmd( + create_cmd, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() cluster_resource_id = response["id"] assert cluster_resource_id is not None - self.kwargs.update({ - 'cluster_resource_id': cluster_resource_id, - }) + self.kwargs.update( + { + "cluster_resource_id": cluster_resource_id, + } + ) print("The cluster resource id %s " % cluster_resource_id) # create snapshot from the cluster - create_snapshot_cmd = 'aks snapshot create --resource-group {resource_group} --name {snapshot_name} --location {location} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview ' \ - '--cluster-id {cluster_resource_id} -o json' - response = self.cmd(create_snapshot_cmd, checks=[ - self.check('creationData.sourceResourceId', cluster_resource_id) - ]).get_output_in_json() + create_snapshot_cmd = ( + "aks snapshot create --resource-group {resource_group} --name {snapshot_name} --location {location} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview " + "--cluster-id {cluster_resource_id} -o json" + ) + response = self.cmd( + create_snapshot_cmd, + checks=[self.check("creationData.sourceResourceId", cluster_resource_id)], + ).get_output_in_json() snapshot_resource_id = response["id"] assert snapshot_resource_id is not None - self.kwargs.update({ - 'snapshot_resource_id': snapshot_resource_id, - }) + self.kwargs.update( + { + "snapshot_resource_id": snapshot_resource_id, + } + ) print("The snapshot resource id %s " % snapshot_resource_id) # delete the original AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) # show the snapshot - show_snapshot_cmd = 'aks snapshot show --resource-group {resource_group} --name {snapshot_name} -o json' - response = self.cmd(show_snapshot_cmd, checks=[ - self.check('creationData.sourceResourceId', cluster_resource_id) - ]).get_output_in_json() + show_snapshot_cmd = "aks snapshot show --resource-group {resource_group} --name {snapshot_name} -o json" + response = self.cmd( + show_snapshot_cmd, + checks=[self.check("creationData.sourceResourceId", cluster_resource_id)], + ).get_output_in_json() # list the snapshots - list_snapshot_cmd = 'aks snapshot list --resource-group {resource_group} -o json' + list_snapshot_cmd = ( + "aks snapshot list --resource-group {resource_group} -o json" + ) response = self.cmd(list_snapshot_cmd, checks=[]).get_output_in_json() assert len(response) > 0 # create another aks cluster not using snapshot - create_cmd = 'aks create --resource-group {resource_group} --name {aks_name2} --location {location} ' \ - '--nodepool-name {nodepool_name} ' \ - '--node-count 1 ' \ - '-k {k8s_version} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'kubernetesVersion', upgrade_version) - ]).get_output_in_json() + create_cmd = ( + "aks create --resource-group {resource_group} --name {aks_name2} --location {location} " + "--nodepool-name {nodepool_name} " + "--node-count 1 " + "-k {k8s_version} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("kubernetesVersion", upgrade_version), + ], + ).get_output_in_json() # update the second aks cluster using this snapshot - update_cmd = 'aks update --resource-group {resource_group} --name {aks_name2} ' \ - '--cluster-snapshot-id {snapshot_resource_id} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'creationData.sourceResourceId', snapshot_resource_id), - ]).get_output_in_json() + update_cmd = ( + "aks update --resource-group {resource_group} --name {aks_name2} " + "--cluster-snapshot-id {snapshot_resource_id} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ManagedClusterSnapshotPreview -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("creationData.sourceResourceId", snapshot_resource_id), + ], + ).get_output_in_json() # delete the 2nd AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {aks_name2} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {aks_name2} --yes --no-wait", + checks=[self.is_empty()], + ) # delete the snapshot - delete_snapshot_cmd = 'aks snapshot delete --resource-group {resource_group} --name {snapshot_name} --yes --no-wait' - self.cmd(delete_snapshot_cmd, checks=[ - self.is_empty() - ]) + delete_snapshot_cmd = "aks snapshot delete --resource-group {resource_group} --name {snapshot_name} --yes --no-wait" + self.cmd(delete_snapshot_cmd, checks=[self.is_empty()]) # @AllowLargeResponse() # @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') # def test_aks_upgrade_node_image_only_cluster(self, resource_group, resource_group_location): - # kwargs for string formatting + # kwargs for string formatting # aks_name = self.create_random_name('cliakstest', 16) # node_pool_name = self.create_random_name('c', 6) # self.kwargs.update({ @@ -2556,7 +3644,7 @@ def test_aks_snapshot_update(self, resource_group, resource_group_location): # @AllowLargeResponse() # @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') # def test_aks_upgrade_node_image_only_nodepool(self, resource_group, resource_group_location): - # kwargs for string formatting + # kwargs for string formatting # aks_name = self.create_random_name('cliakstest', 16) # node_pool_name = self.create_random_name('c', 6) # self.kwargs.update({ @@ -2591,176 +3679,231 @@ def test_aks_snapshot_update(self, resource_group, resource_group_location): # ]) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_upgrade_nodepool(self, resource_group, resource_group_location): - create_version, upgrade_version = self._get_versions( - resource_group_location) + create_version, upgrade_version = self._get_versions(resource_group_location) # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'windows_admin_username': 'azureuser1', - 'windows_admin_password': 'replace-Password1234$', - 'nodepool2_name': 'npwin', - 'k8s_version': create_version, - 'upgrade_k8s_version': upgrade_version, - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "windows_admin_username": "azureuser1", + "windows_admin_password": "replace-Password1234$", + "nodepool2_name": "npwin", + "k8s_version": create_version, + "upgrade_k8s_version": upgrade_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create AKS cluster - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 ' \ - '--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} ' \ - '--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure ' \ - '--kubernetes-version={k8s_version} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.adminUsername', 'azureuser1') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 " + "--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} " + "--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure " + "--kubernetes-version={k8s_version} --ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.adminUsername", "azureuser1"), + ], + ) # add Windows nodepool - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1", + checks=[self.check("provisioningState", "Succeeded")], + ) # upgrade cluster control plane only - self.cmd('aks upgrade --resource-group={resource_group} --name={name} --kubernetes-version={upgrade_k8s_version} --yes', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks upgrade --resource-group={resource_group} --name={name} --kubernetes-version={upgrade_k8s_version} --yes", + checks=[self.check("provisioningState", "Succeeded")], + ) # upgrade Windows nodepool - self.cmd('aks nodepool upgrade --resource-group={resource_group} --cluster-name={name} ' - '--name={nodepool2_name} --kubernetes-version={upgrade_k8s_version} ' - '--aks-custom-headers WindowsContainerRuntime=containerd --yes', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks nodepool upgrade --resource-group={resource_group} --cluster-name={name} " + "--name={nodepool2_name} --kubernetes-version={upgrade_k8s_version} " + "--aks-custom-headers WindowsContainerRuntime=containerd --yes", + checks=[self.check("provisioningState", "Succeeded")], + ) # delete AKS cluster self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_create_with_windows(self, resource_group, resource_group_location): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'windows_admin_username': 'azureuser1', - 'windows_admin_password': 'replace-Password1234$', - 'nodepool2_name': 'npwin', - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "windows_admin_username": "azureuser1", + "windows_admin_password": "replace-Password1234$", + "nodepool2_name": "npwin", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 ' \ - '--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} ' \ - '--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.adminUsername', 'azureuser1') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 " + "--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} " + "--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.adminUsername", "azureuser1"), + ], + ) # nodepool add - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1", + checks=[self.check("provisioningState", "Succeeded")], + ) # update Windows license type - self.cmd('aks update --resource-group={resource_group} --name={name} --enable-ahub', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.licenseType', 'Windows_Server') - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --enable-ahub", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.licenseType", "Windows_Server"), + ], + ) # nodepool delete self.cmd( - 'aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait', checks=[self.is_empty()]) + "aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait", + checks=[self.is_empty()], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) def test_aks_create_with_fips(self, resource_group, resource_group_location): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'nodepool2_name': 'np2', - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "nodepool2_name": "np2", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-fips-image ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].enableFips', True) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-fips-image " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].enableFips", True), + ], + ) # nodepool add - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --enable-fips-image', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('enableFips', True) - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --enable-fips-image", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("enableFips", True), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) # the availability of features is controlled by a toggle and cannot be fully tested yet, # however, existing test results show that the client side works as expected, so exclude it at this moment @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_nodepool_add_with_artifact_streaming(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_nodepool_add_with_artifact_streaming( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'nodepool2_name': 'np2', - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "nodepool2_name": "np2", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/ArtifactStreamingPreview ' + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--ssh-key-value={ssh_key_value} " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/ArtifactStreamingPreview " + ) - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # nodepool add self.cmd( @@ -2776,234 +3919,385 @@ def test_aks_nodepool_add_with_artifact_streaming(self, resource_group, resource # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_create_with_ahub(self, resource_group, resource_group_location): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'windows_admin_username': 'azureuser1', - 'windows_admin_password': 'replace-Password1234$', - 'nodepool2_name': 'npwin', - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "windows_admin_username": "azureuser1", + "windows_admin_password": "replace-Password1234$", + "nodepool2_name": "npwin", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 ' \ - '--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} ' \ - '--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure --enable-ahub ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.adminUsername', 'azureuser1'), - self.check('windowsProfile.licenseType', 'Windows_Server') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 " + "--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} " + "--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure --enable-ahub " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.adminUsername", "azureuser1"), + self.check("windowsProfile.licenseType", "Windows_Server"), + ], + ) # nodepool add - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1", + checks=[self.check("provisioningState", "Succeeded")], + ) # update Windows license type - self.cmd('aks update --resource-group={resource_group} --name={name} --disable-ahub', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.licenseType', 'None') - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --disable-ahub", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.licenseType", "None"), + ], + ) # nodepool delete self.cmd( - 'aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait', checks=[self.is_empty()]) + "aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait", + checks=[self.is_empty()], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westeurope') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westeurope" + ) def test_aks_update_to_msi_cluster(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # update to MSI cluster - self.cmd('aks update --resource-group={resource_group} --name={name} --enable-managed-identity --yes', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('identity.type', 'SystemAssigned') - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --enable-managed-identity --yes", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("identity.type", "SystemAssigned"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_create_with_gitops_addon(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} -a gitops ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.gitops.enabled', True), - ]) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_create_with_gitops_addon( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} -a gitops " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.gitops.enabled", True), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_enable_addon_with_gitops(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.gitops', None), - ]) - - enable_cmd = 'aks enable-addons --addons gitops --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.gitops.enabled', True), - ]) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_enable_addon_with_gitops( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.gitops", None), + ], + ) + + enable_cmd = "aks enable-addons --addons gitops --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.gitops.enabled", True), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) def test_aks_disable_addon_gitops(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} -a gitops ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.gitops.enabled', True), - ]) - - disable_cmd = 'aks disable-addons --addons gitops --resource-group={resource_group} --name={name} -o json' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('addonProfiles.gitops.enabled', False), - self.check('addonProfiles.gitops.config', None) - ]) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} -a gitops " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.gitops.enabled", True), + ], + ) + + disable_cmd = "aks disable-addons --addons gitops --resource-group={resource_group} --name={name} -o json" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.gitops.enabled", False), + self.check("addonProfiles.gitops.config", None), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westeurope') - def test_aks_update_to_msi_cluster_with_addons(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-addons monitoring ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westeurope" + ) + def test_aks_update_to_msi_cluster_with_addons( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-addons monitoring " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # update to MSI cluster - self.cmd('aks update --resource-group={resource_group} --name={name} --enable-managed-identity --yes', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('identity.type', 'SystemAssigned') - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --enable-managed-identity --yes", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("identity.type", "SystemAssigned"), + ], + ) # check egress endpoints = self.cmd( - 'aks egress-endpoints list --resource-group={resource_group} --name={name}').get_output_in_json() + "aks egress-endpoints list --resource-group={resource_group} --name={name}" + ).get_output_in_json() categories = [e["category"] for e in endpoints] assert "addon-monitoring" in categories # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_monitoring_aad_auth_msi(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_monitoring_aad_auth_msi( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.create_new_cluster_with_monitoring_aad_auth( - resource_group, resource_group_location, aks_name, user_assigned_identity=False) + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=False, + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_monitoring_aad_auth_uai(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_monitoring_aad_auth_uai( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.create_new_cluster_with_monitoring_aad_auth( - resource_group, resource_group_location, aks_name, user_assigned_identity=True) + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=True, + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_monitoring_aad_auth_msi_with_syslog(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_monitoring_aad_auth_msi_with_syslog( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.create_new_cluster_with_monitoring_aad_auth( - resource_group, resource_group_location, aks_name, user_assigned_identity=False, syslog_enabled=True) + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=False, + syslog_enabled=True, + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_monitoring_aad_auth_msi_with_datacollectionsettings(self, resource_group, resource_group_location,): - aks_name = self.create_random_name('cliakstest', 16) - self.create_new_cluster_with_monitoring_aad_auth(resource_group, resource_group_location, aks_name, user_assigned_identity=False, syslog_enabled=False, data_collection_settings=_get_test_data_file('datacollectionsettings.json')) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_monitoring_aad_auth_msi_with_datacollectionsettings( + self, + resource_group, + resource_group_location, + ): + aks_name = self.create_random_name("cliakstest", 16) + self.create_new_cluster_with_monitoring_aad_auth( + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=False, + syslog_enabled=False, + data_collection_settings=_get_test_data_file("datacollectionsettings.json"), + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_monitoring_aad_auth_uai_with_syslog(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_monitoring_aad_auth_uai_with_syslog( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.create_new_cluster_with_monitoring_aad_auth( - resource_group, resource_group_location, aks_name, user_assigned_identity=True, syslog_enabled=True) + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=True, + syslog_enabled=True, + ) - def create_new_cluster_with_monitoring_aad_auth(self, resource_group, resource_group_location, aks_name, user_assigned_identity=False, syslog_enabled=False, data_collection_settings=None): - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + def create_new_cluster_with_monitoring_aad_auth( + self, + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=False, + syslog_enabled=False, + data_collection_settings=None, + ): + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) if user_assigned_identity: - uai_cmd = f'identity create -g {resource_group} -n {aks_name}_uai' + uai_cmd = f"identity create -g {resource_group} -n {aks_name}_uai" resp = self.cmd(uai_cmd).get_output_in_json() identity_id = resp["id"] print("********************") @@ -3011,126 +4305,240 @@ def create_new_cluster_with_monitoring_aad_auth(self, resource_group, resource_g print("********************") # create - create_cmd = f'aks create --resource-group={resource_group} --name={aks_name} --location={resource_group_location} ' \ - '--enable-managed-identity ' \ - '--enable-addons monitoring ' \ - '--node-count 1 ' \ - '--ssh-key-value={ssh_key_value} ' - create_cmd += f'--assign-identity {identity_id} ' if user_assigned_identity else '' - create_cmd += f'--enable-syslog ' if syslog_enabled else '' - create_cmd += f'--data-collection-settings {data_collection_settings} ' if data_collection_settings else '' - - response = self.cmd(create_cmd, checks=[ - self.check('addonProfiles.omsagent.enabled', True), - self.check('addonProfiles.omsagent.config.useAADAuth', 'true') - ]).get_output_in_json() + create_cmd = ( + f"aks create --resource-group={resource_group} --name={aks_name} --location={resource_group_location} " + "--enable-managed-identity " + "--enable-addons monitoring " + "--node-count 1 " + "--ssh-key-value={ssh_key_value} " + ) + create_cmd += ( + f"--assign-identity {identity_id} " if user_assigned_identity else "" + ) + create_cmd += "--enable-syslog " if syslog_enabled else "" + create_cmd += ( + f"--data-collection-settings {data_collection_settings} " + if data_collection_settings + else "" + ) + + response = self.cmd( + create_cmd, + checks=[ + self.check("addonProfiles.omsagent.enabled", True), + self.check("addonProfiles.omsagent.config.useAADAuth", "true"), + ], + ).get_output_in_json() cluster_resource_id = response["id"] subscription = cluster_resource_id.split("/")[2] - workspace_resource_id = response["addonProfiles"]["omsagent"]["config"]["logAnalyticsWorkspaceResourceID"] - workspace_name = workspace_resource_id.split("/")[-1] - workspace_resource_group = workspace_resource_id.split("/")[4] + workspace_resource_id = response["addonProfiles"]["omsagent"]["config"][ + "logAnalyticsWorkspaceResourceID" + ] # check that the DCR was created location = resource_group_location dataCollectionRuleName = f"MSCI-{location}-{aks_name}" dataCollectionRuleName = dataCollectionRuleName[0:64] dcr_resource_id = f"/subscriptions/{subscription}/resourceGroups/{resource_group}/providers/Microsoft.Insights/dataCollectionRules/{dataCollectionRuleName}" - get_cmd = f'rest --method get --url https://management.azure.com{dcr_resource_id}?api-version=2022-06-01' - self.cmd(get_cmd, checks=[ - self.check( - 'properties.destinations.logAnalytics[0].workspaceResourceId', f'{workspace_resource_id}') - ]) + get_cmd = f"rest --method get --url https://management.azure.com{dcr_resource_id}?api-version=2022-06-01" + self.cmd( + get_cmd, + checks=[ + self.check( + "properties.destinations.logAnalytics[0].workspaceResourceId", + f"{workspace_resource_id}", + ) + ], + ) if syslog_enabled: - self.cmd(get_cmd, checks=[ - self.check('properties.dataSources.syslog[0].streams[0]', f'Microsoft-Syslog') - ]) + self.cmd( + get_cmd, + checks=[ + self.check( + "properties.dataSources.syslog[0].streams[0]", + "Microsoft-Syslog", + ) + ], + ) if data_collection_settings: - self.cmd(get_cmd, checks=[ - self.check('properties.dataSources.extensions[0].name', f'ContainerInsightsExtension'), - self.check('properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.interval', f'1m'), - self.check('properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.namespaceFilteringMode', f'Include'), - self.check('properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.namespaces[0]', f'kube-system'), - self.check('properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.streams[0]', f'Microsoft-ContainerLogV2'), - self.check('properties.dataFlows[0].streams[0]', f'Microsoft-ContainerLogV2'), - self.check('properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.enableContainerLogV2', True) - ]) + self.cmd( + get_cmd, + checks=[ + self.check( + "properties.dataSources.extensions[0].name", + "ContainerInsightsExtension", + ), + self.check( + "properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.interval", + "1m", + ), + self.check( + "properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.namespaceFilteringMode", + "Include", + ), + self.check( + "properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.namespaces[0]", + "kube-system", + ), + self.check( + "properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.streams[0]", + "Microsoft-ContainerLogV2", + ), + self.check( + "properties.dataFlows[0].streams[0]", + "Microsoft-ContainerLogV2", + ), + self.check( + "properties.dataSources.extensions[0].extensionSettings.dataCollectionSettings.enableContainerLogV2", + True, + ), + ], + ) # check that the DCR-A was created dcra_resource_id = f"{cluster_resource_id}/providers/Microsoft.Insights/dataCollectionRuleAssociations/ContainerInsightsExtension" - get_cmd = f'rest --method get --url https://management.azure.com{dcra_resource_id}?api-version=2022-06-01' - self.cmd(get_cmd, checks=[ - self.check('properties.dataCollectionRuleId', f'{dcr_resource_id}') - ]) + get_cmd = f"rest --method get --url https://management.azure.com{dcra_resource_id}?api-version=2022-06-01" + self.cmd( + get_cmd, + checks=[ + self.check("properties.dataCollectionRuleId", f"{dcr_resource_id}") + ], + ) # make sure monitoring can be smoothly disabled - self.cmd( - f'aks disable-addons -a monitoring -g={resource_group} -n={aks_name}') + self.cmd(f"aks disable-addons -a monitoring -g={resource_group} -n={aks_name}") # delete self.cmd( - f'aks delete -g {resource_group} -n {aks_name} --yes --no-wait', checks=[self.is_empty()]) + f"aks delete -g {resource_group} -n {aks_name} --yes --no-wait", + checks=[self.is_empty()], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_enable_monitoring_with_aad_auth_msi(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_enable_monitoring_with_aad_auth_msi( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.enable_monitoring_existing_cluster_aad_atuh( - resource_group, resource_group_location, aks_name, user_assigned_identity=False) + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=False, + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_enable_monitoring_with_aad_auth_uai(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_enable_monitoring_with_aad_auth_uai( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.enable_monitoring_existing_cluster_aad_atuh( - resource_group, resource_group_location, aks_name, user_assigned_identity=True) + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=True, + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_enable_monitoring_with_aad_auth_msi_with_syslog(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_enable_monitoring_with_aad_auth_msi_with_syslog( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.enable_monitoring_existing_cluster_aad_atuh( - resource_group, resource_group_location, aks_name, user_assigned_identity=False, syslog_enabled=True) + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=False, + syslog_enabled=True, + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_enable_monitoring_with_aad_auth_uai_with_syslog(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_enable_monitoring_with_aad_auth_uai_with_syslog( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.enable_monitoring_existing_cluster_aad_atuh( - resource_group, resource_group_location, aks_name, user_assigned_identity=True, syslog_enabled=True) + resource_group, + resource_group_location, + aks_name, + user_assigned_identity=True, + syslog_enabled=True, + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_enable_monitoring_with_aad_auth_msi_with_syslog(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_enable_monitoring_with_aad_auth_msi_with_syslog( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.enable_monitoring_existing_cluster_aad_atuh( - resource_group, resource_group_location, aks_name, new_addon_cmd=True, user_assigned_identity=False, syslog_enabled=True) + resource_group, + resource_group_location, + aks_name, + new_addon_cmd=True, + user_assigned_identity=False, + syslog_enabled=True, + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_addon_enable_monitoring_with_aad_auth_uai_with_syslog(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_addon_enable_monitoring_with_aad_auth_uai_with_syslog( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) self.enable_monitoring_existing_cluster_aad_atuh( - resource_group, resource_group_location, aks_name, new_addon_cmd=True, user_assigned_identity=True, syslog_enabled=True) + resource_group, + resource_group_location, + aks_name, + new_addon_cmd=True, + user_assigned_identity=True, + syslog_enabled=True, + ) - def enable_monitoring_existing_cluster_aad_atuh(self, resource_group, resource_group_location, aks_name, new_addon_cmd=False, user_assigned_identity=False, syslog_enabled=False): - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + def enable_monitoring_existing_cluster_aad_atuh( + self, + resource_group, + resource_group_location, + aks_name, + new_addon_cmd=False, + user_assigned_identity=False, + syslog_enabled=False, + ): + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) if user_assigned_identity: - uai_cmd = f'identity create -g {resource_group} -n {aks_name}_uai' + uai_cmd = f"identity create -g {resource_group} -n {aks_name}_uai" resp = self.cmd(uai_cmd).get_output_in_json() identity_id = resp["id"] print("********************") @@ -3138,93 +4546,128 @@ def enable_monitoring_existing_cluster_aad_atuh(self, resource_group, resource_g print("********************") # create - create_cmd = f'aks create --resource-group={resource_group} --name={aks_name} --location={resource_group_location} ' \ - '--enable-managed-identity ' \ - '--node-count 1 ' \ - '--ssh-key-value={ssh_key_value} ' - create_cmd += f'--assign-identity {identity_id}' if user_assigned_identity else '' + create_cmd = ( + f"aks create --resource-group={resource_group} --name={aks_name} --location={resource_group_location} " + "--enable-managed-identity " + "--node-count 1 " + "--ssh-key-value={ssh_key_value} " + ) + create_cmd += ( + f"--assign-identity {identity_id}" if user_assigned_identity else "" + ) self.cmd(create_cmd) if new_addon_cmd: - enable_monitoring_cmd = 'aks addon enable -a monitoring ' + enable_monitoring_cmd = "aks addon enable -a monitoring " else: - enable_monitoring_cmd = 'aks enable-addons -a monitoring ' - enable_monitoring_cmd += f'--resource-group={resource_group} --name={aks_name} ' + enable_monitoring_cmd = "aks enable-addons -a monitoring " + enable_monitoring_cmd += f"--resource-group={resource_group} --name={aks_name} " if syslog_enabled: - enable_monitoring_cmd += f'--enable-syslog ' + enable_monitoring_cmd += "--enable-syslog " - response = self.cmd(enable_monitoring_cmd, checks=[ - self.check('addonProfiles.omsagent.enabled', True), - self.check('addonProfiles.omsagent.config.useAADAuth', 'true') - ]).get_output_in_json() + response = self.cmd( + enable_monitoring_cmd, + checks=[ + self.check("addonProfiles.omsagent.enabled", True), + self.check("addonProfiles.omsagent.config.useAADAuth", "true"), + ], + ).get_output_in_json() cluster_resource_id = response["id"] subscription = cluster_resource_id.split("/")[2] - workspace_resource_id = response["addonProfiles"]["omsagent"]["config"]["logAnalyticsWorkspaceResourceID"] - workspace_name = workspace_resource_id.split("/")[-1] - workspace_resource_group = workspace_resource_id.split("/")[4] + workspace_resource_id = response["addonProfiles"]["omsagent"]["config"][ + "logAnalyticsWorkspaceResourceID" + ] # check that the DCR was created location = resource_group_location dataCollectionRuleName = f"MSCI-{location}-{aks_name}" dataCollectionRuleName = dataCollectionRuleName[0:64] dcr_resource_id = f"/subscriptions/{subscription}/resourceGroups/{resource_group}/providers/Microsoft.Insights/dataCollectionRules/{dataCollectionRuleName}" - get_cmd = f'rest --method get --url https://management.azure.com{dcr_resource_id}?api-version=2022-06-01' - self.cmd(get_cmd, checks=[ - self.check( - 'properties.destinations.logAnalytics[0].workspaceResourceId', f'{workspace_resource_id}') - ]) + get_cmd = f"rest --method get --url https://management.azure.com{dcr_resource_id}?api-version=2022-06-01" + self.cmd( + get_cmd, + checks=[ + self.check( + "properties.destinations.logAnalytics[0].workspaceResourceId", + f"{workspace_resource_id}", + ) + ], + ) if syslog_enabled: - self.cmd(get_cmd, checks=[ - self.check('properties.dataSources.syslog[0].streams[0]', f'Microsoft-Syslog') - ]) + self.cmd( + get_cmd, + checks=[ + self.check( + "properties.dataSources.syslog[0].streams[0]", + "Microsoft-Syslog", + ) + ], + ) # check that the DCR-A was created dcra_resource_id = f"{cluster_resource_id}/providers/Microsoft.Insights/dataCollectionRuleAssociations/ContainerInsightsExtension" - get_cmd = f'rest --method get --url https://management.azure.com{dcra_resource_id}?api-version=2022-06-01' - self.cmd(get_cmd, checks=[ - self.check('properties.dataCollectionRuleId', f'{dcr_resource_id}') - ]) + get_cmd = f"rest --method get --url https://management.azure.com{dcra_resource_id}?api-version=2022-06-01" + self.cmd( + get_cmd, + checks=[ + self.check("properties.dataCollectionRuleId", f"{dcr_resource_id}") + ], + ) # make sure monitoring can be smoothly disabled - self.cmd( - f'aks disable-addons -a monitoring -g={resource_group} -n={aks_name}') + self.cmd(f"aks disable-addons -a monitoring -g={resource_group} -n={aks_name}") # delete self.cmd( - f'aks delete -g {resource_group} -n {aks_name} --yes --no-wait', checks=[self.is_empty()]) + f"aks delete -g {resource_group} -n {aks_name} --yes --no-wait", + checks=[self.is_empty()], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_monitoring_legacy_auth(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_monitoring_legacy_auth( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--enable-addons monitoring ' \ - '--node-count 1 ' \ - '--ssh-key-value={ssh_key_value} ' - response = self.cmd(create_cmd, checks=[ - self.check('addonProfiles.omsagent.enabled', True), - self.exists( - 'addonProfiles.omsagent.config.logAnalyticsWorkspaceResourceID') - ]).get_output_in_json() + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--enable-addons monitoring " + "--node-count 1 " + "--ssh-key-value={ssh_key_value} " + ) + response = self.cmd( + create_cmd, + checks=[ + self.check("addonProfiles.omsagent.enabled", True), + self.exists( + "addonProfiles.omsagent.config.logAnalyticsWorkspaceResourceID" + ), + ], + ).get_output_in_json() # make sure a DCR was not created cluster_resource_id = response["id"] subscription = cluster_resource_id.split("/")[2] - workspace_resource_id = response["addonProfiles"]["omsagent"]["config"]["logAnalyticsWorkspaceResourceID"] - workspace_resource_group = workspace_resource_id.split("/")[4] + workspace_resource_id = response["addonProfiles"]["omsagent"]["config"][ + "logAnalyticsWorkspaceResourceID" + ] try: # check that the DCR was created @@ -3232,229 +4675,325 @@ def test_aks_create_with_monitoring_legacy_auth(self, resource_group, resource_g dataCollectionRuleName = f"MSCI-{location}-{aks_name}" dataCollectionRuleName = dataCollectionRuleName[0:64] dcr_resource_id = f"/subscriptions/{subscription}/resourceGroups/{resource_group}/providers/Microsoft.Insights/dataCollectionRules/{dataCollectionRuleName}" - get_cmd = f'rest --method get --url https://management.azure.com{dcr_resource_id}?api-version=2022-06-01' - self.cmd(get_cmd, checks=[ - self.check( - 'properties.destinations.logAnalytics[0].workspaceResourceId', f'{workspace_resource_id}') - ]) + get_cmd = f"rest --method get --url https://management.azure.com{dcr_resource_id}?api-version=2022-06-01" + self.cmd( + get_cmd, + checks=[ + self.check( + "properties.destinations.logAnalytics[0].workspaceResourceId", + f"{workspace_resource_id}", + ) + ], + ) assert False - except Exception as err: + except Exception: pass # this is expected # make sure monitoring can be smoothly disabled - self.cmd( - f'aks disable-addons -a monitoring -g={resource_group} -n={aks_name}') + self.cmd(f"aks disable-addons -a monitoring -g={resource_group} -n={aks_name}") # delete self.cmd( - f'aks delete -g {resource_group} -n {aks_name} --yes --no-wait', checks=[self.is_empty()]) + f"aks delete -g {resource_group} -n {aks_name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_auto_upgrade_channel(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_auto_upgrade_channel( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--auto-upgrade-channel rapid ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('autoUpgradeProfile.upgradeChannel', 'rapid') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--auto-upgrade-channel rapid " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("autoUpgradeProfile.upgradeChannel", "rapid"), + ], + ) # update upgrade channel - self.cmd('aks update --resource-group={resource_group} --name={name} --auto-upgrade-channel stable', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('autoUpgradeProfile.upgradeChannel', 'stable') - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --auto-upgrade-channel stable", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("autoUpgradeProfile.upgradeChannel", "stable"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_node_os_upgrade_channel(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_node_os_upgrade_channel( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--node-os-upgrade-channel NodeImage ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodeOSUpgradeChannelPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('autoUpgradeProfile.nodeOsUpgradeChannel', 'NodeImage') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--node-os-upgrade-channel NodeImage " + "--ssh-key-value={ssh_key_value} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodeOSUpgradeChannelPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("autoUpgradeProfile.nodeOsUpgradeChannel", "NodeImage"), + ], + ) # update node os upgrade channel - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--node-os-upgrade-channel None ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodeOSUpgradeChannelPreview' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('autoUpgradeProfile.nodeOsUpgradeChannel', 'None') - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--node-os-upgrade-channel None " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodeOSUpgradeChannelPreview" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("autoUpgradeProfile.nodeOsUpgradeChannel", "None"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_auto_upgrade_channel_and_node_os_upgrade_channel(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_auto_upgrade_channel_and_node_os_upgrade_channel( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--auto-upgrade-channel rapid ' \ - '--node-os-upgrade-channel NodeImage ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodeOSUpgradeChannelPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('autoUpgradeProfile.upgradeChannel', 'rapid'), - self.check('autoUpgradeProfile.nodeOsUpgradeChannel', 'NodeImage') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--auto-upgrade-channel rapid " + "--node-os-upgrade-channel NodeImage " + "--ssh-key-value={ssh_key_value} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodeOSUpgradeChannelPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("autoUpgradeProfile.upgradeChannel", "rapid"), + self.check("autoUpgradeProfile.nodeOsUpgradeChannel", "NodeImage"), + ], + ) # update auto upgrade channel and node os upgrade channel - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--auto-upgrade-channel stable --node-os-upgrade-channel None ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodeOSUpgradeChannelPreview' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('autoUpgradeProfile.upgradeChannel', 'stable'), - self.check('autoUpgradeProfile.nodeOsUpgradeChannel', 'None') - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--auto-upgrade-channel stable --node-os-upgrade-channel None " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodeOSUpgradeChannelPreview" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("autoUpgradeProfile.upgradeChannel", "stable"), + self.check("autoUpgradeProfile.nodeOsUpgradeChannel", "None"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_and_update_with_nrg_restriction_level(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_and_update_with_nrg_restriction_level( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--nrg-lockdown-restriction-level ReadOnly ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NRGLockdownPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('nodeResourceGroupProfile.restrictionLevel', 'ReadOnly') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--nrg-lockdown-restriction-level ReadOnly " + "--ssh-key-value={ssh_key_value} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NRGLockdownPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("nodeResourceGroupProfile.restrictionLevel", "ReadOnly"), + ], + ) # update the nrg restriction level - self.cmd('aks update --resource-group={resource_group} --name={name} --nrg-lockdown-restriction-level Unrestricted --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NRGLockdownPreview', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('nodeResourceGroupProfile.restrictionLevel', 'Unrestricted') - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --nrg-lockdown-restriction-level Unrestricted --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NRGLockdownPreview", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("nodeResourceGroupProfile.restrictionLevel", "Unrestricted"), + ], + ) + + # delete + self.cmd( + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_node_config(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kc_path": _get_test_data_file("kubeletconfig.json"), + "oc_path": _get_test_data_file("linuxosconfig.json"), + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + # use custom feature so it does not require subscription to regiter the feature + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--kubelet-config={kc_path} --linux-os-config={oc_path} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/CustomNodeConfigPreview " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "agentPoolProfiles[0].kubeletConfig.cpuManagerPolicy", "static" + ), + self.check( + "agentPoolProfiles[0].kubeletConfig.containerLogMaxSizeMb", 20 + ), + self.check("agentPoolProfiles[0].linuxOsConfig.swapFileSizeMb", 1500), + self.check( + "agentPoolProfiles[0].linuxOsConfig.sysctls.netIpv4TcpTwReuse", True + ), + ], + ) - # delete + # nodepool add + nodepool_cmd = ( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name=nodepool2 --node-count=1 " + "--kubelet-config={kc_path} --linux-os-config={oc_path} --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/CustomNodeConfigPreview" + ) self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + nodepool_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("kubeletConfig.cpuCfsQuotaPeriod", "200ms"), + self.check("kubeletConfig.podMaxPids", 120), + self.check("kubeletConfig.containerLogMaxSizeMb", 20), + self.check("linuxOsConfig.sysctls.netCoreSomaxconn", 163849), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_node_config(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'kc_path': _get_test_data_file('kubeletconfig.json'), - 'oc_path': _get_test_data_file('linuxosconfig.json'), - 'ssh_key_value': self.generate_ssh_keys() - }) - - # use custom feature so it does not require subscription to regiter the feature - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--kubelet-config={kc_path} --linux-os-config={oc_path} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/CustomNodeConfigPreview ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'agentPoolProfiles[0].kubeletConfig.cpuManagerPolicy', 'static'), - self.check( - 'agentPoolProfiles[0].kubeletConfig.containerLogMaxSizeMb', 20), - self.check( - 'agentPoolProfiles[0].linuxOsConfig.swapFileSizeMb', 1500), - self.check( - 'agentPoolProfiles[0].linuxOsConfig.sysctls.netIpv4TcpTwReuse', True) - ]) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_and_update_with_http_proxy_config( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "http_proxy_path": _get_test_data_file("httpproxyconfig.json"), + "custom_data_path": _get_test_data_file("setup_proxy.sh"), + "ssh_key_value": self.generate_ssh_keys(), + } + ) - # nodepool add - nodepool_cmd = 'aks nodepool add --resource-group={resource_group} --cluster-name={name} --name=nodepool2 --node-count=1 ' \ - '--kubelet-config={kc_path} --linux-os-config={oc_path} --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/CustomNodeConfigPreview' - self.cmd(nodepool_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('kubeletConfig.cpuCfsQuotaPeriod', '200ms'), - self.check('kubeletConfig.podMaxPids', 120), - self.check('kubeletConfig.containerLogMaxSizeMb', 20), - self.check('linuxOsConfig.sysctls.netCoreSomaxconn', 163849) - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_and_update_with_http_proxy_config(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'http_proxy_path': _get_test_data_file('httpproxyconfig.json'), - 'custom_data_path': _get_test_data_file('setup_proxy.sh'), - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_vnet_cmd = 'network vnet create \ + create_vnet_cmd = "network vnet create \ --resource-group={resource_group} \ --name={name} \ --address-prefixes 10.42.0.0/16 \ --subnet-name aks-subnet \ - --subnet-prefix 10.42.1.0/24' + --subnet-prefix 10.42.1.0/24" - create_subnet_cmd = 'network vnet subnet create \ + create_subnet_cmd = "network vnet subnet create \ --resource-group={resource_group} \ --vnet-name={name} \ --name proxy-subnet \ - --address-prefix 10.42.3.0/24' + --address-prefix 10.42.3.0/24" - show_subnet_cmd = 'network vnet subnet show \ + show_subnet_cmd = "network vnet subnet show \ --resource-group={resource_group} \ --vnet-name={name} \ - --name aks-subnet' + --name aks-subnet" # name below MUST match the name used in testcerts for httpproxyconfig.json. # otherwise the VM will not present a cert with correct hostname @@ -3469,13 +5008,14 @@ def test_aks_create_and_update_with_http_proxy_config(self, resource_group, reso --vnet-name {name} \ --subnet proxy-subnet' - self.cmd(create_vnet_cmd, checks=[ - self.check('newVNet.provisioningState', 'Succeeded') - ]) + self.cmd( + create_vnet_cmd, + checks=[self.check("newVNet.provisioningState", "Succeeded")], + ) - self.cmd(create_subnet_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + create_subnet_cmd, checks=[self.check("provisioningState", "Succeeded")] + ) subnet_output = self.cmd(show_subnet_cmd).get_output_in_json() subnet_id = subnet_output["id"] @@ -3483,3275 +5023,4750 @@ def test_aks_create_and_update_with_http_proxy_config(self, resource_group, reso self.cmd(create_vm_cmd) - self.kwargs.update({ - 'vnet_subnet_id': subnet_id, - }) + self.kwargs.update( + { + "vnet_subnet_id": subnet_id, + } + ) # use custom feature so it does not require subscription to regiter the feature - create_cmd = 'aks create --resource-group={resource_group} --name={name} --http-proxy-config={http_proxy_path} ' \ - '--ssh-key-value={ssh_key_value} --enable-managed-identity --yes --vnet-subnet-id {vnet_subnet_id} -o json' - - self.cmd(create_cmd, checks=[ - self.check('httpProxyConfig.httpProxy', - 'http://cli-proxy-vm:3128/'), - self.check('httpProxyConfig.httpsProxy', - 'https://cli-proxy-vm:3129/'), - self.check('httpProxyConfig.trustedCa', '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') - ]) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'http_proxy_path': _get_test_data_file('httpproxyconfig_update.json'), - }) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} --http-proxy-config={http_proxy_path}' - - self.cmd(update_cmd, checks=[ - self.check('httpProxyConfig.httpProxy', - 'http://cli-proxy-vm:3128/'), - self.check('httpProxyConfig.httpsProxy', - 'https://cli-proxy-vm:3129/'), - self.check('httpProxyConfig.trustedCa', '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') - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_none_private_dns_zone(self, resource_group, resource_group_location): + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --http-proxy-config={http_proxy_path} " + "--ssh-key-value={ssh_key_value} --enable-managed-identity --yes --vnet-subnet-id {vnet_subnet_id} -o json" + ) + + self.cmd( + create_cmd, + checks=[ + self.check("httpProxyConfig.httpProxy", "http://cli-proxy-vm:3128/"), + self.check("httpProxyConfig.httpsProxy", "https://cli-proxy-vm:3129/"), + self.check( + "httpProxyConfig.trustedCa", + "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", + ), + ], + ) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "http_proxy_path": _get_test_data_file("httpproxyconfig_update.json"), + } + ) + + update_cmd = "aks update --resource-group={resource_group} --name={name} --http-proxy-config={http_proxy_path}" + + self.cmd( + update_cmd, + checks=[ + self.check("httpProxyConfig.httpProxy", "http://cli-proxy-vm:3128/"), + self.check("httpProxyConfig.httpsProxy", "https://cli-proxy-vm:3129/"), + self.check( + "httpProxyConfig.trustedCa", + "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", + ), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_none_private_dns_zone( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--node-count=1 --load-balancer-sku=standard ' \ - '--enable-private-cluster --private-dns-zone none ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.exists('privateFqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('apiServerAccessProfile.privateDNSZone', 'None'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--node-count=1 --load-balancer-sku=standard " + "--enable-private-cluster --private-dns-zone none " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("privateFqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("apiServerAccessProfile.privateDNSZone", "None"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_private_cluster_public_fqdn(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_private_cluster_public_fqdn( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--enable-private-cluster --node-count=1 ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.exists('privateFqdn'), - self.exists('fqdn'), - self.check('provisioningState', 'Succeeded'), - self.check( - 'apiServerAccessProfile.enablePrivateClusterPublicFqdn', True), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--enable-private-cluster --node-count=1 " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("privateFqdn"), + self.exists("fqdn"), + self.check("provisioningState", "Succeeded"), + self.check( + "apiServerAccessProfile.enablePrivateClusterPublicFqdn", True + ), + ], + ) # update - update_cmd = 'aks update --resource-group={resource_group} --name={name} --disable-public-fqdn' - self.cmd(update_cmd, checks=[ - self.exists('privateFqdn'), - self.check('fqdn', None), - self.check('provisioningState', 'Succeeded'), - self.check( - 'apiServerAccessProfile.enablePrivateClusterPublicFqdn', False), - ]) + update_cmd = "aks update --resource-group={resource_group} --name={name} --disable-public-fqdn" + self.cmd( + update_cmd, + checks=[ + self.exists("privateFqdn"), + self.check("fqdn", None), + self.check("provisioningState", "Succeeded"), + self.check( + "apiServerAccessProfile.enablePrivateClusterPublicFqdn", False + ), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_create_fqdn_subdomain(self, resource_group, resource_group_location): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - identity_name = self.create_random_name('cliakstest', 16) - subdomain_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'identity_name': identity_name, - 'subdomain_name': subdomain_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + identity_name = self.create_random_name("cliakstest", 16) + subdomain_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "identity_name": identity_name, + "subdomain_name": subdomain_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create private dns zone create_private_dns_zone = 'network private-dns zone create --resource-group={resource_group} --name="privatelink.{location}.azmk8s.io"' - zone = self.cmd(create_private_dns_zone, checks=[ - self.check('provisioningState', 'Succeeded') - ]).get_output_in_json() + zone = self.cmd( + create_private_dns_zone, + checks=[self.check("provisioningState", "Succeeded")], + ).get_output_in_json() zone_id = zone["id"] assert zone_id is not None - self.kwargs.update({ - 'zone_id': zone_id, - }) + self.kwargs.update( + { + "zone_id": zone_id, + } + ) # create identity - create_identity = 'identity create --resource-group={resource_group} --name={identity_name}' - identity = self.cmd(create_identity, checks=[ - self.check('name', identity_name) - ]).get_output_in_json() + create_identity = ( + "identity create --resource-group={resource_group} --name={identity_name}" + ) + identity = self.cmd( + create_identity, checks=[self.check("name", identity_name)] + ).get_output_in_json() identity_id = identity["principalId"] identity_resource_id = identity["id"] assert identity_id is not None - self.kwargs.update({ - 'identity_id': identity_id, - 'identity_resource_id': identity_resource_id, - }) + self.kwargs.update( + { + "identity_id": identity_id, + "identity_resource_id": identity_resource_id, + } + ) # assign from unittest import mock - with mock.patch('azure.cli.command_modules.role.custom._gen_guid', side_effect=self.create_guid): + + with mock.patch( + "azure.cli.command_modules.role.custom._gen_guid", + side_effect=self.create_guid, + ): assignment = self.cmd( - 'role assignment create --assignee-object-id={identity_id} --role "Private DNS Zone Contributor" --scope={zone_id} --assignee-principal-type ServicePrincipal').get_output_in_json() + 'role assignment create --assignee-object-id={identity_id} --role "Private DNS Zone Contributor" --scope={zone_id} --assignee-principal-type ServicePrincipal' + ).get_output_in_json() assert assignment["roleDefinitionId"] is not None # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--node-count=1 --fqdn-subdomain={subdomain_name} --load-balancer-sku=standard ' \ - '--enable-private-cluster --private-dns-zone={zone_id} --enable-managed-identity --assign-identity {identity_resource_id} ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.exists('privateFqdn'), - self.exists('fqdnSubdomain'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('apiServerAccessProfile.privateDnsZone', zone_id), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--node-count=1 --fqdn-subdomain={subdomain_name} --load-balancer-sku=standard " + "--enable-private-cluster --private-dns-zone={zone_id} --enable-managed-identity --assign-identity {identity_resource_id} " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("privateFqdn"), + self.exists("fqdnSubdomain"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("apiServerAccessProfile.privateDnsZone", zone_id), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_pod_identity_enabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_pod_identity_enabled( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--enable-pod-identity --enable-pod-identity-with-kubenet ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check('podIdentityProfile.allowNetworkPluginKubenet', True) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--enable-pod-identity --enable-pod-identity-with-kubenet " + "--ssh-key-value={ssh_key_value} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check("podIdentityProfile.allowNetworkPluginKubenet", True), + ], + ) # update: disable - cmd = 'aks update --resource-group={resource_group} --name={name} --disable-pod-identity ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview' - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', None) - ]) + cmd = ( + "aks update --resource-group={resource_group} --name={name} --disable-pod-identity " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", None), + ], + ) # update: enable - cmd = 'aks update --resource-group={resource_group} --name={name} --enable-pod-identity --enable-pod-identity-with-kubenet ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview' - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check('podIdentityProfile.allowNetworkPluginKubenet', True) - ]) + cmd = ( + "aks update --resource-group={resource_group} --name={name} --enable-pod-identity --enable-pod-identity-with-kubenet " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check("podIdentityProfile.allowNetworkPluginKubenet", True), + ], + ) # pod identity exception: add - cmd = ('aks pod-identity exception add --cluster-name={name} --resource-group={resource_group} ' - '--namespace test-namespace --name test-name --pod-labels foo=bar ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview') - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].name', 'test-name'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].namespace', 'test-namespace'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.foo', 'bar'), - ]) + cmd = ( + "aks pod-identity exception add --cluster-name={name} --resource-group={resource_group} " + "--namespace test-namespace --name test-name --pod-labels foo=bar " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].name", + "test-name", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].namespace", + "test-namespace", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.foo", + "bar", + ), + ], + ) # pod identity exception: update - cmd = ('aks pod-identity exception update --cluster-name={name} --resource-group={resource_group} ' - '--namespace test-namespace --name test-name --pod-labels foo=bar a=b ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview') - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].name', 'test-name'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].namespace', 'test-namespace'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.foo', 'bar'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.a', 'b'), - ]) + cmd = ( + "aks pod-identity exception update --cluster-name={name} --resource-group={resource_group} " + "--namespace test-namespace --name test-name --pod-labels foo=bar a=b " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].name", + "test-name", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].namespace", + "test-namespace", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.foo", + "bar", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.a", + "b", + ), + ], + ) # pod identity exception: delete - cmd = ('aks pod-identity exception delete --cluster-name={name} --resource-group={resource_group} ' - '--namespace test-namespace --name test-name ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview') - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions', None), - ]) + cmd = ( + "aks pod-identity exception delete --cluster-name={name} --resource-group={resource_group} " + "--namespace test-namespace --name test-name " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check("podIdentityProfile.userAssignedIdentityExceptions", None), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_using_azurecni_with_pod_identity_enabled(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys() - }) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_using_azurecni_with_pod_identity_enabled( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--enable-pod-identity --network-plugin azure ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--enable-pod-identity --network-plugin azure " + "--ssh-key-value={ssh_key_value} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + ], + ) # update: disable - cmd = 'aks update --resource-group={resource_group} --name={name} --disable-pod-identity ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview' - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', None) - ]) + cmd = ( + "aks update --resource-group={resource_group} --name={name} --disable-pod-identity " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", None), + ], + ) # update: enable - cmd = 'aks update --resource-group={resource_group} --name={name} --enable-pod-identity ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview' - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True) - ]) + cmd = ( + "aks update --resource-group={resource_group} --name={name} --enable-pod-identity " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + ], + ) # pod identity exception: add - cmd = ('aks pod-identity exception add --cluster-name={name} --resource-group={resource_group} ' - '--namespace test-namespace --name test-name --pod-labels foo=bar ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview') - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].name', 'test-name'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].namespace', 'test-namespace'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.foo', 'bar'), - ]) + cmd = ( + "aks pod-identity exception add --cluster-name={name} --resource-group={resource_group} " + "--namespace test-namespace --name test-name --pod-labels foo=bar " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].name", + "test-name", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].namespace", + "test-namespace", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.foo", + "bar", + ), + ], + ) # pod identity exception: update - cmd = ('aks pod-identity exception update --cluster-name={name} --resource-group={resource_group} ' - '--namespace test-namespace --name test-name --pod-labels foo=bar a=b ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview') - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].name', 'test-name'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].namespace', 'test-namespace'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.foo', 'bar'), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.a', 'b'), - ]) + cmd = ( + "aks pod-identity exception update --cluster-name={name} --resource-group={resource_group} " + "--namespace test-namespace --name test-name --pod-labels foo=bar a=b " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].name", + "test-name", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].namespace", + "test-namespace", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.foo", + "bar", + ), + self.check( + "podIdentityProfile.userAssignedIdentityExceptions[0].podLabels.a", + "b", + ), + ], + ) # pod identity exception: delete - cmd = ('aks pod-identity exception delete --cluster-name={name} --resource-group={resource_group} ' - '--namespace test-namespace --name test-name ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview') - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check( - 'podIdentityProfile.userAssignedIdentityExceptions', None), - ]) + cmd = ( + "aks pod-identity exception delete --cluster-name={name} --resource-group={resource_group} " + "--namespace test-namespace --name test-name " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check("podIdentityProfile.userAssignedIdentityExceptions", None), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) # the pod identity add command creates role assignment with random uuid # for this case we cannot use recording to capture the fixture, therefore we need to mark it as live_only @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_pod_identity_usage(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - identity_name = self.create_random_name('id', 6) - binding_selector_name = 'binding_test' - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'identity_name': identity_name, - 'binding_selector': binding_selector_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + identity_name = self.create_random_name("id", 6) + binding_selector_name = "binding_test" + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "identity_name": identity_name, + "binding_selector": binding_selector_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create identity - cmd = 'identity create --resource-group={resource_group} --name={identity_name} --location={location}' - application_identity = self.cmd(cmd, checks=[ - self.check('name', identity_name) - ]).get_output_in_json() - self.kwargs.update({ - 'application_identity_id': application_identity['id'], - }) + cmd = "identity create --resource-group={resource_group} --name={identity_name} --location={location}" + application_identity = self.cmd( + cmd, checks=[self.check("name", identity_name)] + ).get_output_in_json() + self.kwargs.update( + { + "application_identity_id": application_identity["id"], + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--enable-pod-identity --enable-pod-identity-with-kubenet ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--enable-pod-identity --enable-pod-identity-with-kubenet " + "--ssh-key-value={ssh_key_value} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + ], + ) # pod identity: add - cmd = ('aks pod-identity add --cluster-name={name} --resource-group={resource_group} ' - '--namespace test-namespace --name test-name --identity-resource-id={application_identity_id} ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview') - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].name', 'test-name'), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].namespace', 'test-namespace'), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].provisioningState', 'Assigned'), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].identity.clientId', application_identity['clientId']), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].identity.objectId', application_identity['principalId']), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].identity.resourceId', application_identity['id']), - ]) + cmd = ( + "aks pod-identity add --cluster-name={name} --resource-group={resource_group} " + "--namespace test-namespace --name test-name --identity-resource-id={application_identity_id} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check( + "podIdentityProfile.userAssignedIdentities[0].name", "test-name" + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].namespace", + "test-namespace", + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].provisioningState", + "Assigned", + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].identity.clientId", + application_identity["clientId"], + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].identity.objectId", + application_identity["principalId"], + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].identity.resourceId", + application_identity["id"], + ), + ], + ) # pod identity: delete - cmd = ('aks pod-identity delete --cluster-name={name} --resource-group={resource_group} ' - '--namespace test-namespace --name test-name ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview') - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check('podIdentityProfile.userAssignedIdentities', None), - ]) + cmd = ( + "aks pod-identity delete --cluster-name={name} --resource-group={resource_group} " + "--namespace test-namespace --name test-name " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check("podIdentityProfile.userAssignedIdentities", None), + ], + ) # pod identity: add with binding selector - cmd = ('aks pod-identity add --cluster-name={name} --resource-group={resource_group} ' - '--namespace test-namespace-binding-selector --name test-name-binding-selector ' - '--identity-resource-id={application_identity_id} --binding-selector={binding_selector} ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview') - self.cmd(cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('podIdentityProfile.enabled', True), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].name', 'test-name-binding-selector'), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].namespace', 'test-namespace-binding-selector'), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].provisioningState', 'Assigned'), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].bindingSelector', binding_selector_name), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].identity.clientId', application_identity['clientId']), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].identity.objectId', application_identity['principalId']), - self.check( - 'podIdentityProfile.userAssignedIdentities[0].identity.resourceId', application_identity['id']), - ]) + cmd = ( + "aks pod-identity add --cluster-name={name} --resource-group={resource_group} " + "--namespace test-namespace-binding-selector --name test-name-binding-selector " + "--identity-resource-id={application_identity_id} --binding-selector={binding_selector} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnablePodIdentityPreview" + ) + self.cmd( + cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("podIdentityProfile.enabled", True), + self.check( + "podIdentityProfile.userAssignedIdentities[0].name", + "test-name-binding-selector", + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].namespace", + "test-namespace-binding-selector", + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].provisioningState", + "Assigned", + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].bindingSelector", + binding_selector_name, + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].identity.clientId", + application_identity["clientId"], + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].identity.objectId", + application_identity["principalId"], + ), + self.check( + "podIdentityProfile.userAssignedIdentities[0].identity.resourceId", + application_identity["id"], + ), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_update_with_windows_password(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_update_with_windows_password( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'windows_admin_username': 'azureuser1', - 'windows_admin_password': self.create_random_name('p@0A', 16), - 'nodepool2_name': 'npwin', - 'new_windows_admin_password': self.create_random_name('n!C3', 16), - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "windows_admin_username": "azureuser1", + "windows_admin_password": self.create_random_name("p@0A", 16), + "nodepool2_name": "npwin", + "new_windows_admin_password": self.create_random_name("n!C3", 16), + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 ' \ - '--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} ' \ - '--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.adminUsername', 'azureuser1') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 " + "--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} " + "--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.adminUsername", "azureuser1"), + ], + ) # nodepool add - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1", + checks=[self.check("provisioningState", "Succeeded")], + ) # update Windows password - self.cmd('aks update --resource-group={resource_group} --name={name} --windows-admin-password {new_windows_admin_password}', checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --windows-admin-password {new_windows_admin_password}", + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # nodepool delete self.cmd( - 'aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait', checks=[self.is_empty()]) + "aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait", + checks=[self.is_empty()], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) def test_aks_custom_kubelet_identity(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - control_plane_identity_name = self.create_random_name('cliakstest', 16) - kubelet_identity_name = self.create_random_name('cliakstest', 16) - new_kubelet_identity_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'control_plane_identity_name': control_plane_identity_name, - 'kubelet_identity_name': kubelet_identity_name, - "new_kubelet_identity_name": new_kubelet_identity_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + control_plane_identity_name = self.create_random_name("cliakstest", 16) + kubelet_identity_name = self.create_random_name("cliakstest", 16) + new_kubelet_identity_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "control_plane_identity_name": control_plane_identity_name, + "kubelet_identity_name": kubelet_identity_name, + "new_kubelet_identity_name": new_kubelet_identity_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create control plane identity - control_plane_identity = 'identity create --resource-group={resource_group} --name={control_plane_identity_name}' - c_identity = self.cmd(control_plane_identity, checks=[ - self.check('name', control_plane_identity_name) - ]).get_output_in_json() + control_plane_identity = "identity create --resource-group={resource_group} --name={control_plane_identity_name}" + c_identity = self.cmd( + control_plane_identity, + checks=[self.check("name", control_plane_identity_name)], + ).get_output_in_json() control_plane_identity_resource_id = c_identity["id"] assert control_plane_identity_resource_id is not None - self.kwargs.update({ - 'control_plane_identity_resource_id': control_plane_identity_resource_id, - }) + self.kwargs.update( + { + "control_plane_identity_resource_id": control_plane_identity_resource_id, + } + ) # create kubelet identity - kubelet_identity = 'identity create --resource-group={resource_group} --name={kubelet_identity_name}' - k_identity = self.cmd(kubelet_identity, checks=[ - self.check('name', kubelet_identity_name) - ]).get_output_in_json() + kubelet_identity = "identity create --resource-group={resource_group} --name={kubelet_identity_name}" + k_identity = self.cmd( + kubelet_identity, checks=[self.check("name", kubelet_identity_name)] + ).get_output_in_json() kubelet_identity_resource_id = k_identity["id"] assert kubelet_identity_resource_id is not None - self.kwargs.update({ - 'kubelet_identity_resource_id': kubelet_identity_resource_id, - }) + self.kwargs.update( + { + "kubelet_identity_resource_id": kubelet_identity_resource_id, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--node-count=1 --enable-managed-identity ' \ - '--assign-identity {control_plane_identity_resource_id} --assign-kubelet-identity {kubelet_identity_resource_id} ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.exists('identity'), - self.exists('identityProfile'), - self.check('provisioningState', 'Succeeded'), - self.check('identityProfile.kubeletidentity.resourceId', - kubelet_identity_resource_id), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--node-count=1 --enable-managed-identity " + "--assign-identity {control_plane_identity_resource_id} --assign-kubelet-identity {kubelet_identity_resource_id} " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("identity"), + self.exists("identityProfile"), + self.check("provisioningState", "Succeeded"), + self.check( + "identityProfile.kubeletidentity.resourceId", + kubelet_identity_resource_id, + ), + ], + ) # create new kubelet identity - new_kubelet_identity = 'identity create --resource-group={resource_group} --name={new_kubelet_identity_name}' - new_identity = self.cmd(new_kubelet_identity, checks=[ - self.check('name', new_kubelet_identity_name) - ]).get_output_in_json() + new_kubelet_identity = "identity create --resource-group={resource_group} --name={new_kubelet_identity_name}" + new_identity = self.cmd( + new_kubelet_identity, checks=[self.check("name", new_kubelet_identity_name)] + ).get_output_in_json() new_kubelet_identity_resource_id = new_identity["id"] assert new_kubelet_identity_resource_id is not None - self.kwargs.update({ - 'new_kubelet_identity_resource_id': new_kubelet_identity_resource_id, - }) + self.kwargs.update( + { + "new_kubelet_identity_resource_id": new_kubelet_identity_resource_id, + } + ) # update to new kubelet identity - self.cmd('aks update --resource-group={resource_group} --name={name} --assign-kubelet-identity {new_kubelet_identity_resource_id} --yes', checks=[ - self.exists('identity'), - self.exists('identityProfile'), - self.check('provisioningState', 'Succeeded'), - self.check('identityProfile.kubeletidentity.resourceId', - new_kubelet_identity_resource_id), - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --assign-kubelet-identity {new_kubelet_identity_resource_id} --yes", + checks=[ + self.exists("identity"), + self.exists("identityProfile"), + self.check("provisioningState", "Succeeded"), + self.check( + "identityProfile.kubeletidentity.resourceId", + new_kubelet_identity_resource_id, + ), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_disable_local_accounts(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 ' \ - '--disable-local-accounts --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('disableLocalAccounts', True) - ]) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 " + "--disable-local-accounts --ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("disableLocalAccounts", True), + ], + ) # update to enable local accounts - self.cmd('aks update --resource-group={resource_group} --name={name} --enable-local-accounts', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('disableLocalAccounts', False) - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --enable-local-accounts", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("disableLocalAccounts", False), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) def test_aks_enable_utlra_ssd(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--node-vm-size Standard_D2s_v3 --zones 1 2 3 --enable-ultra-ssd ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--node-vm-size Standard_D2s_v3 --zones 1 2 3 --enable-ultra-ssd " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd(create_cmd, checks=[self.check("provisioningState", "Succeeded")]) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_maintenancewindow(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'mc_path': _get_test_data_file('maintenancewindow.json'), - 'auto_upgrade_config_name': 'aksManagedAutoUpgradeSchedule', - 'node_os_upgrade_config_name': 'aksManagedNodeOSUpgradeSchedule', - 'ssh_key_value': self.generate_ssh_keys(), - 'future_date': "2123-01-01" - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "mc_path": _get_test_data_file("maintenancewindow.json"), + "auto_upgrade_config_name": "aksManagedAutoUpgradeSchedule", + "node_os_upgrade_config_name": "aksManagedNodeOSUpgradeSchedule", + "ssh_key_value": self.generate_ssh_keys(), + "future_date": "2123-01-01", + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}" + self.cmd(create_cmd, checks=[self.check("provisioningState", "Succeeded")]) # add dedicated maintenanceconfiguration for cluster autoupgrade - maintenance_configuration_add_cmd = 'aks maintenanceconfiguration add ' \ - '-g {resource_group} --cluster-name {name} ' \ - '-n {auto_upgrade_config_name} ' \ - '--schedule-type Weekly ' \ - '--day-of-week Friday ' \ - '--interval-weeks 3 ' \ - '--duration 8 ' \ - '--utc-offset +05:30 ' \ - '--start-date {future_date} ' \ - '--start-time 00:00 ' - - self.cmd( - maintenance_configuration_add_cmd, checks=[ - self.exists('maintenanceWindow.schedule.weekly'), - self.check('maintenanceWindow.schedule.weekly.dayOfWeek', 'Friday'), - self.check('maintenanceWindow.schedule.weekly.intervalWeeks', 3), - self.check('maintenanceWindow.durationHours', 8), - self.check('maintenanceWindow.utcOffset', '+05:30'), - self.check('maintenanceWindow.startDate', '{future_date}'), - self.check('maintenanceWindow.startTime', '00:00')] + maintenance_configuration_add_cmd = ( + "aks maintenanceconfiguration add " + "-g {resource_group} --cluster-name {name} " + "-n {auto_upgrade_config_name} " + "--schedule-type Weekly " + "--day-of-week Friday " + "--interval-weeks 3 " + "--duration 8 " + "--utc-offset +05:30 " + "--start-date {future_date} " + "--start-time 00:00 " + ) + + self.cmd( + maintenance_configuration_add_cmd, + checks=[ + self.exists("maintenanceWindow.schedule.weekly"), + self.check("maintenanceWindow.schedule.weekly.dayOfWeek", "Friday"), + self.check("maintenanceWindow.schedule.weekly.intervalWeeks", 3), + self.check("maintenanceWindow.durationHours", 8), + self.check("maintenanceWindow.utcOffset", "+05:30"), + self.check("maintenanceWindow.startDate", "{future_date}"), + self.check("maintenanceWindow.startTime", "00:00"), + ], ) # add dedicated maintenanceconfiguration for node os autoupgrade - maintenance_configuration_add_cmd = 'aks maintenanceconfiguration add ' \ - '-g {resource_group} --cluster-name {name} ' \ - '-n {node_os_upgrade_config_name} ' \ - '--schedule-type RelativeMonthly ' \ - '--day-of-week Tuesday ' \ - '--week-index Last ' \ - '--interval-months 1 ' \ - '--duration 12 ' \ - '--start-time 09:00 ' \ - '--utc-offset=-08:00 ' \ - '--start-date {future_date} ' - - self.cmd( - maintenance_configuration_add_cmd, checks=[ - self.exists('maintenanceWindow.schedule.relativeMonthly'), - self.check('maintenanceWindow.schedule.relativeMonthly.dayOfWeek', 'Tuesday'), - self.check('maintenanceWindow.schedule.relativeMonthly.intervalMonths', 1), - self.check('maintenanceWindow.durationHours', 12), - self.check('maintenanceWindow.utcOffset', '-08:00'), - self.check('maintenanceWindow.startDate', '{future_date}'), - self.check('maintenanceWindow.startTime', '09:00')] + maintenance_configuration_add_cmd = ( + "aks maintenanceconfiguration add " + "-g {resource_group} --cluster-name {name} " + "-n {node_os_upgrade_config_name} " + "--schedule-type RelativeMonthly " + "--day-of-week Tuesday " + "--week-index Last " + "--interval-months 1 " + "--duration 12 " + "--start-time 09:00 " + "--utc-offset=-08:00 " + "--start-date {future_date} " + ) + + self.cmd( + maintenance_configuration_add_cmd, + checks=[ + self.exists("maintenanceWindow.schedule.relativeMonthly"), + self.check( + "maintenanceWindow.schedule.relativeMonthly.dayOfWeek", "Tuesday" + ), + self.check( + "maintenanceWindow.schedule.relativeMonthly.intervalMonths", 1 + ), + self.check("maintenanceWindow.durationHours", 12), + self.check("maintenanceWindow.utcOffset", "-08:00"), + self.check("maintenanceWindow.startDate", "{future_date}"), + self.check("maintenanceWindow.startTime", "09:00"), + ], ) # maintenanceconfiguration list - maintenance_configuration_list_cmd = 'aks maintenanceconfiguration list ' \ - '-g {resource_group} --cluster-name {name}' - self.cmd(maintenance_configuration_list_cmd, checks=[self.check('length(@)', 2)]) + maintenance_configuration_list_cmd = ( + "aks maintenanceconfiguration list " + "-g {resource_group} --cluster-name {name}" + ) + self.cmd( + maintenance_configuration_list_cmd, checks=[self.check("length(@)", 2)] + ) # update maintenanceconfiguration from config file - maintenance_configuration_update_cmd = 'aks maintenanceconfiguration update ' \ - '-g {resource_group} --cluster-name {name} ' \ - '-n {auto_upgrade_config_name} ' \ - '--config-file {mc_path}' + maintenance_configuration_update_cmd = ( + "aks maintenanceconfiguration update " + "-g {resource_group} --cluster-name {name} " + "-n {auto_upgrade_config_name} " + "--config-file {mc_path}" + ) self.cmd( - maintenance_configuration_update_cmd, checks=[ - self.exists('maintenanceWindow.schedule.absoluteMonthly'), - self.check('maintenanceWindow.schedule.absoluteMonthly.dayOfMonth', 1), - self.check('maintenanceWindow.schedule.absoluteMonthly.intervalMonths', 3), - self.check('maintenanceWindow.durationHours', 4), - self.check('maintenanceWindow.utcOffset', '-08:00'), - self.check('maintenanceWindow.startTime', '09:00'), - self.check('maintenanceWindow.notAllowedDates | length(@)', 2)] + maintenance_configuration_update_cmd, + checks=[ + self.exists("maintenanceWindow.schedule.absoluteMonthly"), + self.check("maintenanceWindow.schedule.absoluteMonthly.dayOfMonth", 1), + self.check( + "maintenanceWindow.schedule.absoluteMonthly.intervalMonths", 3 + ), + self.check("maintenanceWindow.durationHours", 4), + self.check("maintenanceWindow.utcOffset", "-08:00"), + self.check("maintenanceWindow.startTime", "09:00"), + self.check("maintenanceWindow.notAllowedDates | length(@)", 2), + ], ) # maintenanceconfiguration show - maintenance_configuration_show_cmd = 'aks maintenanceconfiguration show ' \ - '-g {resource_group} --cluster-name {name} ' \ - '-n {auto_upgrade_config_name}' + maintenance_configuration_show_cmd = ( + "aks maintenanceconfiguration show " + "-g {resource_group} --cluster-name {name} " + "-n {auto_upgrade_config_name}" + ) self.cmd( - maintenance_configuration_show_cmd, checks=[ - self.check("name == '{auto_upgrade_config_name}'", True)] + maintenance_configuration_show_cmd, + checks=[self.check("name == '{auto_upgrade_config_name}'", True)], ) # maintenanceconfiguration delete - maintenance_configuration_delete_cmd = 'aks maintenanceconfiguration delete ' \ - '-g {resource_group} --cluster-name {name} ' \ - '-n {auto_upgrade_config_name}' + maintenance_configuration_delete_cmd = ( + "aks maintenanceconfiguration delete " + "-g {resource_group} --cluster-name {name} " + "-n {auto_upgrade_config_name}" + ) self.cmd(maintenance_configuration_delete_cmd, checks=[self.is_empty()]) - maintenance_configuration_delete_cmd = 'aks maintenanceconfiguration delete ' \ - '-g {resource_group} --cluster-name {name} ' \ - '-n {node_os_upgrade_config_name}' + maintenance_configuration_delete_cmd = ( + "aks maintenanceconfiguration delete " + "-g {resource_group} --cluster-name {name} " + "-n {node_os_upgrade_config_name}" + ) self.cmd(maintenance_configuration_delete_cmd, checks=[self.is_empty()]) # maintenanceconfiguration list - maintenance_configuration_list_cmd = 'aks maintenanceconfiguration list ' \ - '-g {resource_group} --cluster-name {name}' + maintenance_configuration_list_cmd = ( + "aks maintenanceconfiguration list " + "-g {resource_group} --cluster-name {name}" + ) self.cmd(maintenance_configuration_list_cmd, checks=[self.is_empty()]) # delete - self.cmd('aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + self.cmd( + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_maintenanceconfiguration(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'mc_path': _get_test_data_file('maintenanceconfig.json'), - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_maintenanceconfiguration( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "mc_path": _get_test_data_file("maintenanceconfig.json"), + "ssh_key_value": self.generate_ssh_keys(), + } + ) - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}" + self.cmd(create_cmd, checks=[self.check("provisioningState", "Succeeded")]) # maintenanceconfiguration add - maintenance_configuration_add_cmd = 'aks maintenanceconfiguration add -g {resource_group} --cluster-name {name} -n default --weekday Monday --start-hour 1' + maintenance_configuration_add_cmd = "aks maintenanceconfiguration add -g {resource_group} --cluster-name {name} -n default --weekday Monday --start-hour 1" self.cmd( - maintenance_configuration_add_cmd, checks=[ - self.check('timeInWeek[0].day', 'Monday'), - self.check('timeInWeek[0].day', 'Monday'), - self.check('timeInWeek[0].hourSlots | contains(@, `1`)', True)] + maintenance_configuration_add_cmd, + checks=[ + self.check("timeInWeek[0].day", "Monday"), + self.check("timeInWeek[0].day", "Monday"), + self.check("timeInWeek[0].hourSlots | contains(@, `1`)", True), + ], ) # maintenanceconfiguration update (from config file) - maintenance_configuration_update_cmd = 'aks maintenanceconfiguration update -g {resource_group} --cluster-name {name} -n default --config-file {mc_path}' + maintenance_configuration_update_cmd = "aks maintenanceconfiguration update -g {resource_group} --cluster-name {name} -n default --config-file {mc_path}" self.cmd( - maintenance_configuration_update_cmd, checks=[ + maintenance_configuration_update_cmd, + checks=[ self.check( - "timeInWeek[*].day | contains(@, 'Tuesday') && contains(@, 'Wednesday')", True), + "timeInWeek[*].day | contains(@, 'Tuesday') && contains(@, 'Wednesday')", + True, + ), self.check( - "timeInWeek[*].hourSlots[*] | contains([0], `2`) && contains([1], `6`)", True), - self.check("notAllowedTime | length(@) == `2`", True)] + "timeInWeek[*].hourSlots[*] | contains([0], `2`) && contains([1], `6`)", + True, + ), + self.check("notAllowedTime | length(@) == `2`", True), + ], ) # maintenanceconfiguration show - maintenance_configuration_show_cmd = 'aks maintenanceconfiguration show -g {resource_group} --cluster-name {name} -n default' + maintenance_configuration_show_cmd = "aks maintenanceconfiguration show -g {resource_group} --cluster-name {name} -n default" self.cmd( - maintenance_configuration_show_cmd, checks=[ - self.check("name == 'default'", True)] + maintenance_configuration_show_cmd, + checks=[self.check("name == 'default'", True)], ) # maintenanceconfiguration delete - maintenance_configuration_delete_cmd = 'aks maintenanceconfiguration delete -g {resource_group} --cluster-name {name} -n default' - self.cmd( - maintenance_configuration_delete_cmd, checks=[self.is_empty()]) + maintenance_configuration_delete_cmd = "aks maintenanceconfiguration delete -g {resource_group} --cluster-name {name} -n default" + self.cmd(maintenance_configuration_delete_cmd, checks=[self.is_empty()]) # maintenanceconfiguration list - maintenance_configuration_list_cmd = 'aks maintenanceconfiguration list -g {resource_group} --cluster-name {name}' - self.cmd( - maintenance_configuration_list_cmd, checks=[self.is_empty()]) + maintenance_configuration_list_cmd = "aks maintenanceconfiguration list -g {resource_group} --cluster-name {name}" + self.cmd(maintenance_configuration_list_cmd, checks=[self.is_empty()]) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_create_with_windows_gmsa(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_create_with_windows_gmsa( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'windows_admin_username': 'azureuser1', - 'windows_admin_password': 'replace-Password1234$', - 'nodepool2_name': 'npwin', - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "windows_admin_username": "azureuser1", + "windows_admin_password": "replace-Password1234$", + "nodepool2_name": "npwin", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 ' \ - '--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} ' \ - '--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure ' \ - '--ssh-key-value={ssh_key_value} --enable-windows-gmsa --yes ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKSWindowsGmsaPreview' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.adminUsername', 'azureuser1'), - self.check('windowsProfile.gmsaProfile.enabled', 'True') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 " + "--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} " + "--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure " + "--ssh-key-value={ssh_key_value} --enable-windows-gmsa --yes " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKSWindowsGmsaPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.adminUsername", "azureuser1"), + self.check("windowsProfile.gmsaProfile.enabled", "True"), + ], + ) # nodepool add - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1", + checks=[self.check("provisioningState", "Succeeded")], + ) # nodepool delete self.cmd( - 'aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait', checks=[self.is_empty()]) + "aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait", + checks=[self.is_empty()], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_with_overlay_network_plugin_mode(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_with_overlay_network_plugin_mode( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--network-plugin azure --network-plugin-mode overlay --ssh-key-value={ssh_key_value} ' \ - '--pod-cidr 10.244.0.0/16 --node-count 1 ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.podCidr', '10.244.0.0/16'), - self.check('networkProfile.networkPluginMode', 'overlay'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--network-plugin azure --network-plugin-mode overlay --ssh-key-value={ssh_key_value} " + "--pod-cidr 10.244.0.0/16 --node-count 1 " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.podCidr", "10.244.0.0/16"), + self.check("networkProfile.networkPluginMode", "overlay"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_create_with_network_dataplane_cilium(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_create_with_network_dataplane_cilium( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--network-plugin azure --network-plugin-mode overlay --ssh-key-value={ssh_key_value} ' \ - '--pod-cidr 10.244.0.0/16 --node-count 1 ' \ - '--network-dataplane=cilium ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/CiliumDataplanePreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.podCidr', '10.244.0.0/16'), - self.check('networkProfile.networkPlugin', 'azure'), - self.check('networkProfile.networkPluginMode', 'overlay'), - self.check('networkProfile.networkPolicy', 'cilium'), - self.check('networkProfile.networkDataplane', 'cilium'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--network-plugin azure --network-plugin-mode overlay --ssh-key-value={ssh_key_value} " + "--pod-cidr 10.244.0.0/16 --node-count 1 " + "--network-dataplane=cilium " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/CiliumDataplanePreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.podCidr", "10.244.0.0/16"), + self.check("networkProfile.networkPlugin", "azure"), + self.check("networkProfile.networkPluginMode", "overlay"), + self.check("networkProfile.networkPolicy", "cilium"), + self.check("networkProfile.networkDataplane", "cilium"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_with_enable_cilium_dataplane(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_with_enable_cilium_dataplane( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--network-plugin azure --network-plugin-mode overlay --ssh-key-value={ssh_key_value} ' \ - '--pod-cidr 10.244.0.0/16 --node-count 1 ' \ - '--enable-cilium-dataplane ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/CiliumDataplanePreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.podCidr', '10.244.0.0/16'), - self.check('networkProfile.networkPluginMode', 'overlay'), - self.check('networkProfile.networkDataplane', 'cilium'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--network-plugin azure --network-plugin-mode overlay --ssh-key-value={ssh_key_value} " + "--pod-cidr 10.244.0.0/16 --node-count 1 " + "--enable-cilium-dataplane " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/CiliumDataplanePreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.podCidr", "10.244.0.0/16"), + self.check("networkProfile.networkPluginMode", "overlay"), + self.check("networkProfile.networkDataplane", "cilium"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_dualstack_with_default_network(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_dualstack_with_default_network( + self, resource_group, resource_group_location + ): _, create_version = self._get_versions(resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'k8s_version': create_version, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "k8s_version": create_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ip-families IPv4,IPv6 --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-EnableDualStack' + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ip-families IPv4,IPv6 --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-EnableDualStack" + ) - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.podCidrs[] | length(@)', 2), - self.check('networkProfile.serviceCidrs[] | length(@)', 2), - self.check('networkProfile.ipFamilies', ['IPv4', 'IPv6']) - ]) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.podCidrs[] | length(@)", 2), + self.check("networkProfile.serviceCidrs[] | length(@)", 2), + self.check("networkProfile.ipFamilies", ["IPv4", "IPv6"]), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_default_network(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_default_network( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--pod-cidr 172.126.0.0/16 --service-cidr 172.56.0.0/16 --dns-service-ip 172.56.0.10 ' \ - '--pod-cidrs 172.126.0.0/16 --service-cidrs 172.56.0.0/16 --ip-families IPv4 ' \ - '--network-plugin kubenet --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.podCidr', '172.126.0.0/16'), - self.check('networkProfile.podCidrs', ['172.126.0.0/16']), - self.check('networkProfile.serviceCidr', '172.56.0.0/16'), - self.check('networkProfile.serviceCidrs', ['172.56.0.0/16']), - self.check('networkProfile.ipFamilies', ['IPv4']) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--pod-cidr 172.126.0.0/16 --service-cidr 172.56.0.0/16 --dns-service-ip 172.56.0.10 " + "--pod-cidrs 172.126.0.0/16 --service-cidrs 172.56.0.0/16 --ip-families IPv4 " + "--network-plugin kubenet --ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.podCidr", "172.126.0.0/16"), + self.check("networkProfile.podCidrs", ["172.126.0.0/16"]), + self.check("networkProfile.serviceCidr", "172.56.0.0/16"), + self.check("networkProfile.serviceCidrs", ["172.56.0.0/16"]), + self.check("networkProfile.ipFamilies", ["IPv4"]), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_and_update_outbound_ips(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_and_update_outbound_ips( + self, resource_group, resource_group_location + ): # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - init_pip_name = self.create_random_name('cliakstest', 16) - update_pip_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'init_pip_name': init_pip_name, - 'update_pip_name': update_pip_name, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_init_pip = 'network public-ip create -g {resource_group} -n {init_pip_name} --sku Standard' + aks_name = self.create_random_name("cliakstest", 16) + init_pip_name = self.create_random_name("cliakstest", 16) + update_pip_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "init_pip_name": init_pip_name, + "update_pip_name": update_pip_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_init_pip = "network public-ip create -g {resource_group} -n {init_pip_name} --sku Standard" # workaround for replay failure in CI self.cmd(create_init_pip) - get_init_pip = 'network public-ip show -g {resource_group} -n {init_pip_name}' - init_pip = self.cmd(get_init_pip, checks=[ - self.check('provisioningState', 'Succeeded') - ]).get_output_in_json() + get_init_pip = "network public-ip show -g {resource_group} -n {init_pip_name}" + init_pip = self.cmd( + get_init_pip, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() - create_update_pip = 'network public-ip create -g {resource_group} -n {update_pip_name} --sku Standard' + create_update_pip = "network public-ip create -g {resource_group} -n {update_pip_name} --sku Standard" # workaround for replay failure in CI self.cmd(create_update_pip) - get_update_pip = 'network public-ip show -g {resource_group} -n {update_pip_name}' - update_pip = self.cmd(get_update_pip, checks=[ - self.check('provisioningState', 'Succeeded') - ]).get_output_in_json() + get_update_pip = ( + "network public-ip show -g {resource_group} -n {update_pip_name}" + ) + update_pip = self.cmd( + get_update_pip, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() - init_pip_id = init_pip['id'] - update_pip_id = update_pip['id'] + init_pip_id = init_pip["id"] + update_pip_id = update_pip["id"] assert init_pip_id is not None assert update_pip_id is not None - self.kwargs.update({ - 'init_pip_id': init_pip_id, - 'update_pip_id': update_pip_id, - }) + self.kwargs.update( + { + "init_pip_id": init_pip_id, + "update_pip_id": update_pip_id, + } + ) # create cluster - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --load-balancer-outbound-ips {init_pip_id}' + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --load-balancer-outbound-ips {init_pip_id}" + ) - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'networkProfile.loadBalancerProfile.effectiveOutboundIPs[] | length(@)', 1), - self.check( - 'networkProfile.loadBalancerProfile.effectiveOutboundIPs[0].id', init_pip_id) - ]) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "networkProfile.loadBalancerProfile.effectiveOutboundIPs[] | length(@)", + 1, + ), + self.check( + "networkProfile.loadBalancerProfile.effectiveOutboundIPs[0].id", + init_pip_id, + ), + ], + ) # update cluster - update_cmd = 'aks update -g {resource_group} -n {name} --load-balancer-outbound-ips {update_pip_id}' + update_cmd = "aks update -g {resource_group} -n {name} --load-balancer-outbound-ips {update_pip_id}" - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'networkProfile.loadBalancerProfile.effectiveOutboundIPs[] | length(@)', 1), - self.check( - 'networkProfile.loadBalancerProfile.effectiveOutboundIPs[0].id', update_pip_id) - ]) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "networkProfile.loadBalancerProfile.effectiveOutboundIPs[] | length(@)", + 1, + ), + self.check( + "networkProfile.loadBalancerProfile.effectiveOutboundIPs[0].id", + update_pip_id, + ), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_and_update_ipv6_count(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_and_update_ipv6_count( + self, resource_group, resource_group_location + ): _, create_version = self._get_versions(resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'k8s_version': create_version, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "k8s_version": create_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--pod-cidr 172.126.0.0/16 --service-cidr 172.56.0.0/16 --dns-service-ip 172.56.0.10 ' \ - '--pod-cidrs 172.126.0.0/16,2001:abcd:1234::/64 --service-cidrs 172.56.0.0/16,2001:ffff::/108 ' \ - '--ip-families IPv4,IPv6 --load-balancer-managed-outbound-ipv6-count 2 ' \ - '--network-plugin kubenet --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-EnableDualStack' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.podCidr', '172.126.0.0/16'), - self.check('networkProfile.podCidrs', [ - '172.126.0.0/16', '2001:abcd:1234::/64']), - self.check('networkProfile.serviceCidr', '172.56.0.0/16'), - self.check('networkProfile.serviceCidrs', [ - '172.56.0.0/16', '2001:ffff::/108']), - self.check('networkProfile.ipFamilies', ['IPv4', 'IPv6']), - self.check( - 'networkProfile.loadBalancerProfile.managedOutboundIPs.countIpv6', 2), - self.check( - 'networkProfile.loadBalancerProfile.managedOutboundIPs.count', 1), - self.check( - 'networkProfile.loadBalancerProfile.effectiveOutboundIPs[] | length(@)', 3) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--pod-cidr 172.126.0.0/16 --service-cidr 172.56.0.0/16 --dns-service-ip 172.56.0.10 " + "--pod-cidrs 172.126.0.0/16,2001:abcd:1234::/64 --service-cidrs 172.56.0.0/16,2001:ffff::/108 " + "--ip-families IPv4,IPv6 --load-balancer-managed-outbound-ipv6-count 2 " + "--network-plugin kubenet --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-EnableDualStack" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.podCidr", "172.126.0.0/16"), + self.check( + "networkProfile.podCidrs", ["172.126.0.0/16", "2001:abcd:1234::/64"] + ), + self.check("networkProfile.serviceCidr", "172.56.0.0/16"), + self.check( + "networkProfile.serviceCidrs", ["172.56.0.0/16", "2001:ffff::/108"] + ), + self.check("networkProfile.ipFamilies", ["IPv4", "IPv6"]), + self.check( + "networkProfile.loadBalancerProfile.managedOutboundIPs.countIpv6", 2 + ), + self.check( + "networkProfile.loadBalancerProfile.managedOutboundIPs.count", 1 + ), + self.check( + "networkProfile.loadBalancerProfile.effectiveOutboundIPs[] | length(@)", + 3, + ), + ], + ) # update - update_cmd = 'aks update -g {resource_group} -n {name} --load-balancer-managed-outbound-ipv6-count 4' - - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.podCidr', '172.126.0.0/16'), - self.check('networkProfile.podCidrs', [ - '172.126.0.0/16', '2001:abcd:1234::/64']), - self.check('networkProfile.serviceCidr', '172.56.0.0/16'), - self.check('networkProfile.serviceCidrs', [ - '172.56.0.0/16', '2001:ffff::/108']), - self.check('networkProfile.ipFamilies', ['IPv4', 'IPv6']), - self.check( - 'networkProfile.loadBalancerProfile.managedOutboundIPs.countIpv6', 4), - self.check( - 'networkProfile.loadBalancerProfile.managedOutboundIPs.count', 1), - self.check( - 'networkProfile.loadBalancerProfile.effectiveOutboundIPs[] | length(@)', 5) - ]) + update_cmd = "aks update -g {resource_group} -n {name} --load-balancer-managed-outbound-ipv6-count 4" + + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.podCidr", "172.126.0.0/16"), + self.check( + "networkProfile.podCidrs", ["172.126.0.0/16", "2001:abcd:1234::/64"] + ), + self.check("networkProfile.serviceCidr", "172.56.0.0/16"), + self.check( + "networkProfile.serviceCidrs", ["172.56.0.0/16", "2001:ffff::/108"] + ), + self.check("networkProfile.ipFamilies", ["IPv4", "IPv6"]), + self.check( + "networkProfile.loadBalancerProfile.managedOutboundIPs.countIpv6", 4 + ), + self.check( + "networkProfile.loadBalancerProfile.managedOutboundIPs.count", 1 + ), + self.check( + "networkProfile.loadBalancerProfile.effectiveOutboundIPs[] | length(@)", + 5, + ), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', preserve_default_location=True) - def test_aks_azure_cni_overlay_migration(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) + def test_aks_azure_cni_overlay_migration( + self, resource_group, resource_group_location + ): _, create_version = self._get_versions(resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'k8s_version': create_version, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "k8s_version": create_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--network-plugin azure --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} ' \ - '--service-cidr 172.56.0.0/16 --dns-service-ip 172.56.0.10 ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.networkPlugin', 'azure'), - self.check('networkProfile.networkPluginMode', None), - self.check('networkProfile.podCidr', None), - self.check('networkProfile.serviceCidr', '172.56.0.0/16'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--network-plugin azure --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} " + "--service-cidr 172.56.0.0/16 --dns-service-ip 172.56.0.10 " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.networkPlugin", "azure"), + self.check("networkProfile.networkPluginMode", None), + self.check("networkProfile.podCidr", None), + self.check("networkProfile.serviceCidr", "172.56.0.0/16"), + ], + ) # update - update_cmd = 'aks update -g {resource_group} -n {name} --network-plugin-mode overlay --pod-cidr 100.64.0.0/10 ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview' + update_cmd = ( + "aks update -g {resource_group} -n {name} --network-plugin-mode overlay --pod-cidr 100.64.0.0/10 " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview" + ) - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.networkPlugin', 'azure'), - self.check('networkProfile.networkPluginMode', 'overlay'), - self.check('networkProfile.podCidr', '100.64.0.0/10'), - self.check('networkProfile.serviceCidr', '172.56.0.0/16'), - ]) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.networkPlugin", "azure"), + self.check("networkProfile.networkPluginMode", "overlay"), + self.check("networkProfile.podCidr", "100.64.0.0/10"), + self.check("networkProfile.serviceCidr", "172.56.0.0/16"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_azure_cni_overlay_migration_from_kubenet(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_azure_cni_overlay_migration_from_kubenet( + self, resource_group, resource_group_location + ): _, create_version = self._get_versions(resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'k8s_version': create_version, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "k8s_version": create_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--network-plugin kubenet --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} ' \ - '--service-cidr 172.56.0.0/16 --dns-service-ip 172.56.0.10 --pod-cidr 100.64.0.0/16 -c 1' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.networkPlugin', 'kubenet'), - self.check('networkProfile.networkPluginMode', None), - self.check('networkProfile.podCidr', '100.64.0.0/16'), - self.check('networkProfile.serviceCidr', '172.56.0.0/16'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--network-plugin kubenet --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} " + "--service-cidr 172.56.0.0/16 --dns-service-ip 172.56.0.10 --pod-cidr 100.64.0.0/16 -c 1" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.networkPlugin", "kubenet"), + self.check("networkProfile.networkPluginMode", None), + self.check("networkProfile.podCidr", "100.64.0.0/16"), + self.check("networkProfile.serviceCidr", "172.56.0.0/16"), + ], + ) # update - update_cmd = 'aks update -g {resource_group} -n {name} --network-plugin azure --network-plugin-mode overlay ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview' + update_cmd = ( + "aks update -g {resource_group} -n {name} --network-plugin azure --network-plugin-mode overlay " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureOverlayPreview" + ) - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.networkPlugin', 'azure'), - self.check('networkProfile.networkPluginMode', 'overlay'), - self.check('networkProfile.podCidr', '100.64.0.0/16'), - self.check('networkProfile.serviceCidr', '172.56.0.0/16'), - ]) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.networkPlugin", "azure"), + self.check("networkProfile.networkPluginMode", "overlay"), + self.check("networkProfile.podCidr", "100.64.0.0/16"), + self.check("networkProfile.serviceCidr", "172.56.0.0/16"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_migrate_cluster_to_cilium_dataplane(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_migrate_cluster_to_cilium_dataplane( + self, resource_group, resource_group_location + ): _, create_version = self._get_versions(resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'k8s_version': create_version, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "k8s_version": create_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create with Azure CNI overlay - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--network-plugin azure --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} ' \ - '--network-plugin-mode=overlay' + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--network-plugin azure --ssh-key-value={ssh_key_value} --kubernetes-version {k8s_version} " + "--network-plugin-mode=overlay" + ) - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.networkPlugin', 'azure'), - self.check('networkProfile.networkPluginMode', 'overlay'), - self.check('networkProfile.networkDataplane', 'azure'), - ]) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.networkPlugin", "azure"), + self.check("networkProfile.networkPluginMode", "overlay"), + self.check("networkProfile.networkDataplane", "azure"), + ], + ) # update to enable cilium dataplane - update_cmd = 'aks update -g {resource_group} -n {name} --network-dataplane=cilium --network-policy=cilium' + update_cmd = "aks update -g {resource_group} -n {name} --network-dataplane=cilium --network-policy=cilium" - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.networkPlugin', 'azure'), - self.check('networkProfile.networkPluginMode', 'overlay'), - self.check('networkProfile.networkDataplane', 'cilium'), - self.check('networkProfile.networkPolicy', 'cilium'), - ]) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.networkPlugin", "azure"), + self.check("networkProfile.networkPluginMode", "overlay"), + self.check("networkProfile.networkDataplane", "cilium"), + self.check("networkProfile.networkPolicy", "cilium"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_or_update_with_load_balancer_backend_pool_type(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_or_update_with_load_balancer_backend_pool_type( + self, resource_group, resource_group_location + ): _, create_version = self._get_versions(resource_group_location) - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'k8s_version': create_version, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "k8s_version": create_version, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--kubernetes-version={k8s_version} ' \ - '--load-balancer-backend-pool-type=nodeIP ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/IPBasedLoadBalancerPreview' - self.cmd(create_cmd, checks=[ - self.check('networkProfile.loadBalancerProfile.backendPoolType', 'nodeIP'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} " + "--kubernetes-version={k8s_version} " + "--load-balancer-backend-pool-type=nodeIP " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/IPBasedLoadBalancerPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check( + "networkProfile.loadBalancerProfile.backendPoolType", "nodeIP" + ), + ], + ) # update - update_cmd = 'aks update -g {resource_group} -n {name} --load-balancer-backend-pool-type=nodeIP ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/IPBasedLoadBalancerPreview' - self.cmd(update_cmd, checks=[ - self.check('networkProfile.loadBalancerProfile.backendPoolType', 'nodeIP'), - ]) + update_cmd = ( + "aks update -g {resource_group} -n {name} --load-balancer-backend-pool-type=nodeIP " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/IPBasedLoadBalancerPreview" + ) + self.cmd( + update_cmd, + checks=[ + self.check( + "networkProfile.loadBalancerProfile.backendPoolType", "nodeIP" + ), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_update_with_windows_gmsa(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_update_with_windows_gmsa( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'windows_admin_username': 'azureuser1', - 'windows_admin_password': 'replace-Password1234$', - 'nodepool2_name': 'npwin', - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "windows_admin_username": "azureuser1", + "windows_admin_password": "replace-Password1234$", + "nodepool2_name": "npwin", + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 ' \ - '--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} ' \ - '--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.adminUsername', 'azureuser1'), - self.not_exists('windowsProfile.gmsaProfile') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 " + "--windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} " + "--load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.adminUsername", "azureuser1"), + self.not_exists("windowsProfile.gmsaProfile"), + ], + ) # nodepool add - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1', checks=[ - self.check('provisioningState', 'Succeeded') - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1", + checks=[self.check("provisioningState", "Succeeded")], + ) # update Windows gmsa - update_cmd = "aks update --resource-group={resource_group} --name={name} --enable-windows-gmsa --yes " \ - "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKSWindowsGmsaPreview" - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('windowsProfile.gmsaProfile.enabled', 'True') - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} --enable-windows-gmsa --yes " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKSWindowsGmsaPreview" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("windowsProfile.gmsaProfile.enabled", "True"), + ], + ) # nodepool delete self.cmd( - 'aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait', checks=[self.is_empty()]) + "aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait", + checks=[self.is_empty()], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_nodepool_update_taints_msi(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_nodepool_update_taints_msi( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) + aks_name = self.create_random_name("cliakstest", 16) nodepool1_name = "nodepool1" taints = "key1=value1:PreferNoSchedule" - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'taints': taints, - 'nodepool1_name': nodepool1_name, - }) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "taints": taints, + "nodepool1_name": nodepool1_name, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} ' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} " + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + ], + ) # show - self.cmd('aks show -g {resource_group} -n {name}', checks=[ - self.check('type', '{resource_type}'), - self.check('name', '{name}'), - self.exists('nodeResourceGroup'), - self.check('resourceGroup', '{resource_group}'), - self.check('agentPoolProfiles[0].count', 1), - self.check('agentPoolProfiles[0].osType', 'Linux'), - self.check('agentPoolProfiles[0].vmSize', 'Standard_DS2_v2'), - self.check('agentPoolProfiles[0].mode', 'System'), - self.check('dnsPrefix', '{dns_name_prefix}'), - self.exists('kubernetesVersion') - ]) + self.cmd( + "aks show -g {resource_group} -n {name}", + checks=[ + self.check("type", "{resource_type}"), + self.check("name", "{name}"), + self.exists("nodeResourceGroup"), + self.check("resourceGroup", "{resource_group}"), + self.check("agentPoolProfiles[0].count", 1), + self.check("agentPoolProfiles[0].osType", "Linux"), + self.check("agentPoolProfiles[0].vmSize", "Standard_DS2_v2"), + self.check("agentPoolProfiles[0].mode", "System"), + self.check("dnsPrefix", "{dns_name_prefix}"), + self.exists("kubernetesVersion"), + ], + ) # get-credentials fd, temp_path = tempfile.mkstemp() - self.kwargs.update({'file': temp_path}) + self.kwargs.update({"file": temp_path}) try: self.cmd( - 'aks get-credentials -g {resource_group} -n {name} --file "{file}"') + 'aks get-credentials -g {resource_group} -n {name} --file "{file}"' + ) self.assertGreater(os.path.getsize(temp_path), 0) finally: os.close(fd) os.remove(temp_path) # nodepool update nodepool1 taints - self.cmd('aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --node-taints {taints}', checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + self.cmd( + "aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --node-taints {taints}", + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # nodepool list - self.cmd('aks nodepool list --resource-group={resource_group} --cluster-name={name}', checks=[ - self.check('[0].mode', 'System'), - self.check('[0].nodeTaints[0]', 'key1=value1:PreferNoSchedule'), - ]) + self.cmd( + "aks nodepool list --resource-group={resource_group} --cluster-name={name}", + checks=[ + self.check("[0].mode", "System"), + self.check("[0].nodeTaints[0]", "key1=value1:PreferNoSchedule"), + ], + ) # nodepool delete nodepool1 label self.cmd( - 'aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --node-taints "" ') + 'aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --node-taints "" ' + ) # nodepool show - self.cmd('aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} -o json', checks=[ - self.check('nodeTaints', None) - ]) + self.cmd( + "aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} -o json", + checks=[self.check("nodeTaints", None)], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_nodepool_update_label_msi(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_nodepool_update_label_msi( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) + aks_name = self.create_random_name("cliakstest", 16) nodepool1_name = "nodepool1" nodepool2_name = "nodepool2" tags = "key1=value1" new_tags = "key2=value2" labels = "label1=value1" - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'tags': tags, - 'new_tags': new_tags, - 'labels': labels, - 'nodepool1_name': nodepool1_name, - 'nodepool2_name': nodepool2_name, - }) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "tags": tags, + "new_tags": new_tags, + "labels": labels, + "nodepool1_name": nodepool1_name, + "nodepool2_name": nodepool2_name, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} ' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} " + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + ], + ) # show - self.cmd('aks show -g {resource_group} -n {name}', checks=[ - self.check('type', '{resource_type}'), - self.check('name', '{name}'), - self.exists('nodeResourceGroup'), - self.check('resourceGroup', '{resource_group}'), - self.check('agentPoolProfiles[0].count', 1), - self.check('agentPoolProfiles[0].osType', 'Linux'), - self.check('agentPoolProfiles[0].vmSize', 'Standard_DS2_v2'), - self.check('agentPoolProfiles[0].mode', 'System'), - self.check('dnsPrefix', '{dns_name_prefix}'), - self.exists('kubernetesVersion') - ]) + self.cmd( + "aks show -g {resource_group} -n {name}", + checks=[ + self.check("type", "{resource_type}"), + self.check("name", "{name}"), + self.exists("nodeResourceGroup"), + self.check("resourceGroup", "{resource_group}"), + self.check("agentPoolProfiles[0].count", 1), + self.check("agentPoolProfiles[0].osType", "Linux"), + self.check("agentPoolProfiles[0].vmSize", "Standard_DS2_v2"), + self.check("agentPoolProfiles[0].mode", "System"), + self.check("dnsPrefix", "{dns_name_prefix}"), + self.exists("kubernetesVersion"), + ], + ) # get-credentials fd, temp_path = tempfile.mkstemp() - self.kwargs.update({'file': temp_path}) + self.kwargs.update({"file": temp_path}) try: self.cmd( - 'aks get-credentials -g {resource_group} -n {name} --file "{file}"') + 'aks get-credentials -g {resource_group} -n {name} --file "{file}"' + ) self.assertGreater(os.path.getsize(temp_path), 0) finally: os.close(fd) os.remove(temp_path) # nodepool update nodepool1 label - self.cmd('aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --labels {labels}', checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + self.cmd( + "aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --labels {labels}", + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # nodepool list - self.cmd('aks nodepool list --resource-group={resource_group} --cluster-name={name}', checks=[ - self.check('[0].mode', 'System'), - self.check('[0].nodeLabels.label1', 'value1'), - ]) + self.cmd( + "aks nodepool list --resource-group={resource_group} --cluster-name={name}", + checks=[ + self.check("[0].mode", "System"), + self.check("[0].nodeLabels.label1", "value1"), + ], + ) # nodepool delete nodepool1 label - self.cmd('aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --labels ', checks=[ - self.check('nodeLabels.label1', None) - ]) + self.cmd( + "aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --labels ", + checks=[self.check("nodeLabels.label1", None)], + ) # nodepool show - self.cmd('aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name}', checks=[ - self.check('nodeLabels.label1', None) - ]) + self.cmd( + "aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name}", + checks=[self.check("nodeLabels.label1", None)], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_update_label_msi(self, resource_group, resource_group_location): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) + aks_name = self.create_random_name("cliakstest", 16) nodepool1_name = "nodepool1" nodepool2_name = "nodepool2" tags = "key1=value1" new_tags = "key2=value2" nodepool_labels = "label1=value1 label2=value2" - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'tags': tags, - 'new_tags': new_tags, - 'nodepool1_name': nodepool1_name, - 'nodepool2_name': nodepool2_name, - 'nodepool_labels': nodepool_labels, - }) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "tags": tags, + "new_tags": new_tags, + "nodepool1_name": nodepool1_name, + "nodepool2_name": nodepool2_name, + "nodepool_labels": nodepool_labels, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} ' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded') - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--nodepool-labels {nodepool_labels}' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].nodeLabels.label1', 'value1'), - self.check('agentPoolProfiles[0].nodeLabels.label2', 'value2'), - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--nodepool-labels ' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].nodeLabels.label1', None), - self.check('agentPoolProfiles[0].nodeLabels.label2', None), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} " + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + ], + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--nodepool-labels {nodepool_labels}" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].nodeLabels.label1", "value1"), + self.check("agentPoolProfiles[0].nodeLabels.label2", "value2"), + ], + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--nodepool-labels " + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].nodeLabels.label1", None), + self.check("agentPoolProfiles[0].nodeLabels.label2", None), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_create_update_taint_msi(self, resource_group, resource_group_location): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) + aks_name = self.create_random_name("cliakstest", 16) nodepool1_name = "nodepool1" nodepool2_name = "nodepool2" tags = "key1=value1" new_tags = "key2=value2" - nodepool_taints = "taint1=value1:PreferNoSchedule,taint2=value2:PreferNoSchedule" + nodepool_taints = ( + "taint1=value1:PreferNoSchedule,taint2=value2:PreferNoSchedule" + ) nodepool_taints2 = "taint1=value2:PreferNoSchedule" - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_name_prefix': self.create_random_name('cliaksdns', 16), - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'tags': tags, - 'new_tags': new_tags, - 'nodepool1_name': nodepool1_name, - 'nodepool2_name': nodepool2_name, - 'nodepool_taints': nodepool_taints, - 'nodepool_taints2': nodepool_taints2, - }) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_name_prefix": self.create_random_name("cliaksdns", 16), + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "tags": tags, + "new_tags": new_tags, + "nodepool1_name": nodepool1_name, + "nodepool2_name": nodepool2_name, + "nodepool_taints": nodepool_taints, + "nodepool_taints2": nodepool_taints2, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --nodepool-taints {nodepool_taints} ' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].nodeTaints[0]', 'taint1=value1:PreferNoSchedule'), - self.check('agentPoolProfiles[0].nodeTaints[1]', 'taint2=value2:PreferNoSchedule'), - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--nodepool-taints {nodepool_taints2}' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].nodeTaints[0]', 'taint1=value2:PreferNoSchedule'), - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--nodepool-taints ""' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].nodeTaints', None), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_create_with_oidc_issuer_enabled(self, resource_group, resource_group_location): + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --nodepool-taints {nodepool_taints} " + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check( + "agentPoolProfiles[0].nodeTaints[0]", + "taint1=value1:PreferNoSchedule", + ), + self.check( + "agentPoolProfiles[0].nodeTaints[1]", + "taint2=value2:PreferNoSchedule", + ), + ], + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--nodepool-taints {nodepool_taints2}" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "agentPoolProfiles[0].nodeTaints[0]", + "taint1=value2:PreferNoSchedule", + ), + ], + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + '--nodepool-taints ""' + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].nodeTaints", None), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_create_with_oidc_issuer_enabled( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--enable-oidc-issuer ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('oidcIssuerProfile.enabled', True), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_update_with_oidc_issuer_enabled(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--enable-oidc-issuer " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("oidcIssuerProfile.enabled", True), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_update_with_oidc_issuer_enabled( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview ' \ - '--enable-oidc-issuer' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('oidcIssuerProfile.enabled', True), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_create_with_workload_identity_enabled(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview " + "--enable-oidc-issuer" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("oidcIssuerProfile.enabled", True), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_create_with_workload_identity_enabled( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = ' '.join([ - 'aks', 'create', '--resource-group={resource_group}', '--name={name}', '--location={location}', - '--enable-managed-identity', '--enable-oidc-issuer', '--enable-workload-identity', - '--ssh-key-value={ssh_key_value}', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableWorkloadIdentityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview', - ]) - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('oidcIssuerProfile.enabled', True), - self.check('securityProfile.workloadIdentity.enabled', True), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_update_with_workload_identity(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = " ".join( + [ + "aks", + "create", + "--resource-group={resource_group}", + "--name={name}", + "--location={location}", + "--enable-managed-identity", + "--enable-oidc-issuer", + "--enable-workload-identity", + "--ssh-key-value={ssh_key_value}", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableWorkloadIdentityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview", + ] + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("oidcIssuerProfile.enabled", True), + self.check("securityProfile.workloadIdentity.enabled", True), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_update_with_workload_identity( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = ' '.join([ - 'aks', 'create', '--resource-group={resource_group}', '--name={name}', '--location={location}', - '--enable-managed-identity', '--enable-oidc-issuer', - '--ssh-key-value={ssh_key_value}', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableWorkloadIdentityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview', - ]) - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - - enable_cmd = ' '.join([ - 'aks', 'update', '--resource-group={resource_group}', '--name={name}', - '--enable-workload-identity', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableWorkloadIdentityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview', - ]) - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.workloadIdentity.enabled', True), - ]) - - disable_cmd = ' '.join([ - 'aks', 'update', '--resource-group={resource_group}', '--name={name}', - '--disable-workload-identity', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableWorkloadIdentityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview', - ]) - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.workloadIdentity.enabled', False), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_image_cleaner_enabled_with_default_interval_hours(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = " ".join( + [ + "aks", + "create", + "--resource-group={resource_group}", + "--name={name}", + "--location={location}", + "--enable-managed-identity", + "--enable-oidc-issuer", + "--ssh-key-value={ssh_key_value}", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableWorkloadIdentityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview", + ] + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + enable_cmd = " ".join( + [ + "aks", + "update", + "--resource-group={resource_group}", + "--name={name}", + "--enable-workload-identity", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableWorkloadIdentityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview", + ] + ) + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.workloadIdentity.enabled", True), + ], + ) + + disable_cmd = " ".join( + [ + "aks", + "update", + "--resource-group={resource_group}", + "--name={name}", + "--disable-workload-identity", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableWorkloadIdentityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableOIDCIssuerPreview", + ] + ) + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.workloadIdentity.enabled", False), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_image_cleaner_enabled_with_default_interval_hours( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'vm_size': 'Standard_D4s_v3', - 'node_count': 1, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = ' '.join([ - 'aks', 'create', '--resource-group={resource_group}', '--name={name}', '--location={location}', - '--node-vm-size {vm_size}', - '--node-count {node_count}', - '--enable-image-cleaner', - '--ssh-key-value={ssh_key_value}', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview', - ]) - - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.imageCleaner.enabled', True), - self.check('securityProfile.imageCleaner.intervalHours', 7*24), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_image_cleaner_enabled_with_interval_hours(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "vm_size": "Standard_D4s_v3", + "node_count": 1, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = " ".join( + [ + "aks", + "create", + "--resource-group={resource_group}", + "--name={name}", + "--location={location}", + "--node-vm-size {vm_size}", + "--node-count {node_count}", + "--enable-image-cleaner", + "--ssh-key-value={ssh_key_value}", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview", + ] + ) + + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.imageCleaner.enabled", True), + self.check("securityProfile.imageCleaner.intervalHours", 7 * 24), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_image_cleaner_enabled_with_interval_hours( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'vm_size': 'Standard_D4s_v3', - 'node_count': 1, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = ' '.join([ - 'aks', 'create', '--resource-group={resource_group}', '--name={name}', '--location={location}', - '--node-vm-size {vm_size}', - '--node-count {node_count}', - '--enable-image-cleaner', - '--image-cleaner-interval-hours 24', - '--ssh-key-value={ssh_key_value}', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview', - ]) - - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.imageCleaner.enabled', True), - self.check('securityProfile.imageCleaner.intervalHours', 24), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_update_with_image_cleaner(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "vm_size": "Standard_D4s_v3", + "node_count": 1, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = " ".join( + [ + "aks", + "create", + "--resource-group={resource_group}", + "--name={name}", + "--location={location}", + "--node-vm-size {vm_size}", + "--node-count {node_count}", + "--enable-image-cleaner", + "--image-cleaner-interval-hours 24", + "--ssh-key-value={ssh_key_value}", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview", + ] + ) + + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.imageCleaner.enabled", True), + self.check("securityProfile.imageCleaner.intervalHours", 24), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_update_with_image_cleaner( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'vm_size': 'Standard_D4s_v3', - 'node_count': 1, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = ' '.join([ - 'aks', 'create', '--resource-group={resource_group}', '--name={name}', '--location={location}', - '--node-vm-size {vm_size}', - '--node-count {node_count}', - '--enable-image-cleaner', - '--ssh-key-value={ssh_key_value}', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview', - ]) - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.imageCleaner.enabled', True), - self.check('securityProfile.imageCleaner.intervalHours', 7*24), - ]) - - update_interval_cmd = ' '.join([ - 'aks', 'update', '--resource-group={resource_group}', '--name={name}', - '--image-cleaner-interval-hours 24', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview', - ]) - self.cmd(update_interval_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.imageCleaner.enabled', True), - self.check('securityProfile.imageCleaner.intervalHours', 24), - ]) - - disable_cmd = ' '.join([ - 'aks', 'update', '--resource-group={resource_group}', '--name={name}', - '--disable-image-cleaner', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview', - ]) - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.imageCleaner.enabled', False), - self.check('securityProfile.imageCleaner.intervalHours', 24), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_image_integrity_enabled(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "vm_size": "Standard_D4s_v3", + "node_count": 1, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = " ".join( + [ + "aks", + "create", + "--resource-group={resource_group}", + "--name={name}", + "--location={location}", + "--node-vm-size {vm_size}", + "--node-count {node_count}", + "--enable-image-cleaner", + "--ssh-key-value={ssh_key_value}", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview", + ] + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.imageCleaner.enabled", True), + self.check("securityProfile.imageCleaner.intervalHours", 7 * 24), + ], + ) + + update_interval_cmd = " ".join( + [ + "aks", + "update", + "--resource-group={resource_group}", + "--name={name}", + "--image-cleaner-interval-hours 24", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview", + ] + ) + self.cmd( + update_interval_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.imageCleaner.enabled", True), + self.check("securityProfile.imageCleaner.intervalHours", 24), + ], + ) + + disable_cmd = " ".join( + [ + "aks", + "update", + "--resource-group={resource_group}", + "--name={name}", + "--disable-image-cleaner", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageCleanerPreview", + ] + ) + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.imageCleaner.enabled", False), + self.check("securityProfile.imageCleaner.intervalHours", 24), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_image_integrity_enabled( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'vm_size': 'Standard_D4s_v3', - 'node_count': 1, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = ' '.join([ - 'aks', 'create', '--resource-group={resource_group}', '--name={name}', '--location={location}', - '--node-vm-size {vm_size}', - '--node-count {node_count}', - '--enable-image-integrity', - '-a azure-policy', - '--enable-oidc-issuer', - '--ssh-key-value={ssh_key_value}', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageIntegrityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-AzurePolicyExternalData', - ]) - - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.imageIntegrity.enabled', True), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_update_with_image_integrity(self, resource_group, resource_group_location): + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "vm_size": "Standard_D4s_v3", + "node_count": 1, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = " ".join( + [ + "aks", + "create", + "--resource-group={resource_group}", + "--name={name}", + "--location={location}", + "--node-vm-size {vm_size}", + "--node-count {node_count}", + "--enable-image-integrity", + "-a azure-policy", + "--enable-oidc-issuer", + "--ssh-key-value={ssh_key_value}", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageIntegrityPreview,AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-AzurePolicyExternalData", + ] + ) + + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.imageIntegrity.enabled", True), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_update_with_image_integrity( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - request_body = '{\"type\": \"Microsoft.ContainerService/managedClusters\", \"name\": \"'+ aks_name +'\", \"location\": \"' + resource_group_location + '\", \"properties\": {\"securityProfile\": {\"imageIntegrity\": {\"enabled\": true}}}}' - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'vm_size': 'Standard_D4s_v3', - 'node_count': 1, - 'ssh_key_value': self.generate_ssh_keys(), - 'request_body': request_body, - }) - - create_cmd = ' '.join([ - 'aks', 'create', '--resource-group={resource_group}', '--name={name}', '--location={location}', - '--node-vm-size {vm_size}', - '--node-count {node_count}', - '-a azure-policy', - '--enable-oidc-issuer', - '--ssh-key-value={ssh_key_value}', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-AzurePolicyExternalData', - ]) - response=self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]).get_output_in_json() + aks_name = self.create_random_name("cliakstest", 16) + request_body = ( + '{"type": "Microsoft.ContainerService/managedClusters", "name": "' + + aks_name + + '", "location": "' + + resource_group_location + + '", "properties": {"securityProfile": {"imageIntegrity": {"enabled": true}}}}' + ) - cluster_resource_id = response["id"] - subscription = cluster_resource_id.split("/")[2] + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "vm_size": "Standard_D4s_v3", + "node_count": 1, + "ssh_key_value": self.generate_ssh_keys(), + "request_body": request_body, + } + ) + + create_cmd = " ".join( + [ + "aks", + "create", + "--resource-group={resource_group}", + "--name={name}", + "--location={location}", + "--node-vm-size {vm_size}", + "--node-count {node_count}", + "-a azure-policy", + "--enable-oidc-issuer", + "--ssh-key-value={ssh_key_value}", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-AzurePolicyExternalData", + ] + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + enable_cmd = " ".join( + [ + "aks", + "update", + "--resource-group={resource_group}", + "--name={name}", + "--enable-image-integrity", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageIntegrityPreview", + ] + ) + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.imageIntegrity.enabled", True), + ], + ) - from azure.cli.core.profiles._shared import AZURE_API_PROFILES - from azext_aks_preview._client_factory import CUSTOM_MGMT_AKS_PREVIEW - sdk_profile = AZURE_API_PROFILES["latest"][CUSTOM_MGMT_AKS_PREVIEW] - api_version = sdk_profile.default_api_version - - enable_cmd = ' '.join([ - 'aks', 'update', '--resource-group={resource_group}', '--name={name}', - '--enable-image-integrity', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableImageIntegrityPreview', - ]) - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.imageIntegrity.enabled', True), - ]) - - disable_cmd = ' '.join([ - 'aks', 'update', '--resource-group={resource_group}', '--name={name}', - '--disable-image-integrity', - ]) - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.imageIntegrity.enabled', False), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + disable_cmd = " ".join( + [ + "aks", + "update", + "--resource-group={resource_group}", + "--name={name}", + "--disable-image-integrity", + ] + ) + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.imageIntegrity.enabled", False), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_create_with_crg_id(self, resource_group, resource_group_location): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - node_pool_name = self.create_random_name('c', 6) - node_pool_name_second = self.create_random_name('c', 6) - crg_id = '/subscriptions/26fe00f8-9173-4872-9134-bb1d2e00343a/resourceGroups/STAGING-CRG-RG/providers' \ - '/Microsoft.Compute/capacityReservationGroups/crg-3' - vm_size = 'Standard_D4s_v3' + aks_name = self.create_random_name("cliakstest", 16) + node_pool_name = self.create_random_name("c", 6) + node_pool_name_second = self.create_random_name("c", 6) + crg_id = ( + "/subscriptions/26fe00f8-9173-4872-9134-bb1d2e00343a/resourceGroups/STAGING-CRG-RG/providers" + "/Microsoft.Compute/capacityReservationGroups/crg-3" + ) + vm_size = "Standard_D4s_v3" count = 1 - identity = '/subscriptions/26fe00f8-9173-4872-9134-bb1d2e00343a/resourceGroups/staging-crg-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/crg-rg-id' - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'count': count, - 'location': resource_group_location, - 'crg_id': crg_id, - 'vm_size': vm_size, - 'identity': identity, - 'node_pool_name': node_pool_name, - 'node_pool_name_second': node_pool_name_second, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--node-vm-size {vm_size} ' \ - '--nodepool-name {node_pool_name} -c 1 ' \ - '--enable-managed-identity ' \ - '--assign-identity {identity} ' \ - '--crg-id={crg_id} ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + identity = "/subscriptions/26fe00f8-9173-4872-9134-bb1d2e00343a/resourceGroups/staging-crg-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/crg-rg-id" + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "count": count, + "location": resource_group_location, + "crg_id": crg_id, + "vm_size": vm_size, + "identity": identity, + "node_pool_name": node_pool_name, + "node_pool_name_second": node_pool_name_second, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--node-vm-size {vm_size} " + "--nodepool-name {node_pool_name} -c 1 " + "--enable-managed-identity " + "--assign-identity {identity} " + "--crg-id={crg_id} " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # nodepool get-upgrades - self.cmd('aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name_second} ' - '--node-vm-size {vm_size} ' - '--crg-id={crg_id} ' - '-c 1 ', - checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name_second} " + "--node-vm-size {vm_size} " + "--crg-id={crg_id} " + "-c 1 ", + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_network_plugin_none(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_network_plugin_none( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) - create_cmd = 'aks create --resource-group={resource_group} --name={name} --network-plugin=none ' \ - '--location={location} --ssh-key-value={ssh_key_value} -o json' + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --network-plugin=none " + "--location={location} --ssh-key-value={ssh_key_value} -o json" + ) - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.networkPlugin', 'none'), - ]) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.networkPlugin", "none"), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_create_with_azurekeyvaultkms_public_key_vault(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - kv_name = self.create_random_name('cliakstestkv', 16) - identity_name = self.create_random_name('cliakstestidentity', 24) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - "kv_name": kv_name, - "identity_name": identity_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_create_with_azurekeyvaultkms_public_key_vault( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + kv_name = self.create_random_name("cliakstestkv", 16) + identity_name = self.create_random_name("cliakstestidentity", 24) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kv_name": kv_name, + "identity_name": identity_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create user-assigned identity - create_identity = 'identity create --resource-group={resource_group} --name={identity_name} -o json' + create_identity = "identity create --resource-group={resource_group} --name={identity_name} -o json" identity = self.cmd(create_identity).get_output_in_json() - identity_id = identity['id'] - identity_object_id = identity['principalId'] + identity_id = identity["id"] + identity_object_id = identity["principalId"] assert identity_id is not None assert identity_object_id is not None - self.kwargs.update({ - 'identity_id': identity_id, - 'identity_object_id': identity_object_id, - }) + self.kwargs.update( + { + "identity_id": identity_id, + "identity_object_id": identity_object_id, + } + ) # create key vault and key - create_keyvault = 'keyvault create --resource-group={resource_group} --name={kv_name} -o json' - kv = self.cmd(create_keyvault, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_key = 'keyvault key create -n kms --vault-name {kv_name} -o json' - key = self.cmd(create_key, checks=[ - self.check('attributes.enabled', True) - ]).get_output_in_json() - key_id_0 = key['key']['kid'] + create_keyvault = ( + "keyvault create --resource-group={resource_group} --name={kv_name} -o json" + ) + self.cmd( + create_keyvault, + checks=[self.check("properties.provisioningState", "Succeeded")], + ) + + create_key = "keyvault key create -n kms --vault-name {kv_name} -o json" + key = self.cmd( + create_key, checks=[self.check("attributes.enabled", True)] + ).get_output_in_json() + key_id_0 = key["key"]["kid"] assert key_id_0 is not None - self.kwargs.update({ - 'key_id': key_id_0, - }) + self.kwargs.update( + { + "key_id": key_id_0, + } + ) # assign access policy - set_policy = 'keyvault set-policy --resource-group={resource_group} --name={kv_name} ' \ - '--object-id {identity_object_id} --key-permissions encrypt decrypt -o json' - policy = self.cmd(set_policy, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--assign-identity {identity_id} ' \ - '--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} --azure-keyvault-kms-key-vault-network-access=Public ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.azureKeyVaultKms.enabled', True), - self.check('securityProfile.azureKeyVaultKms.keyId', key_id_0), - self.check('securityProfile.azureKeyVaultKms.keyVaultNetworkAccess', 'Public') - ]) - - key = self.cmd(create_key, checks=[ - self.check('attributes.enabled', True) - ]).get_output_in_json() - key_id_1 = key['key']['kid'] + set_policy = ( + "keyvault set-policy --resource-group={resource_group} --name={kv_name} " + "--object-id {identity_object_id} --key-permissions encrypt decrypt -o json" + ) + self.cmd( + set_policy, checks=[self.check("properties.provisioningState", "Succeeded")] + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--assign-identity {identity_id} " + "--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} --azure-keyvault-kms-key-vault-network-access=Public " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.azureKeyVaultKms.enabled", True), + self.check("securityProfile.azureKeyVaultKms.keyId", key_id_0), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultNetworkAccess", "Public" + ), + ], + ) + + key = self.cmd( + create_key, checks=[self.check("attributes.enabled", True)] + ).get_output_in_json() + key_id_1 = key["key"]["kid"] assert key_id_1 is not None - self.kwargs.update({ - 'key_id': key_id_1, - }) + self.kwargs.update( + { + "key_id": key_id_1, + } + ) # Rotate key - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} --azure-keyvault-kms-key-vault-network-access=Public ' \ - '-o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.azureKeyVaultKms.enabled', True), - self.check('securityProfile.azureKeyVaultKms.keyId', key_id_1), - self.check('securityProfile.azureKeyVaultKms.keyVaultNetworkAccess', 'Public') - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} --azure-keyvault-kms-key-vault-network-access=Public " + "-o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.azureKeyVaultKms.enabled", True), + self.check("securityProfile.azureKeyVaultKms.keyId", key_id_1), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultNetworkAccess", "Public" + ), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_update_with_azurekeyvaultkms_public_key_vault(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - kv_name = self.create_random_name('cliakstestkv', 16) - identity_name = self.create_random_name('cliakstestidentity', 24) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - "kv_name": kv_name, - "identity_name": identity_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_update_with_azurekeyvaultkms_public_key_vault( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + kv_name = self.create_random_name("cliakstestkv", 16) + identity_name = self.create_random_name("cliakstestidentity", 24) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kv_name": kv_name, + "identity_name": identity_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create user-assigned identity - create_identity = 'identity create --resource-group={resource_group} --name={identity_name} -o json' + create_identity = "identity create --resource-group={resource_group} --name={identity_name} -o json" identity = self.cmd(create_identity).get_output_in_json() - identity_id = identity['id'] - identity_object_id = identity['principalId'] + identity_id = identity["id"] + identity_object_id = identity["principalId"] assert identity_id is not None assert identity_object_id is not None - self.kwargs.update({ - 'identity_id': identity_id, - 'identity_object_id': identity_object_id, - }) + self.kwargs.update( + { + "identity_id": identity_id, + "identity_object_id": identity_object_id, + } + ) # create key vault and key - create_keyvault = 'keyvault create --resource-group={resource_group} --name={kv_name} -o json' - kv = self.cmd(create_keyvault, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_key = 'keyvault key create -n kms --vault-name {kv_name} -o json' - key = self.cmd(create_key, checks=[ - self.check('attributes.enabled', True) - ]).get_output_in_json() - key_id = key['key']['kid'] + create_keyvault = ( + "keyvault create --resource-group={resource_group} --name={kv_name} -o json" + ) + self.cmd( + create_keyvault, + checks=[self.check("properties.provisioningState", "Succeeded")], + ) + + create_key = "keyvault key create -n kms --vault-name {kv_name} -o json" + key = self.cmd( + create_key, checks=[self.check("attributes.enabled", True)] + ).get_output_in_json() + key_id = key["key"]["kid"] assert key_id is not None - self.kwargs.update({ - 'key_id': key_id, - }) + self.kwargs.update( + { + "key_id": key_id, + } + ) # assign access policy - set_policy = 'keyvault set-policy --resource-group={resource_group} --name={kv_name} ' \ - '--object-id {identity_object_id} --key-permissions encrypt decrypt -o json' - policy = self.cmd(set_policy, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--assign-identity {identity_id} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.not_exists('securityProfile.azureKeyVaultKms') - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} --azure-keyvault-kms-key-vault-network-access=Public ' \ - '-o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.azureKeyVaultKms.enabled', True), - self.check('securityProfile.azureKeyVaultKms.keyId', key_id), - self.check('securityProfile.azureKeyVaultKms.keyVaultNetworkAccess', 'Public') - ]) + set_policy = ( + "keyvault set-policy --resource-group={resource_group} --name={kv_name} " + "--object-id {identity_object_id} --key-permissions encrypt decrypt -o json" + ) + self.cmd( + set_policy, checks=[self.check("properties.provisioningState", "Succeeded")] + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--assign-identity {identity_id} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.not_exists("securityProfile.azureKeyVaultKms"), + ], + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} --azure-keyvault-kms-key-vault-network-access=Public " + "-o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.azureKeyVaultKms.enabled", True), + self.check("securityProfile.azureKeyVaultKms.keyId", key_id), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultNetworkAccess", "Public" + ), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_with_azurekeyvaultkms_private_key_vault(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - kv_name = self.create_random_name('cliakstestkv', 16) - identity_name = self.create_random_name('cliakstestidentity', 24) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - "kv_name": kv_name, - "identity_name": identity_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_with_azurekeyvaultkms_private_key_vault( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + kv_name = self.create_random_name("cliakstestkv", 16) + identity_name = self.create_random_name("cliakstestidentity", 24) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kv_name": kv_name, + "identity_name": identity_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create user-assigned identity - create_identity = 'identity create --resource-group={resource_group} --name={identity_name} -o json' + create_identity = "identity create --resource-group={resource_group} --name={identity_name} -o json" identity = self.cmd(create_identity).get_output_in_json() - identity_id = identity['id'] - identity_object_id = identity['principalId'] + identity_id = identity["id"] + identity_object_id = identity["principalId"] assert identity_id is not None assert identity_object_id is not None - self.kwargs.update({ - 'identity_id': identity_id, - 'identity_object_id': identity_object_id, - }) + self.kwargs.update( + { + "identity_id": identity_id, + "identity_object_id": identity_object_id, + } + ) # create key vault and key - create_keyvault = 'keyvault create --resource-group={resource_group} --name={kv_name} -o json' - kv = self.cmd(create_keyvault, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - kv_resource_id = kv['id'] + create_keyvault = ( + "keyvault create --resource-group={resource_group} --name={kv_name} -o json" + ) + kv = self.cmd( + create_keyvault, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() + kv_resource_id = kv["id"] assert kv_resource_id is not None - self.kwargs.update({ - 'kv_resource_id': kv_resource_id, - }) - - create_key = 'keyvault key create -n kms --vault-name {kv_name} -o json' - key = self.cmd(create_key, checks=[ - self.check('attributes.enabled', True) - ]).get_output_in_json() - key_id_0 = key['key']['kid'] + self.kwargs.update( + { + "kv_resource_id": kv_resource_id, + } + ) + + create_key = "keyvault key create -n kms --vault-name {kv_name} -o json" + key = self.cmd( + create_key, checks=[self.check("attributes.enabled", True)] + ).get_output_in_json() + key_id_0 = key["key"]["kid"] assert key_id_0 is not None - self.kwargs.update({ - 'key_id': key_id_0, - }) + self.kwargs.update( + { + "key_id": key_id_0, + } + ) # assign access policy - set_policy = 'keyvault set-policy --resource-group={resource_group} --name={kv_name} ' \ - '--object-id {identity_object_id} --key-permissions encrypt decrypt -o json' - policy = self.cmd(set_policy, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() + set_policy = ( + "keyvault set-policy --resource-group={resource_group} --name={kv_name} " + "--object-id {identity_object_id} --key-permissions encrypt decrypt -o json" + ) + self.cmd( + set_policy, checks=[self.check("properties.provisioningState", "Succeeded")] + ) # allow the identity approve private endpoint connection (Microsoft.KeyVault/vaults/privateEndpointConnectionsApproval/action) - create_role_assignment = 'role assignment create --role f25e0fa2-a7c8-4377-a976-54943a77a395 ' \ - '--assignee-object-id {identity_object_id} --assignee-principal-type "ServicePrincipal" ' \ - '--scope {kv_resource_id}' - role_assignment = self.cmd(create_role_assignment).get_output_in_json() + create_role_assignment = ( + "role assignment create --role f25e0fa2-a7c8-4377-a976-54943a77a395 " + '--assignee-object-id {identity_object_id} --assignee-principal-type "ServicePrincipal" ' + "--scope {kv_resource_id}" + ) + self.cmd(create_role_assignment) # disable public network access disable_public_network_access = 'keyvault update --resource-group={resource_group} --name={kv_name} --public-network-access "Disabled" -o json' - kv = self.cmd(disable_public_network_access, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--assign-identity {identity_id} ' \ - '--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} ' \ - '--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.azureKeyVaultKms.enabled', True), - self.check('securityProfile.azureKeyVaultKms.keyId', key_id_0), - self.check('securityProfile.azureKeyVaultKms.keyVaultNetworkAccess', "Private"), - self.check('securityProfile.azureKeyVaultKms.keyVaultResourceId', kv_resource_id) - ]) + kv = self.cmd( + disable_public_network_access, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--assign-identity {identity_id} " + "--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} " + "--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.azureKeyVaultKms.enabled", True), + self.check("securityProfile.azureKeyVaultKms.keyId", key_id_0), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultNetworkAccess", "Private" + ), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultResourceId", + kv_resource_id, + ), + ], + ) # enable public network access enable_public_network_access = 'keyvault update --resource-group={resource_group} --name={kv_name} --public-network-access "Enabled" -o json' - kv = self.cmd(enable_public_network_access, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - key = self.cmd(create_key, checks=[ - self.check('attributes.enabled', True) - ]).get_output_in_json() - key_id_1 = key['key']['kid'] + kv = self.cmd( + enable_public_network_access, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() + + key = self.cmd( + create_key, checks=[self.check("attributes.enabled", True)] + ).get_output_in_json() + key_id_1 = key["key"]["kid"] assert key_id_1 is not None - self.kwargs.update({ - 'key_id': key_id_1, - }) + self.kwargs.update( + { + "key_id": key_id_1, + } + ) # disable public network access disable_public_network_access = 'keyvault update --resource-group={resource_group} --name={kv_name} --public-network-access "Disabled" -o json' - kv = self.cmd(disable_public_network_access, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() + kv = self.cmd( + disable_public_network_access, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() # Rotate key - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} ' \ - '--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} ' \ - '-o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.azureKeyVaultKms.enabled', True), - self.check('securityProfile.azureKeyVaultKms.keyId', key_id_1), - self.check('securityProfile.azureKeyVaultKms.keyVaultNetworkAccess', "Private"), - self.check('securityProfile.azureKeyVaultKms.keyVaultResourceId', kv_resource_id) - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} " + "--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} " + "-o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.azureKeyVaultKms.enabled", True), + self.check("securityProfile.azureKeyVaultKms.keyId", key_id_1), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultNetworkAccess", "Private" + ), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultResourceId", + kv_resource_id, + ), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_update_with_azurekeyvaultkms_private_key_vault(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - kv_name = self.create_random_name('cliakstestkv', 16) - identity_name = self.create_random_name('cliakstestidentity', 24) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - "kv_name": kv_name, - "identity_name": identity_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_update_with_azurekeyvaultkms_private_key_vault( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + kv_name = self.create_random_name("cliakstestkv", 16) + identity_name = self.create_random_name("cliakstestidentity", 24) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kv_name": kv_name, + "identity_name": identity_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create user-assigned identity - create_identity = 'identity create --resource-group={resource_group} --name={identity_name} -o json' + create_identity = "identity create --resource-group={resource_group} --name={identity_name} -o json" identity = self.cmd(create_identity).get_output_in_json() - identity_id = identity['id'] - identity_object_id = identity['principalId'] + identity_id = identity["id"] + identity_object_id = identity["principalId"] assert identity_id is not None assert identity_object_id is not None - self.kwargs.update({ - 'identity_id': identity_id, - 'identity_object_id': identity_object_id, - }) + self.kwargs.update( + { + "identity_id": identity_id, + "identity_object_id": identity_object_id, + } + ) # create key vault and key - create_keyvault = 'keyvault create --resource-group={resource_group} --name={kv_name} -o json' - kv = self.cmd(create_keyvault, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - kv_resource_id = kv['id'] + create_keyvault = ( + "keyvault create --resource-group={resource_group} --name={kv_name} -o json" + ) + kv = self.cmd( + create_keyvault, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() + kv_resource_id = kv["id"] assert kv_resource_id is not None - self.kwargs.update({ - 'kv_resource_id': kv_resource_id, - }) - - create_key = 'keyvault key create -n kms --vault-name {kv_name} -o json' - key = self.cmd(create_key, checks=[ - self.check('attributes.enabled', True) - ]).get_output_in_json() - key_id = key['key']['kid'] + self.kwargs.update( + { + "kv_resource_id": kv_resource_id, + } + ) + + create_key = "keyvault key create -n kms --vault-name {kv_name} -o json" + key = self.cmd( + create_key, checks=[self.check("attributes.enabled", True)] + ).get_output_in_json() + key_id = key["key"]["kid"] assert key_id is not None - self.kwargs.update({ - 'key_id': key_id, - }) + self.kwargs.update( + { + "key_id": key_id, + } + ) # assign access policy - set_policy = 'keyvault set-policy --resource-group={resource_group} --name={kv_name} ' \ - '--object-id {identity_object_id} --key-permissions encrypt decrypt -o json' - policy = self.cmd(set_policy, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() + set_policy = ( + "keyvault set-policy --resource-group={resource_group} --name={kv_name} " + "--object-id {identity_object_id} --key-permissions encrypt decrypt -o json" + ) + self.cmd( + set_policy, checks=[self.check("properties.provisioningState", "Succeeded")] + ) # allow the identity approve private endpoint connection (Microsoft.KeyVault/vaults/privateEndpointConnectionsApproval/action) - create_role_assignment = 'role assignment create --role f25e0fa2-a7c8-4377-a976-54943a77a395 ' \ - '--assignee-object-id {identity_object_id} --assignee-principal-type "ServicePrincipal" ' \ - '--scope {kv_resource_id}' - role_assignment = self.cmd(create_role_assignment).get_output_in_json() + create_role_assignment = ( + "role assignment create --role f25e0fa2-a7c8-4377-a976-54943a77a395 " + '--assignee-object-id {identity_object_id} --assignee-principal-type "ServicePrincipal" ' + "--scope {kv_resource_id}" + ) + self.cmd(create_role_assignment) # disable public network access disable_public_network_access = 'keyvault update --resource-group={resource_group} --name={kv_name} --public-network-access "Disabled" -o json' - kv = self.cmd(disable_public_network_access, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--assign-identity {identity_id} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.not_exists('securityProfile.azureKeyVaultKms') - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} ' \ - '--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} ' \ - '-o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.azureKeyVaultKms.enabled', True), - self.check('securityProfile.azureKeyVaultKms.keyId', key_id), - self.check('securityProfile.azureKeyVaultKms.keyVaultNetworkAccess', "Private"), - self.check('securityProfile.azureKeyVaultKms.keyVaultResourceId', kv_resource_id) - ]) + kv = self.cmd( + disable_public_network_access, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--assign-identity {identity_id} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.not_exists("securityProfile.azureKeyVaultKms"), + ], + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} " + "--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} " + "-o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.azureKeyVaultKms.enabled", True), + self.check("securityProfile.azureKeyVaultKms.keyId", key_id), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultNetworkAccess", "Private" + ), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultResourceId", + kv_resource_id, + ), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_with_azurekeyvaultkms_private_cluster_v1_private_key_vault(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - kv_name = self.create_random_name('cliakstestkv', 16) - identity_name = self.create_random_name('cliakstestidentity', 24) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - "kv_name": kv_name, - "identity_name": identity_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_with_azurekeyvaultkms_private_cluster_v1_private_key_vault( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + kv_name = self.create_random_name("cliakstestkv", 16) + identity_name = self.create_random_name("cliakstestidentity", 24) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kv_name": kv_name, + "identity_name": identity_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create user-assigned identity - create_identity = 'identity create --resource-group={resource_group} --name={identity_name} -o json' + create_identity = "identity create --resource-group={resource_group} --name={identity_name} -o json" identity = self.cmd(create_identity).get_output_in_json() - identity_id = identity['id'] - identity_object_id = identity['principalId'] + identity_id = identity["id"] + identity_object_id = identity["principalId"] assert identity_id is not None assert identity_object_id is not None - self.kwargs.update({ - 'identity_id': identity_id, - 'identity_object_id': identity_object_id, - }) + self.kwargs.update( + { + "identity_id": identity_id, + "identity_object_id": identity_object_id, + } + ) # create key vault and key - create_keyvault = 'keyvault create --resource-group={resource_group} --name={kv_name} -o json' - kv = self.cmd(create_keyvault, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - kv_resource_id = kv['id'] + create_keyvault = ( + "keyvault create --resource-group={resource_group} --name={kv_name} -o json" + ) + kv = self.cmd( + create_keyvault, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() + kv_resource_id = kv["id"] assert kv_resource_id is not None - self.kwargs.update({ - 'kv_resource_id': kv_resource_id, - }) - - create_key = 'keyvault key create -n kms --vault-name {kv_name} -o json' - key = self.cmd(create_key, checks=[ - self.check('attributes.enabled', True) - ]).get_output_in_json() - key_id_0 = key['key']['kid'] + self.kwargs.update( + { + "kv_resource_id": kv_resource_id, + } + ) + + create_key = "keyvault key create -n kms --vault-name {kv_name} -o json" + key = self.cmd( + create_key, checks=[self.check("attributes.enabled", True)] + ).get_output_in_json() + key_id_0 = key["key"]["kid"] assert key_id_0 is not None - self.kwargs.update({ - 'key_id': key_id_0, - }) + self.kwargs.update( + { + "key_id": key_id_0, + } + ) # assign access policy - set_policy = 'keyvault set-policy --resource-group={resource_group} --name={kv_name} ' \ - '--object-id {identity_object_id} --key-permissions encrypt decrypt -o json' - policy = self.cmd(set_policy, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() + set_policy = ( + "keyvault set-policy --resource-group={resource_group} --name={kv_name} " + "--object-id {identity_object_id} --key-permissions encrypt decrypt -o json" + ) + self.cmd( + set_policy, checks=[self.check("properties.provisioningState", "Succeeded")] + ) # allow the identity approve private endpoint connection (Microsoft.KeyVault/vaults/privateEndpointConnectionsApproval/action) - create_role_assignment = 'role assignment create --role f25e0fa2-a7c8-4377-a976-54943a77a395 ' \ - '--assignee-object-id {identity_object_id} --assignee-principal-type "ServicePrincipal" ' \ - '--scope {kv_resource_id}' - role_assignment = self.cmd(create_role_assignment).get_output_in_json() + create_role_assignment = ( + "role assignment create --role f25e0fa2-a7c8-4377-a976-54943a77a395 " + '--assignee-object-id {identity_object_id} --assignee-principal-type "ServicePrincipal" ' + "--scope {kv_resource_id}" + ) + self.cmd(create_role_assignment) # disable public network access disable_public_network_access = 'keyvault update --resource-group={resource_group} --name={kv_name} --public-network-access "Disabled" -o json' - kv = self.cmd(disable_public_network_access, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--assign-identity {identity_id} --enable-private-cluster ' \ - '--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} ' \ - '--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('apiServerAccessProfile.enablePrivateCluster', 'True'), - self.check('securityProfile.azureKeyVaultKms.enabled', True), - self.check('securityProfile.azureKeyVaultKms.keyId', key_id_0), - self.check('securityProfile.azureKeyVaultKms.keyVaultNetworkAccess', "Private"), - self.check('securityProfile.azureKeyVaultKms.keyVaultResourceId', kv_resource_id) - ]) + kv = self.cmd( + disable_public_network_access, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--assign-identity {identity_id} --enable-private-cluster " + "--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} " + "--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("apiServerAccessProfile.enablePrivateCluster", "True"), + self.check("securityProfile.azureKeyVaultKms.enabled", True), + self.check("securityProfile.azureKeyVaultKms.keyId", key_id_0), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultNetworkAccess", "Private" + ), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultResourceId", + kv_resource_id, + ), + ], + ) # enable public network access enable_public_network_access = 'keyvault update --resource-group={resource_group} --name={kv_name} --public-network-access "Enabled" -o json' - kv = self.cmd(enable_public_network_access, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - key = self.cmd(create_key, checks=[ - self.check('attributes.enabled', True) - ]).get_output_in_json() - key_id_1 = key['key']['kid'] + kv = self.cmd( + enable_public_network_access, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() + + key = self.cmd( + create_key, checks=[self.check("attributes.enabled", True)] + ).get_output_in_json() + key_id_1 = key["key"]["kid"] assert key_id_1 is not None - self.kwargs.update({ - 'key_id': key_id_1, - }) + self.kwargs.update( + { + "key_id": key_id_1, + } + ) # disable public network access disable_public_network_access = 'keyvault update --resource-group={resource_group} --name={kv_name} --public-network-access "Disabled" -o json' - kv = self.cmd(disable_public_network_access, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() + kv = self.cmd( + disable_public_network_access, + checks=[self.check("properties.provisioningState", "Succeeded")], + ).get_output_in_json() # Rotate key - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} ' \ - '--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} ' \ - '-o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.azureKeyVaultKms.enabled', True), - self.check('securityProfile.azureKeyVaultKms.keyId', key_id_1), - self.check('securityProfile.azureKeyVaultKms.keyVaultNetworkAccess', "Private"), - self.check('securityProfile.azureKeyVaultKms.keyVaultResourceId', kv_resource_id) - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} " + "--azure-keyvault-kms-key-vault-network-access=Private --azure-keyvault-kms-key-vault-resource-id {kv_resource_id} " + "-o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.azureKeyVaultKms.enabled", True), + self.check("securityProfile.azureKeyVaultKms.keyId", key_id_1), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultNetworkAccess", "Private" + ), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultResourceId", + kv_resource_id, + ), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_disable_azurekeyvaultkms(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - kv_name = self.create_random_name('cliakstestkv', 16) - identity_name = self.create_random_name('cliakstestidentity', 24) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - "kv_name": kv_name, - "identity_name": identity_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_disable_azurekeyvaultkms( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + kv_name = self.create_random_name("cliakstestkv", 16) + identity_name = self.create_random_name("cliakstestidentity", 24) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kv_name": kv_name, + "identity_name": identity_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create user-assigned identity - create_identity = 'identity create --resource-group={resource_group} --name={identity_name} -o json' + create_identity = "identity create --resource-group={resource_group} --name={identity_name} -o json" identity = self.cmd(create_identity).get_output_in_json() - identity_id = identity['id'] - identity_object_id = identity['principalId'] + identity_id = identity["id"] + identity_object_id = identity["principalId"] assert identity_id is not None assert identity_object_id is not None - self.kwargs.update({ - 'identity_id': identity_id, - 'identity_object_id': identity_object_id, - }) + self.kwargs.update( + { + "identity_id": identity_id, + "identity_object_id": identity_object_id, + } + ) # create key vault and key - create_keyvault = 'keyvault create --resource-group={resource_group} --name={kv_name} -o json' - kv = self.cmd(create_keyvault, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_key = 'keyvault key create -n kms --vault-name {kv_name} -o json' - key = self.cmd(create_key, checks=[ - self.check('attributes.enabled', True) - ]).get_output_in_json() - key_id = key['key']['kid'] + create_keyvault = ( + "keyvault create --resource-group={resource_group} --name={kv_name} -o json" + ) + self.cmd( + create_keyvault, + checks=[self.check("properties.provisioningState", "Succeeded")], + ) + + create_key = "keyvault key create -n kms --vault-name {kv_name} -o json" + key = self.cmd( + create_key, checks=[self.check("attributes.enabled", True)] + ).get_output_in_json() + key_id = key["key"]["kid"] assert key_id is not None - self.kwargs.update({ - 'key_id': key_id, - }) + self.kwargs.update( + { + "key_id": key_id, + } + ) # assign access policy - set_policy = 'keyvault set-policy --resource-group={resource_group} --name={kv_name} ' \ - '--object-id {identity_object_id} --key-permissions encrypt decrypt -o json' - policy = self.cmd(set_policy, checks=[ - self.check('properties.provisioningState', 'Succeeded') - ]).get_output_in_json() - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--assign-identity {identity_id} ' \ - '--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} --azure-keyvault-kms-key-vault-network-access=Public ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.azureKeyVaultKms.enabled', True), - self.check('securityProfile.azureKeyVaultKms.keyId', key_id), - self.check('securityProfile.azureKeyVaultKms.keyVaultNetworkAccess', "Public") - ]) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--disable-azure-keyvault-kms ' \ - '-o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.azureKeyVaultKms.enabled', False), - ]) + set_policy = ( + "keyvault set-policy --resource-group={resource_group} --name={kv_name} " + "--object-id {identity_object_id} --key-permissions encrypt decrypt -o json" + ) + self.cmd( + set_policy, checks=[self.check("properties.provisioningState", "Succeeded")] + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--assign-identity {identity_id} " + "--enable-azure-keyvault-kms --azure-keyvault-kms-key-id={key_id} --azure-keyvault-kms-key-vault-network-access=Public " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.azureKeyVaultKms.enabled", True), + self.check("securityProfile.azureKeyVaultKms.keyId", key_id), + self.check( + "securityProfile.azureKeyVaultKms.keyVaultNetworkAccess", "Public" + ), + ], + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--disable-azure-keyvault-kms " + "-o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.azureKeyVaultKms.enabled", False), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', preserve_default_location=True) - def test_aks_create_and_update_with_csi_drivers_extensibility(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) + def test_aks_create_and_update_with_csi_drivers_extensibility( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json \ + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json \ --disable-disk-driver \ --disable-file-driver \ - --disable-snapshot-controller' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', False), - self.check('storageProfile.diskCsiDriver.version', "v1"), - self.check('storageProfile.fileCsiDriver.enabled', False), - self.check('storageProfile.snapshotController.enabled', False), - ]) + --disable-snapshot-controller" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", False), + self.check("storageProfile.diskCsiDriver.version", "v1"), + self.check("storageProfile.fileCsiDriver.enabled", False), + self.check("storageProfile.snapshotController.enabled", False), + ], + ) # check standard reconcile scenario - update_cmd = 'aks update --resource-group={resource_group} --name={name} -y -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', False), - self.check('storageProfile.diskCsiDriver.version', "v1"), - self.check('storageProfile.fileCsiDriver.enabled', False), - self.check('storageProfile.snapshotController.enabled', False), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} -y -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", False), + self.check("storageProfile.diskCsiDriver.version", "v1"), + self.check("storageProfile.fileCsiDriver.enabled", False), + self.check("storageProfile.snapshotController.enabled", False), + ], + ) - enable_cmd = 'aks update --resource-group={resource_group} --name={name} -o json \ + enable_cmd = "aks update --resource-group={resource_group} --name={name} -o json \ --enable-disk-driver \ --enable-file-driver \ - --enable-snapshot-controller' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', True), - self.check('storageProfile.diskCsiDriver.version', "v1"), - self.check('storageProfile.fileCsiDriver.enabled', True), - self.check('storageProfile.snapshotController.enabled', True), - ]) + --enable-snapshot-controller" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", True), + self.check("storageProfile.diskCsiDriver.version", "v1"), + self.check("storageProfile.fileCsiDriver.enabled", True), + self.check("storageProfile.snapshotController.enabled", True), + ], + ) + + # check standard reconcile scenario + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} -y -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", True), + self.check("storageProfile.diskCsiDriver.version", "v1"), + self.check("storageProfile.fileCsiDriver.enabled", True), + self.check("storageProfile.snapshotController.enabled", True), + ], + ) - # check standard reconcile scenario - update_cmd = 'aks update --resource-group={resource_group} --name={name} -y -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', True), - self.check('storageProfile.diskCsiDriver.version', "v1"), - self.check('storageProfile.fileCsiDriver.enabled', True), - self.check('storageProfile.snapshotController.enabled', True), - ]) - - disable_cmd = 'aks update --resource-group={resource_group} --name={name} -o json \ + disable_cmd = "aks update --resource-group={resource_group} --name={name} -o json \ --disable-disk-driver \ --disable-file-driver \ - --disable-snapshot-controller -y' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', False), - self.check('storageProfile.diskCsiDriver.version', "v1"), - self.check('storageProfile.fileCsiDriver.enabled', False), - self.check('storageProfile.snapshotController.enabled', False), - ]) + --disable-snapshot-controller -y" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", False), + self.check("storageProfile.diskCsiDriver.version", "v1"), + self.check("storageProfile.fileCsiDriver.enabled", False), + self.check("storageProfile.snapshotController.enabled", False), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', preserve_default_location=True) - def test_aks_create_with_standard_csi_drivers(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) + def test_aks_create_with_standard_csi_drivers( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # check standard creation scenario - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', True), - self.check('storageProfile.diskCsiDriver.version', "v1"), - self.check('storageProfile.fileCsiDriver.enabled', True), - self.check('storageProfile.snapshotController.enabled', True), - ]) + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", True), + self.check("storageProfile.diskCsiDriver.version", "v1"), + self.check("storageProfile.fileCsiDriver.enabled", True), + self.check("storageProfile.snapshotController.enabled", True), + ], + ) # check standard reconcile scenario - update_cmd = 'aks update --resource-group={resource_group} --name={name} -y -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', True), - self.check('storageProfile.diskCsiDriver.version', "v1"), - self.check('storageProfile.fileCsiDriver.enabled', True), - self.check('storageProfile.snapshotController.enabled', True), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} -y -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", True), + self.check("storageProfile.diskCsiDriver.version", "v1"), + self.check("storageProfile.fileCsiDriver.enabled", True), + self.check("storageProfile.snapshotController.enabled", True), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_with_standard_blob_csi_driver(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_with_standard_blob_csi_driver( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # check standard creation scenario - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.blobCsiDriver.enabled', None), - ]) + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.blobCsiDriver.enabled", None), + ], + ) # check standard reconcile scenario - update_cmd = 'aks update --resource-group={resource_group} --name={name} -y -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.blobCsiDriver.enabled', None), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} -y -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.blobCsiDriver.enabled", None), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_and_update_with_blob_csi_driver(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_and_update_with_blob_csi_driver( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create aks with blob driver - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json \ + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json \ --enable-blob-driver \ - --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.blobCsiDriver.enabled', True), - ]) + --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.blobCsiDriver.enabled", True), + ], + ) # check standard reconcile scenario - update_cmd = 'aks update --resource-group={resource_group} --name={name} -y -o json \ - --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.blobCsiDriver.enabled', True), - ]) + update_cmd = "aks update --resource-group={resource_group} --name={name} -y -o json \ + --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver" + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.blobCsiDriver.enabled", True), + ], + ) # disable blob driver - disable_cmd = 'aks update --resource-group={resource_group} --name={name} -o json \ + disable_cmd = "aks update --resource-group={resource_group} --name={name} -o json \ --disable-blob-driver -y \ - --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.blobCsiDriver.enabled', False), - ]) + --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.blobCsiDriver.enabled", False), + ], + ) # check standard reconcile scenario - update_cmd = 'aks update --resource-group={resource_group} --name={name} -y -o json \ - --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.blobCsiDriver.enabled', False), - ]) + update_cmd = "aks update --resource-group={resource_group} --name={name} -y -o json \ + --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver" + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.blobCsiDriver.enabled", False), + ], + ) # enable blob driver - enable_cmd = 'aks update --resource-group={resource_group} --name={name} -o json \ + enable_cmd = "aks update --resource-group={resource_group} --name={name} -o json \ --enable-blob-driver -y \ - --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.blobCsiDriver.enabled', True), - ]) + --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.blobCsiDriver.enabled", True), + ], + ) # check standard reconcile scenario - update_cmd = 'aks update --resource-group={resource_group} --name={name} -y -o json \ - --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.blobCsiDriver.enabled', True), - ]) + update_cmd = "aks update --resource-group={resource_group} --name={name} -y -o json \ + --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableBlobCSIDriver" + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.blobCsiDriver.enabled", True), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_with_csi_driver_v2(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_with_csi_driver_v2( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json \ --disk-driver-version "v2" \ --disable-file-driver \ --disable-snapshot-controller' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', True), - self.check('storageProfile.diskCsiDriver.version', "v2"), - self.check('storageProfile.fileCsiDriver.enabled', False), - self.check('storageProfile.snapshotController.enabled', False), - ]) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", True), + self.check("storageProfile.diskCsiDriver.version", "v2"), + self.check("storageProfile.fileCsiDriver.enabled", False), + self.check("storageProfile.snapshotController.enabled", False), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_and_update_csi_driver_to_v2(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_and_update_csi_driver_to_v2( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json \ + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -o json \ --disable-disk-driver \ --disable-file-driver \ - --disable-snapshot-controller' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', False), - self.check('storageProfile.diskCsiDriver.version', "v1"), - self.check('storageProfile.fileCsiDriver.enabled', False), - self.check('storageProfile.snapshotController.enabled', False), - ]) + --disable-snapshot-controller" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", False), + self.check("storageProfile.diskCsiDriver.version", "v1"), + self.check("storageProfile.fileCsiDriver.enabled", False), + self.check("storageProfile.snapshotController.enabled", False), + ], + ) enable_cmd = 'aks update --resource-group={resource_group} --name={name} -o json \ --enable-disk-driver \ --disk-driver-version "v2"' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('storageProfile.diskCsiDriver.enabled', True), - self.check('storageProfile.diskCsiDriver.version', "v2"), - self.check('storageProfile.fileCsiDriver.enabled', False), - self.check('storageProfile.snapshotController.enabled', False), - ]) + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("storageProfile.diskCsiDriver.enabled", True), + self.check("storageProfile.diskCsiDriver.version", "v2"), + self.check("storageProfile.fileCsiDriver.enabled", False), + self.check("storageProfile.snapshotController.enabled", False), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_create_with_apiserver_vnet_integration(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_create_with_apiserver_vnet_integration( + self, resource_group, resource_group_location + ): # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-apiserver-vnet-integration ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableAPIServerVnetIntegrationPreview ' \ - '--enable-private-cluster --location={location} --ssh-key-value={ssh_key_value} -o json' - - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('apiServerAccessProfile.enablePrivateCluster', 'True'), - self.check('apiServerAccessProfile.enableVnetIntegration', 'True'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-apiserver-vnet-integration " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableAPIServerVnetIntegrationPreview " + "--enable-private-cluster --location={location} --ssh-key-value={ssh_key_value} -o json" + ) + + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("apiServerAccessProfile.enablePrivateCluster", "True"), + self.check("apiServerAccessProfile.enableVnetIntegration", "True"), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap', preserve_default_location=True) - def test_aks_create_with_apiserver_vnet_integration_public(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="centraluseuap", + preserve_default_location=True, + ) + def test_aks_create_with_apiserver_vnet_integration_public( + self, resource_group, resource_group_location + ): # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --enable-apiserver-vnet-integration ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableAPIServerVnetIntegrationPreview ' \ - '--location={location} --ssh-key-value={ssh_key_value} -o json' - - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('apiServerAccessProfile.enablePrivateCluster', 'False'), - self.check('apiServerAccessProfile.enableVnetIntegration', 'True'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --enable-apiserver-vnet-integration " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/EnableAPIServerVnetIntegrationPreview " + "--location={location} --ssh-key-value={ssh_key_value} -o json" + ) + + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("apiServerAccessProfile.enablePrivateCluster", "False"), + self.check("apiServerAccessProfile.enableVnetIntegration", "True"), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_web_application_routing(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--enable-addons web_application_routing --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_web_application_routing_with_private_dns_zone(self, resource_group, resource_group_location): + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_web_application_routing( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--enable-addons web_application_routing --ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_web_application_routing_with_private_dns_zone( + self, resource_group, resource_group_location + ): # Test creation failure when using an non-existing dns zone resource ID. - aks_name = self.create_random_name('cliakstest', 16) - private_dns_zone_name = self.create_random_name('cliakstest', 16) + ".xyz" - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'private_dns_zone_name': private_dns_zone_name - }) - - create_private_dns_zone_cmd = 'network private-dns zone create -g {resource_group} -n {private_dns_zone_name}' - private_dns_zone_id = self.cmd(create_private_dns_zone_cmd, checks=[ - self.check('name', private_dns_zone_name), - ]).get_output_in_json()['id'] - - self.kwargs.update({ 'private_dns_zone_id': private_dns_zone_id }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--enable-addons web_application_routing ' \ - '--dns-zone-resource-ids={private_dns_zone_id} ' \ - '--ssh-key-value={ssh_key_value} -o json' - - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True), - self.check('ingressProfile.webAppRouting.dnsZoneResourceIds[0]', private_dns_zone_id), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_disable_addon_web_app_routing(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '-a web_application_routing --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True), - ]) - - disable_cmd = 'aks disable-addons --addons web_application_routing --resource-group={resource_group} --name={name} -o json' - self.cmd(disable_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - # Enable this once the backend bug fix has been rolled out. - # self.check('ingressProfile.webAppRouting.enabled', False) - ]) + aks_name = self.create_random_name("cliakstest", 16) + private_dns_zone_name = self.create_random_name("cliakstest", 16) + ".xyz" + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "private_dns_zone_name": private_dns_zone_name, + } + ) + + create_private_dns_zone_cmd = "network private-dns zone create -g {resource_group} -n {private_dns_zone_name}" + private_dns_zone_id = self.cmd( + create_private_dns_zone_cmd, + checks=[ + self.check("name", private_dns_zone_name), + ], + ).get_output_in_json()["id"] + + self.kwargs.update({"private_dns_zone_id": private_dns_zone_id}) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--enable-addons web_application_routing " + "--dns-zone-resource-ids={private_dns_zone_id} " + "--ssh-key-value={ssh_key_value} -o json" + ) + + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + self.check( + "ingressProfile.webAppRouting.dnsZoneResourceIds[0]", + private_dns_zone_id, + ), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_disable_addon_web_app_routing( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "-a web_application_routing --ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + ], + ) + + disable_cmd = "aks disable-addons --addons web_application_routing --resource-group={resource_group} --name={name} -o json" + self.cmd( + disable_cmd, + checks=[ + self.check("provisioningState", "Succeeded") + # Enable this once the backend bug fix has been rolled out. + # self.check('ingressProfile.webAppRouting.enabled', False) + ], + ) # graph api is not well mocked @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_and_update_web_application_routing_dns_zone(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - dns_zone_name = self.create_random_name('cliakstest', 16) + ".xyz" - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'dns_zone_name': dns_zone_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '-a web_application_routing --ssh-key-value={ssh_key_value} -o json' - mc = self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True), - ]).get_output_in_json() - web_app_routing_identity_obj_id = mc["ingressProfile"]["webAppRouting"]["identity"]["objectId"] - - create_dns_zone_cmd = 'network dns zone create -g {resource_group} -n {dns_zone_name}' - dns_zone = self.cmd(create_dns_zone_cmd,checks=[ - self.check('name', dns_zone_name), - ]).get_output_in_json() - dns_zone_id = dns_zone['id'] - - self.kwargs.update({ 'web_app_routing_identity_obj_id': web_app_routing_identity_obj_id, 'dns_zone_id': dns_zone_id }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_and_update_web_application_routing_dns_zone( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + dns_zone_name = self.create_random_name("cliakstest", 16) + ".xyz" + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "dns_zone_name": dns_zone_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "-a web_application_routing --ssh-key-value={ssh_key_value} -o json" + ) + mc = self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + ], + ).get_output_in_json() + web_app_routing_identity_obj_id = mc["ingressProfile"]["webAppRouting"][ + "identity" + ]["objectId"] + + create_dns_zone_cmd = ( + "network dns zone create -g {resource_group} -n {dns_zone_name}" + ) + dns_zone = self.cmd( + create_dns_zone_cmd, + checks=[ + self.check("name", dns_zone_name), + ], + ).get_output_in_json() + dns_zone_id = dns_zone["id"] + + self.kwargs.update( + { + "web_app_routing_identity_obj_id": web_app_routing_identity_obj_id, + "dns_zone_id": dns_zone_id, + } + ) role_assignment_cmd = 'role assignment create --role "DNS Zone Contributor" --assignee {web_app_routing_identity_obj_id} --scope {dns_zone_id}' self.cmd(role_assignment_cmd) - addon_update_cmd = 'aks addon update -g {resource_group} -n {name} --addon web_application_routing --dns-zone-resource-ids={dns_zone_id}' - self.cmd(addon_update_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + addon_update_cmd = "aks addon update -g {resource_group} -n {name} --addon web_application_routing --dns-zone-resource-ids={dns_zone_id}" + self.cmd( + addon_update_cmd, checks=[self.check("provisioningState", "Succeeded")] + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_create_with_keda(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create: enable-keda - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --output=json ' \ - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-KedaPreview ' \ - '--enable-keda' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('workloadAutoScalerProfile.keda.enabled', True), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --output=json " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-KedaPreview " + "--enable-keda" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("workloadAutoScalerProfile.keda.enabled", True), + ], + ) # delete - delete_cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(delete_cmd, checks=[ - self.is_empty(), - ]) + delete_cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + delete_cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_update_with_keda(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create: without enable-keda - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --output=json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.not_exists('workloadAutoScalerProfile.keda'), - ]) + create_cmd = "aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --output=json" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.not_exists("workloadAutoScalerProfile.keda"), + ], + ) # update: enable-keda - update_cmd = 'aks update --resource-group={resource_group} --name={name} --yes --output=json ' \ - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-KedaPreview ' \ - '--enable-keda' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('workloadAutoScalerProfile.keda.enabled', True), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} --yes --output=json " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AKS-KedaPreview " + "--enable-keda" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("workloadAutoScalerProfile.keda.enabled", True), + ], + ) # update: disable-keda - update_cmd = 'aks update --resource-group={resource_group} --name={name} --yes --output=json ' \ - '--disable-keda' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('workloadAutoScalerProfile.keda.enabled', False), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} --yes --output=json " + "--disable-keda" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("workloadAutoScalerProfile.keda.enabled", False), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) - @live_only() # this test requires live_only because a binary is downloaded + @live_only() # this test requires live_only because a binary is downloaded def test_aks_draft_with_helm(self): - import tempfile, os + import os + import tempfile script_dir = os.path.dirname(__file__) - create_config = 'aks_draft_config/helm.yaml' + create_config = "aks_draft_config/helm.yaml" abs_file_path = os.path.join(script_dir, create_config) with tempfile.TemporaryDirectory() as tmp_dir: # test `create` - create_cmd = f'aks draft create --path={tmp_dir} --create-config={abs_file_path} --destination={tmp_dir}' + create_cmd = f"aks draft create --path={tmp_dir} --create-config={abs_file_path} --destination={tmp_dir}" self.cmd(create_cmd) - assert os.path.isdir(f'{tmp_dir}/charts') and os.path.isfile(f'{tmp_dir}/Dockerfile') + assert os.path.isdir(f"{tmp_dir}/charts") and os.path.isfile( + f"{tmp_dir}/Dockerfile" + ) # test `generate-workflow` - generate_workflow_cmd = f'aks draft generate-workflow --path={tmp_dir} --branch=main --destination={tmp_dir} --cluster-name=someAksCluster --registry-name=someRegistry --resource-group=someResourceGroup --container-name=someContainer' + generate_workflow_cmd = f"aks draft generate-workflow --path={tmp_dir} --branch=main --destination={tmp_dir} --cluster-name=someAksCluster --registry-name=someRegistry --resource-group=someResourceGroup --container-name=someContainer" self.cmd(generate_workflow_cmd) - assert os.path.isfile(f'{tmp_dir}/charts/production.yaml') and os.path.isfile(f'{tmp_dir}/.github/workflows/azure-kubernetes-service-helm.yml') + assert os.path.isfile( + f"{tmp_dir}/charts/production.yaml" + ) and os.path.isfile( + f"{tmp_dir}/.github/workflows/azure-kubernetes-service-helm.yml" + ) # test `update` - update_cmd = f'aks draft update --path={tmp_dir} --destination={tmp_dir} --host=testHost --certificate=testKV' + update_cmd = f"aks draft update --path={tmp_dir} --destination={tmp_dir} --host=testHost --certificate=testKV" self.cmd(update_cmd) - assert os.path.isfile(f'{tmp_dir}/charts/production.yaml') - + assert os.path.isfile(f"{tmp_dir}/charts/production.yaml") - @live_only() # this test requires live_only because a binary is downloaded + @live_only() # this test requires live_only because a binary is downloaded def test_aks_draft_with_kustomize(self): - import tempfile, os + import os + import tempfile script_dir = os.path.dirname(__file__) - create_config = 'aks_draft_config/kustomize.yaml' + create_config = "aks_draft_config/kustomize.yaml" abs_file_path = os.path.join(script_dir, create_config) with tempfile.TemporaryDirectory() as tmp_dir: # test `create` - create_cmd = f'aks draft create --path={tmp_dir} --create-config={abs_file_path} --destination={tmp_dir}' + create_cmd = f"aks draft create --path={tmp_dir} --create-config={abs_file_path} --destination={tmp_dir}" self.cmd(create_cmd) - assert os.path.isdir(f'{tmp_dir}/base') and os.path.isdir(f'{tmp_dir}/overlays/production') and os.path.isfile(f'{tmp_dir}/Dockerfile') + assert ( + os.path.isdir(f"{tmp_dir}/base") + and os.path.isdir(f"{tmp_dir}/overlays/production") + and os.path.isfile(f"{tmp_dir}/Dockerfile") + ) # test `generate-workflow` - generate_workflow_cmd = f'aks draft generate-workflow --path={tmp_dir} --branch=main --destination={tmp_dir} --cluster-name=someAksCluster --registry-name=someRegistry --resource-group=someResourceGroup --container-name=someContainer' + generate_workflow_cmd = f"aks draft generate-workflow --path={tmp_dir} --branch=main --destination={tmp_dir} --cluster-name=someAksCluster --registry-name=someRegistry --resource-group=someResourceGroup --container-name=someContainer" self.cmd(generate_workflow_cmd) - assert os.path.isfile(f'{tmp_dir}/overlays/production/deployment.yaml') and os.path.isfile(f'{tmp_dir}/.github/workflows/azure-kubernetes-service-kustomize.yml') + assert os.path.isfile( + f"{tmp_dir}/overlays/production/deployment.yaml" + ) and os.path.isfile( + f"{tmp_dir}/.github/workflows/azure-kubernetes-service-kustomize.yml" + ) # test `update` - update_cmd = f'aks draft update --path={tmp_dir} --destination={tmp_dir} --host=testHost --certificate=testKV' + update_cmd = f"aks draft update --path={tmp_dir} --destination={tmp_dir} --host=testHost --certificate=testKV" self.cmd(update_cmd) - assert os.path.isfile(f'{tmp_dir}/overlays/production/service.yaml') + assert os.path.isfile(f"{tmp_dir}/overlays/production/service.yaml") - - @live_only() # this test requires live_only because a binary is downloaded + @live_only() # this test requires live_only because a binary is downloaded def test_aks_draft_with_manifest(self): - import tempfile, os + import os + import tempfile script_dir = os.path.dirname(__file__) - create_config = 'aks_draft_config/manifest.yaml' + create_config = "aks_draft_config/manifest.yaml" abs_file_path = os.path.join(script_dir, create_config) with tempfile.TemporaryDirectory() as tmp_dir: - - create_cmd = f'aks draft create --path={tmp_dir} --create-config={abs_file_path} --destination={tmp_dir}' + create_cmd = f"aks draft create --path={tmp_dir} --create-config={abs_file_path} --destination={tmp_dir}" self.cmd(create_cmd) - assert os.path.isdir(f'{tmp_dir}/manifests') and os.path.isfile(f'{tmp_dir}/Dockerfile') + assert os.path.isdir(f"{tmp_dir}/manifests") and os.path.isfile( + f"{tmp_dir}/Dockerfile" + ) # test `generate-workflow` - generate_workflow_cmd = f'aks draft generate-workflow --path={tmp_dir} --branch=main --destination={tmp_dir} --cluster-name=someAksCluster --registry-name=someRegistry --resource-group=someResourceGroup --container-name=someContainer' + generate_workflow_cmd = f"aks draft generate-workflow --path={tmp_dir} --branch=main --destination={tmp_dir} --cluster-name=someAksCluster --registry-name=someRegistry --resource-group=someResourceGroup --container-name=someContainer" self.cmd(generate_workflow_cmd) - assert os.path.isfile(f'{tmp_dir}/.github/workflows/azure-kubernetes-service.yml') + assert os.path.isfile( + f"{tmp_dir}/.github/workflows/azure-kubernetes-service.yml" + ) # test `update` - update_cmd = f'aks draft update --path={tmp_dir} --destination={tmp_dir} --host=testHost --certificate=testKV' + update_cmd = f"aks draft update --path={tmp_dir} --destination={tmp_dir} --host=testHost --certificate=testKV" self.cmd(update_cmd) - assert os.path.isfile(f'{tmp_dir}/manifests/service.yaml') + assert os.path.isfile(f"{tmp_dir}/manifests/service.yaml") - @live_only() # because we're downloading a binary, and we're not testing the output of any ARM requests. - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') + @live_only() # because we're downloading a binary, and we're not testing the output of any ARM requests. + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) def test_aks_kollect(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - stg_acct_name = self.create_random_name('cliaksteststg', 24) - self.kwargs.update({ - 'resource_group': resource_group, - 'location': resource_group_location, - 'aks_name': aks_name, - 'stg_acct_name': stg_acct_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_aks_cmd = 'aks create --resource-group={resource_group} --name={aks_name} --location={location} --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_aks_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) - - create_stg_cmd = 'storage account create --resource-group={resource_group} --name={stg_acct_name} --location={location} -o json' - self.cmd(create_stg_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + aks_name = self.create_random_name("cliakstest", 16) + stg_acct_name = self.create_random_name("cliaksteststg", 24) + self.kwargs.update( + { + "resource_group": resource_group, + "location": resource_group_location, + "aks_name": aks_name, + "stg_acct_name": stg_acct_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_aks_cmd = "aks create --resource-group={resource_group} --name={aks_name} --location={location} --ssh-key-value={ssh_key_value} -o json" + self.cmd(create_aks_cmd, checks=[self.check("provisioningState", "Succeeded")]) + + create_stg_cmd = "storage account create --resource-group={resource_group} --name={stg_acct_name} --location={location} -o json" + self.cmd(create_stg_cmd, checks=[self.check("provisioningState", "Succeeded")]) # Install kubectl (required by the 'kollect' command). try: - subprocess.call(['az', 'aks', 'install-cli']) + subprocess.call(["az", "aks", "install-cli"]) except subprocess.CalledProcessError as err: raise CliTestError(f"Failed to install kubectl with error: '{err}'") self.assert_kollect_deploys_periscope(resource_group, aks_name, stg_acct_name) - @live_only() # because we're downloading a binary, and we're not testing the output of any ARM requests. - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='centraluseuap') - def test_aks_kollect_with_managed_aad(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - stg_acct_name = self.create_random_name('cliaksteststg', 24) - self.kwargs.update({ - 'resource_group': resource_group, - 'location': resource_group_location, - 'aks_name': aks_name, - 'stg_acct_name': stg_acct_name, - 'ssh_key_value': self.generate_ssh_keys() - }) + @live_only() # because we're downloading a binary, and we're not testing the output of any ARM requests. + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="centraluseuap" + ) + def test_aks_kollect_with_managed_aad( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + stg_acct_name = self.create_random_name("cliaksteststg", 24) + self.kwargs.update( + { + "resource_group": resource_group, + "location": resource_group_location, + "aks_name": aks_name, + "stg_acct_name": stg_acct_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # Initially create with local accounts enabled (the default), so that we can use the admin account # to grant the necessary k8s permissions to the AD user (the service principal). - create_aks_cmd = 'aks create --resource-group={resource_group} --name={aks_name} ' \ - '--location={location} --ssh-key-value={ssh_key_value} ' \ - '--vm-set-type VirtualMachineScaleSets -c 1 ' \ - '--enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 ' \ - '-o json' - self.cmd(create_aks_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('aadProfile.managed', True), - self.check('aadProfile.adminGroupObjectIDs[0]', '00000000-0000-0000-0000-000000000001'), - self.check('disableLocalAccounts', False) - ]) + create_aks_cmd = ( + "aks create --resource-group={resource_group} --name={aks_name} " + "--location={location} --ssh-key-value={ssh_key_value} " + "--vm-set-type VirtualMachineScaleSets -c 1 " + "--enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 " + "-o json" + ) + self.cmd( + create_aks_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("aadProfile.managed", True), + self.check( + "aadProfile.adminGroupObjectIDs[0]", + "00000000-0000-0000-0000-000000000001", + ), + self.check("disableLocalAccounts", False), + ], + ) # Get the object ID of the service principal - show_acct_cmd = 'account show' + show_acct_cmd = "account show" authenticated_acct = self.cmd(show_acct_cmd).get_output_in_json() sp_name = authenticated_acct["user"]["name"] - show_sp_cmd = f'ad sp show --id {sp_name}' - sp = self.cmd(show_sp_cmd, checks=[ - self.check('appId', sp_name) - ]).get_output_in_json() + show_sp_cmd = f"ad sp show --id {sp_name}" + sp = self.cmd( + show_sp_cmd, checks=[self.check("appId", sp_name)] + ).get_output_in_json() sp_oid = sp["id"] - print(f'objectid of service principal is {sp_oid}') + print(f"objectid of service principal is {sp_oid}") # Install kubectl (for setting up service principal permissions, and required by the 'kollect' command). try: - subprocess.call(['az', 'aks', 'install-cli']) + subprocess.call(["az", "aks", "install-cli"]) except subprocess.CalledProcessError as err: raise CliTestError(f"Failed to install kubectl with error: '{err}'") # Grant the service principal cluster-admin access using the admin account # (it'd be nice if `az aks command invoke` had an --admin option, but it appears not to, so we have to download admin credentials) fd, admin_kubeconfig_path = tempfile.mkstemp() - self.kwargs.update({ 'kubeconfig_path': admin_kubeconfig_path }) + self.kwargs.update({"kubeconfig_path": admin_kubeconfig_path}) try: - get_credential_cmd = 'aks get-credentials --resource-group={resource_group} --name={aks_name} --admin -f {kubeconfig_path}' + get_credential_cmd = "aks get-credentials --resource-group={resource_group} --name={aks_name} --admin -f {kubeconfig_path}" self.cmd(get_credential_cmd) - create_rolebinding_output = subprocess.check_output(['kubectl', 'create', 'clusterrolebinding', '--kubeconfig', admin_kubeconfig_path, '--clusterrole', 'cluster-admin', '--user', sp_oid, 'test-clusterrolebinding']) - print(f'Output of create rolebinding:\n{create_rolebinding_output}') + create_rolebinding_output = subprocess.check_output( + [ + "kubectl", + "create", + "clusterrolebinding", + "--kubeconfig", + admin_kubeconfig_path, + "--clusterrole", + "cluster-admin", + "--user", + sp_oid, + "test-clusterrolebinding", + ] + ) + print(f"Output of create rolebinding:\n{create_rolebinding_output}") except subprocess.CalledProcessError as err: - raise CliTestError(f"Failed to create admin clusterrolebinding for {sp_oid}: '{err}'") + raise CliTestError( + f"Failed to create admin clusterrolebinding for {sp_oid}: '{err}'" + ) finally: os.close(fd) os.remove(admin_kubeconfig_path) # Now the current user has the required permissions, we can disable admin access to the cluster - disable_admin_cmd = 'aks update --resource-group={resource_group} --name={aks_name} --disable-local-accounts' - self.cmd(disable_admin_cmd, checks=[ - self.check('disableLocalAccounts', True) - ]) + disable_admin_cmd = "aks update --resource-group={resource_group} --name={aks_name} --disable-local-accounts" + self.cmd(disable_admin_cmd, checks=[self.check("disableLocalAccounts", True)]) # Create the storage account to which to upload Periscope output - create_stg_cmd = 'storage account create --resource-group={resource_group} --name={stg_acct_name} --location={location} -o json' - self.cmd(create_stg_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + create_stg_cmd = "storage account create --resource-group={resource_group} --name={stg_acct_name} --location={location} -o json" + self.cmd(create_stg_cmd, checks=[self.check("provisioningState", "Succeeded")]) self.assert_kollect_deploys_periscope(resource_group, aks_name, stg_acct_name) @@ -6761,17 +9776,31 @@ def assert_kollect_deploys_periscope(self, resource_group, aks_name, stg_acct_na # sufficient and will raise an exception; we also need to attach a pseudo-TTY to the process. ptyInFd, ptyOutFd = pty.openpty() try: - with os.fdopen(ptyInFd, 'w', closefd=False) as ptyIn: - kollect_cmd = ['az', 'aks', 'kollect', '--resource-group', resource_group, '--name', aks_name, '--storage-account', stg_acct_name] + with os.fdopen(ptyInFd, "w", closefd=False) as ptyIn: + kollect_cmd = [ + "az", + "aks", + "kollect", + "--resource-group", + resource_group, + "--name", + aks_name, + "--storage-account", + stg_acct_name, + ] # For this test, the first input should be 'y' (to confirm), and the second should be 'n' (to see analysis results). # Write these to our PTY (they will be buffered until the command attempts to read them). - kollect_stdin_responses = ['y\n', 'n\n'] - ptyIn.write(''.join(kollect_stdin_responses)) + kollect_stdin_responses = ["y\n", "n\n"] + ptyIn.write("".join(kollect_stdin_responses)) - kollect_output = subprocess.check_output(kollect_cmd, stdin=ptyOutFd, stderr=subprocess.STDOUT, text=True) + kollect_output = subprocess.check_output( + kollect_cmd, stdin=ptyOutFd, stderr=subprocess.STDOUT, text=True + ) except subprocess.CalledProcessError as err: - raise CliTestError(f"Failed to kollect with exit code {err.returncode}. Output:\n{err.output}") + raise CliTestError( + f"Failed to kollect with exit code {err.returncode}. Output:\n{err.output}" + ) finally: os.close(ptyOutFd) os.close(ptyInFd) @@ -6780,283 +9809,428 @@ def assert_kollect_deploys_periscope(self, resource_group, aks_name, stg_acct_na for pattern in [ f"This will deploy a daemon set to your cluster to collect logs and diagnostic information and save them to the storage account {stg_acct_name}", f"Your logs are being uploaded to storage account {stg_acct_name}", - f"You can run 'az aks kanalyze -g {resource_group} -n {aks_name}' anytime to check the analysis results" + f"You can run 'az aks kanalyze -g {resource_group} -n {aks_name}' anytime to check the analysis results", ]: - if not pattern in kollect_output: - raise CliTestError(f"Output from kollect did not contain '{pattern}'. Output:\n{kollect_output}") + if pattern not in kollect_output: + raise CliTestError( + f"Output from kollect did not contain '{pattern}'. Output:\n{kollect_output}" + ) # Invoke kubectl to get the daemonsets deployed to the cluster - k_get_daemonset_cmd = ["az", "aks", "command", "invoke", "--resource-group", resource_group, "--name", aks_name, "--command", "kubectl get daemonset -n aks-periscope -o name"] + k_get_daemonset_cmd = [ + "az", + "aks", + "command", + "invoke", + "--resource-group", + resource_group, + "--name", + aks_name, + "--command", + "kubectl get daemonset -n aks-periscope -o name", + ] k_get_daemonset_output = subprocess.check_output(k_get_daemonset_cmd, text=True) # Check expected output of 'kubectl get daemonset' command for pattern in [ "daemonset.apps/aks-periscope", - "daemonset.apps/aks-periscope-win" + "daemonset.apps/aks-periscope-win", ]: - if not pattern in k_get_daemonset_output: - raise CliTestError(f"Output from 'kubectl get daemonset' did not contain '{pattern}'. Output:\n{k_get_daemonset_output}") + if pattern not in k_get_daemonset_output: + raise CliTestError( + f"Output from 'kubectl get daemonset' did not contain '{pattern}'. Output:\n{k_get_daemonset_output}" + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) def test_aks_availability_zones(self, resource_group, resource_group_location): # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) + aks_name = self.create_random_name("cliakstest", 16) nodepool2_name = "nodepool2" - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'nodepool2_name': nodepool2_name, - 'zones': "1 2 3" - }) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "nodepool2_name": nodepool2_name, + "zones": "1 2 3", + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--node-count=1 --ssh-key-value={ssh_key_value} --zones {zones}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].availabilityZones[0]', '1'), - self.check('agentPoolProfiles[0].availabilityZones[1]', '2'), - self.check('agentPoolProfiles[0].availabilityZones[2]', '3'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--node-count=1 --ssh-key-value={ssh_key_value} --zones {zones}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].availabilityZones[0]", "1"), + self.check("agentPoolProfiles[0].availabilityZones[1]", "2"), + self.check("agentPoolProfiles[0].availabilityZones[2]", "3"), + ], + ) # nodepool add - self.cmd('aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --node-count=1 --zones {zones}', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('availabilityZones[0]', '1'), - self.check('availabilityZones[1]', '2'), - self.check('availabilityZones[2]', '3'), - ]) + self.cmd( + "aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --node-count=1 --zones {zones}", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("availabilityZones[0]", "1"), + self.check("availabilityZones[1]", "2"), + self.check("availabilityZones[2]", "3"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) # live only due to workspace is not mocked correctly @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_create_with_defender(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'name': aks_name, - 'resource_group': resource_group, - 'ssh_key_value': self.generate_ssh_keys() - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "name": aks_name, + "resource_group": resource_group, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--ssh-key-value={ssh_key_value} --enable-defender' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.defender.securityMonitoring.enabled', True) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--ssh-key-value={ssh_key_value} --enable-defender" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.defender.securityMonitoring.enabled", True), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) # live only due to workspace is not mocked correctly @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_update_with_defender(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = "aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value}" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # update to enable defender - self.cmd('aks update --resource-group={resource_group} --name={name} --enable-defender', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.defender.securityMonitoring.enabled', True) - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --enable-defender", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("securityProfile.defender.securityMonitoring.enabled", True), + ], + ) - # update to disable defender - self.cmd('aks update --resource-group={resource_group} --name={name} --disable-defender', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('securityProfile.defender.securityMonitoring.enabled', False) - ]) + # update to disable defender + self.cmd( + "aks update --resource-group={resource_group} --name={name} --disable-defender", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "securityProfile.defender.securityMonitoring.enabled", False + ), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_azuremonitormetrics(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_azuremonitormetrics( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - node_vm_size = 'standard_d2s_v3' - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - 'node_vm_size': node_vm_size - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --node-vm-size={node_vm_size} ' \ - '--enable-managed-identity --enable-azure-monitor-metrics --enable-windows-recording-rules --output=json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + + node_vm_size = "standard_d2s_v3" + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + "node_vm_size": node_vm_size, + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --node-vm-size={node_vm_size} " + "--enable-managed-identity --enable-azure-monitor-metrics --enable-windows-recording-rules --output=json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # azuremonitor metrics will be set to false after initial creation command as its in the # postprocessing step that we do an update to enable it. Adding a wait for the second put request # in addonput.py which enables the Azure Monitor Metrics addon as all the DC* resources # have now been created. - wait_cmd = ' '.join([ - 'aks', 'wait', '--resource-group={resource_group}', '--name={name}', '--updated', - '--interval 60', '--timeout 300', - ]) - self.cmd(wait_cmd, checks=[ - self.is_empty(), - ]) - - self.cmd('aks show -g {resource_group} -n {name} --output=json', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('azureMonitorProfile.metrics.enabled', True), - ]) + wait_cmd = " ".join( + [ + "aks", + "wait", + "--resource-group={resource_group}", + "--name={name}", + "--updated", + "--interval 60", + "--timeout 300", + ] + ) + self.cmd( + wait_cmd, + checks=[ + self.is_empty(), + ], + ) + + self.cmd( + "aks show -g {resource_group} -n {name} --output=json", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("azureMonitorProfile.metrics.enabled", True), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) # live only due to downloading k8s-extension extension @live_only() @AllowLargeResponse(8192) - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_azurecontainerstorage(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_azurecontainerstorage( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - node_vm_size = 'standard_d4s_v3' - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - 'node_vm_size': node_vm_size - }) + aks_name = self.create_random_name("cliakstest", 16) + + node_vm_size = "standard_d4s_v3" + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + "node_vm_size": node_vm_size, + } + ) # add k8s-extension extension for azurecontainerstorage operations. - self.cmd('extension add --name k8s-extension') + self.cmd("extension add --name k8s-extension") - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --node-vm-size={node_vm_size} ' \ - '--node-count 3 --enable-managed-identity --enable-azure-container-storage azureDisk --output=json' + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --node-vm-size={node_vm_size} " + "--node-count 3 --enable-managed-identity --enable-azure-container-storage azureDisk --output=json" + ) # enabling azurecontainerstorage will not affect any field in the cluster. # the only check we should perform is to verify that the cluster is provisioned successfully. - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) # live only due to downloading k8s-extension extension @live_only() @AllowLargeResponse(8192) - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_azurecontainerstorage_with_nodepool_name(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_azurecontainerstorage_with_nodepool_name( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('n', 6) - - node_vm_size = 'standard_d4s_v3' - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'ssh_key_value': self.generate_ssh_keys(), - 'node_vm_size': node_vm_size, - 'nodepool_name': nodepool_name - }) + aks_name = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("n", 6) + + node_vm_size = "standard_d4s_v3" + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "ssh_key_value": self.generate_ssh_keys(), + "node_vm_size": node_vm_size, + "nodepool_name": nodepool_name, + } + ) # add k8s-extension extension for azurecontainerstorage operations. - self.cmd('extension add --name k8s-extension') + self.cmd("extension add --name k8s-extension") - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --node-vm-size={node_vm_size} ' \ - '--node-count 3 --nodepool-name {nodepool_name} --enable-managed-identity --enable-azure-container-storage azureDisk --output=json' + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --node-vm-size={node_vm_size} " + "--node-count 3 --nodepool-name {nodepool_name} --enable-managed-identity --enable-azure-container-storage azureDisk --output=json" + ) # enabling azurecontainerstorage will not affect any field in the cluster. # the only check we should perform is to verify that the cluster is provisioned successfully. - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].name', nodepool_name), - ]) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].name", nodepool_name), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_update_with_azuremonitormetrics(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - node_vm_size = 'standard_d2s_v3' - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - 'node_vm_size': node_vm_size, - }) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_update_with_azuremonitormetrics( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + node_vm_size = "standard_d2s_v3" + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + "node_vm_size": node_vm_size, + } + ) # create: without enable-azure-monitor-metrics - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --node-vm-size={node_vm_size} --enable-managed-identity --output=json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.not_exists('azureMonitorProfile.metrics'), - ]) + create_cmd = "aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --node-vm-size={node_vm_size} --enable-managed-identity --output=json" + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.not_exists("azureMonitorProfile.metrics"), + ], + ) # update: enable-azure-monitor-metrics - update_cmd = 'aks update --resource-group={resource_group} --name={name} --yes --output=json ' \ - '--enable-azure-monitor-metrics --enable-managed-identity --enable-windows-recording-rules' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('azureMonitorProfile.metrics.enabled', True), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} --yes --output=json " + "--enable-azure-monitor-metrics --enable-managed-identity --enable-windows-recording-rules" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("azureMonitorProfile.metrics.enabled", True), + ], + ) # update: disable-azure-monitor-metrics - update_cmd = 'aks update --resource-group={resource_group} --name={name} --yes --output=json ' \ - '--disable-azure-monitor-metrics' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('azureMonitorProfile.metrics.enabled', False), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} --yes --output=json " + "--disable-azure-monitor-metrics" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("azureMonitorProfile.metrics.enabled", False), + ], + ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) # live only due to downloading k8s-extension extension # @live_only() @@ -7106,604 +10280,847 @@ def test_aks_update_with_azuremonitormetrics(self, resource_group, resource_grou # self.is_empty(), # ]) - # live only due to workspace is not mocked correctly @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_kube_proxy_config(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'kube_proxy_path': _get_test_data_file('kubeproxyconfig.json'), - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --kube-proxy-config={kube_proxy_path} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/KubeProxyConfigurationPreview ' \ - '--ssh-key-value={ssh_key_value} --enable-managed-identity --yes -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.kubeProxyConfig.enabled',True), - self.check('networkProfile.kubeProxyConfig.mode','IPTABLES'), - ]) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_kube_proxy_config( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kube_proxy_path": _get_test_data_file("kubeproxyconfig.json"), + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --kube-proxy-config={kube_proxy_path} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/KubeProxyConfigurationPreview " + "--ssh-key-value={ssh_key_value} --enable-managed-identity --yes -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.kubeProxyConfig.enabled", True), + self.check("networkProfile.kubeProxyConfig.mode", "IPTABLES"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) # live only due to workspace is not mocked correctly @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_update_with_kube_proxy_config(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'kube_proxy_path': _get_test_data_file('kubeproxyconfig.json'), - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} --kube-proxy-config={kube_proxy_path} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/KubeProxyConfigurationPreview ' \ - '--ssh-key-value={ssh_key_value} --enable-managed-identity --yes -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.kubeProxyConfig.enabled',True), - self.check('networkProfile.kubeProxyConfig.mode','IPTABLES'), - ]) - - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'kube_proxy_path': _get_test_data_file('kubeproxyconfig_update.json'), - }) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} --kube-proxy-config={kube_proxy_path} ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/KubeProxyConfigurationPreview' - - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.kubeProxyConfig.enabled',True), - self.check('networkProfile.kubeProxyConfig.mode','IPVS'), - self.check('networkProfile.kubeProxyConfig.ipvsConfig.scheduler','LeastConnection'), - ]) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_update_with_kube_proxy_config( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kube_proxy_path": _get_test_data_file("kubeproxyconfig.json"), + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --kube-proxy-config={kube_proxy_path} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/KubeProxyConfigurationPreview " + "--ssh-key-value={ssh_key_value} --enable-managed-identity --yes -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.kubeProxyConfig.enabled", True), + self.check("networkProfile.kubeProxyConfig.mode", "IPTABLES"), + ], + ) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "kube_proxy_path": _get_test_data_file("kubeproxyconfig_update.json"), + } + ) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} --kube-proxy-config={kube_proxy_path} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/KubeProxyConfigurationPreview" + ) + + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.kubeProxyConfig.enabled", True), + self.check("networkProfile.kubeProxyConfig.mode", "IPVS"), + self.check( + "networkProfile.kubeProxyConfig.ipvsConfig.scheduler", + "LeastConnection", + ), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) def test_aks_create_with_nsg_control(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('n', 6) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - 'node_vm_size': 'standard_d2s_v3', - 'asg1': 'asg1', - 'asg2': 'asg2', - }) - - create_asg1 = 'network asg create --name {asg1} --resource-group {resource_group} -o json' - create_asg2 = 'network asg create --name {asg2} --resource-group {resource_group} -o json' - asg1 = self.cmd(create_asg1, checks=[self.check('provisioningState', 'Succeeded')]).get_output_in_json() - asg2 = self.cmd(create_asg2, checks=[self.check('provisioningState', 'Succeeded')]).get_output_in_json() - - self.kwargs.update({ - 'asg_ids': ','.join([asg1['id'], asg2['id']]), - 'allowed_host_ports': ','.join(['53/udp', '80/tcp', '443/tcp', '4000-5000/tcp', '4000-6000/udp']), - }) - self.cmd( - 'aks create ' - '--resource-group={resource_group} ' - '--name={name} ' - '--location={location} ' - '--ssh-key-value={ssh_key_value} ' - '--node-count=1 ' - '--node-vm-size={node_vm_size} ' - '--nodepool-asg-ids={asg_ids} ' - '--nodepool-allowed-host-ports={allowed_host_ports} ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPNSGControlPreview', - checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].networkProfile.applicationSecurityGroups', self.kwargs['asg_ids'].split(',')), - self.check('agentPoolProfiles[0].networkProfile.allowedHostPorts[] | length(@)', len(self.kwargs['allowed_host_ports'].split(','))), + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + "node_vm_size": "standard_d2s_v3", + "asg1": "asg1", + "asg2": "asg2", + } + ) + + create_asg1 = ( + "network asg create --name {asg1} --resource-group {resource_group} -o json" + ) + create_asg2 = ( + "network asg create --name {asg2} --resource-group {resource_group} -o json" + ) + asg1 = self.cmd( + create_asg1, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() + asg2 = self.cmd( + create_asg2, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() + + self.kwargs.update( + { + "asg_ids": ",".join([asg1["id"], asg2["id"]]), + "allowed_host_ports": ",".join( + ["53/udp", "80/tcp", "443/tcp", "4000-5000/tcp", "4000-6000/udp"] + ), + } + ) + self.cmd( + "aks create " + "--resource-group={resource_group} " + "--name={name} " + "--location={location} " + "--ssh-key-value={ssh_key_value} " + "--node-count=1 " + "--node-vm-size={node_vm_size} " + "--nodepool-asg-ids={asg_ids} " + "--nodepool-allowed-host-ports={allowed_host_ports} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPNSGControlPreview", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "agentPoolProfiles[0].networkProfile.applicationSecurityGroups", + self.kwargs["asg_ids"].split(","), + ), + self.check( + "agentPoolProfiles[0].networkProfile.allowedHostPorts[] | length(@)", + len(self.kwargs["allowed_host_ports"].split(",")), + ), ], ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_nodepool_create_with_nsg_control(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('n', 6) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - 'node_pool_name': nodepool_name, - 'node_vm_size': 'standard_d2s_v3', - 'asg1': 'asg1', - 'asg2': 'asg2', - }) - create_asg1 = 'network asg create --name {asg1} --resource-group {resource_group} -o json' - create_asg2 = 'network asg create --name {asg2} --resource-group {resource_group} -o json' - asg1 = self.cmd(create_asg1, checks=[self.check('provisioningState', 'Succeeded')]).get_output_in_json() - asg2 = self.cmd(create_asg2, checks=[self.check('provisioningState', 'Succeeded')]).get_output_in_json() - - self.kwargs.update({ - 'asg_ids': ','.join([asg1['id'], asg2['id']]), - 'allowed_host_ports': ','.join(['53/udp', '80/tcp', '443/tcp', '4000-5000/tcp', '4000-6000/udp']), - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_nodepool_create_with_nsg_control( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("n", 6) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + "node_pool_name": nodepool_name, + "node_vm_size": "standard_d2s_v3", + "asg1": "asg1", + "asg2": "asg2", + } + ) + create_asg1 = ( + "network asg create --name {asg1} --resource-group {resource_group} -o json" + ) + create_asg2 = ( + "network asg create --name {asg2} --resource-group {resource_group} -o json" + ) + asg1 = self.cmd( + create_asg1, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() + asg2 = self.cmd( + create_asg2, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() + + self.kwargs.update( + { + "asg_ids": ",".join([asg1["id"], asg2["id"]]), + "allowed_host_ports": ",".join( + ["53/udp", "80/tcp", "443/tcp", "4000-5000/tcp", "4000-6000/udp"] + ), + } + ) self.cmd( - 'aks create ' - '--resource-group={resource_group} ' - '--name={name} ' - '--location={location} ' - '--ssh-key-value={ssh_key_value} ' - '--node-count=1 ' - '--node-vm-size={node_vm_size} ', + "aks create " + "--resource-group={resource_group} " + "--name={name} " + "--location={location} " + "--ssh-key-value={ssh_key_value} " + "--node-count=1 " + "--node-vm-size={node_vm_size} ", checks=[ - self.check('provisioningState', 'Succeeded'), + self.check("provisioningState", "Succeeded"), ], ) self.cmd( - 'aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name} ' - '--node-vm-size={node_vm_size} ' - '--node-count=1 ' - '--asg-ids={asg_ids} ' - '--allowed-host-ports={allowed_host_ports} ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPNSGControlPreview', + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name} " + "--node-vm-size={node_vm_size} " + "--node-count=1 " + "--asg-ids={asg_ids} " + "--allowed-host-ports={allowed_host_ports} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPNSGControlPreview", checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.applicationSecurityGroups', self.kwargs['asg_ids'].split(',')), - self.check('networkProfile.allowedHostPorts[] | length(@)', len(self.kwargs['allowed_host_ports'].split(','))), + self.check("provisioningState", "Succeeded"), + self.check( + "networkProfile.applicationSecurityGroups", + self.kwargs["asg_ids"].split(","), + ), + self.check( + "networkProfile.allowedHostPorts[] | length(@)", + len(self.kwargs["allowed_host_ports"].split(",")), + ), ], ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_nodepool_update_with_nsg_control(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('n', 6) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - 'node_pool_name': nodepool_name, - 'node_vm_size': 'standard_d2s_v3', - 'asg1': 'asg1', - 'asg2': 'asg2', - }) - create_asg1 = 'network asg create --name {asg1} --resource-group {resource_group} -o json' - create_asg2 = 'network asg create --name {asg2} --resource-group {resource_group} -o json' - asg1 = self.cmd(create_asg1, checks=[self.check('provisioningState', 'Succeeded')]).get_output_in_json() - asg2 = self.cmd(create_asg2, checks=[self.check('provisioningState', 'Succeeded')]).get_output_in_json() - - self.kwargs.update({ - 'asg_ids': ','.join([asg1['id'], asg2['id']]), - 'allowed_host_ports': ','.join(['53/udp', '80/tcp', '443/tcp', '4000-5000/tcp', '4000-6000/udp']), - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_nodepool_update_with_nsg_control( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("n", 6) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + "node_pool_name": nodepool_name, + "node_vm_size": "standard_d2s_v3", + "asg1": "asg1", + "asg2": "asg2", + } + ) + create_asg1 = ( + "network asg create --name {asg1} --resource-group {resource_group} -o json" + ) + create_asg2 = ( + "network asg create --name {asg2} --resource-group {resource_group} -o json" + ) + asg1 = self.cmd( + create_asg1, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() + asg2 = self.cmd( + create_asg2, checks=[self.check("provisioningState", "Succeeded")] + ).get_output_in_json() + + self.kwargs.update( + { + "asg_ids": ",".join([asg1["id"], asg2["id"]]), + "allowed_host_ports": ",".join( + ["53/udp", "80/tcp", "443/tcp", "4000-5000/tcp", "4000-6000/udp"] + ), + } + ) self.cmd( - 'aks create ' - '--resource-group={resource_group} ' - '--name={name} ' - '--location={location} ' - '--ssh-key-value={ssh_key_value} ' - '--nodepool-name={node_pool_name} ' - '--node-count=1 ' - '--node-vm-size={node_vm_size} ', + "aks create " + "--resource-group={resource_group} " + "--name={name} " + "--location={location} " + "--ssh-key-value={ssh_key_value} " + "--nodepool-name={node_pool_name} " + "--node-count=1 " + "--node-vm-size={node_vm_size} ", checks=[ - self.check('provisioningState', 'Succeeded'), + self.check("provisioningState", "Succeeded"), ], ) self.cmd( - 'aks nodepool update ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name} ' - '--asg-ids={asg_ids} ' - '--allowed-host-ports={allowed_host_ports} ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPNSGControlPreview', + "aks nodepool update " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name} " + "--asg-ids={asg_ids} " + "--allowed-host-ports={allowed_host_ports} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPNSGControlPreview", checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.applicationSecurityGroups', self.kwargs['asg_ids'].split(',')), - self.check('networkProfile.allowedHostPorts[] | length(@)', len(self.kwargs['allowed_host_ports'].split(','))), + self.check("provisioningState", "Succeeded"), + self.check( + "networkProfile.applicationSecurityGroups", + self.kwargs["asg_ids"].split(","), + ), + self.check( + "networkProfile.allowedHostPorts[] | length(@)", + len(self.kwargs["allowed_host_ports"].split(",")), + ), ], ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) # the availability of features is controlled by a toggle and cannot be fully tested yet, # however, existing test results show that the client side works as expected, so exclude it at this moment @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_nodepool_update_with_artifact_streaming(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('n', 6) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - 'node_pool_name': nodepool_name, - 'node_vm_size': 'standard_d2s_v3', - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_nodepool_update_with_artifact_streaming( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("n", 6) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + "node_pool_name": nodepool_name, + "node_vm_size": "standard_d2s_v3", + } + ) self.cmd( - 'aks create ' - '--resource-group={resource_group} ' - '--name={name} ' - '--location={location} ' - '--ssh-key-value={ssh_key_value} ' - '--nodepool-name={node_pool_name} ' - '--node-count=1 ' - '--node-vm-size={node_vm_size} ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ArtifactStreamingPreview', + "aks create " + "--resource-group={resource_group} " + "--name={name} " + "--location={location} " + "--ssh-key-value={ssh_key_value} " + "--nodepool-name={node_pool_name} " + "--node-count=1 " + "--node-vm-size={node_vm_size} " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ArtifactStreamingPreview", checks=[ - self.check('provisioningState', 'Succeeded'), + self.check("provisioningState", "Succeeded"), ], ) self.cmd( - 'aks nodepool update ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name} ' - '--enable-artifact-streaming ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ArtifactStreamingPreview', + "aks nodepool update " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name} " + "--enable-artifact-streaming " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ArtifactStreamingPreview", checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[1].ArtifactStreamingProfile.enabled', True), + self.check("provisioningState", "Succeeded"), + self.check( + "agentPoolProfiles[1].ArtifactStreamingProfile.enabled", True + ), ], ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_and_update_ssh_public_key(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys() - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '-c 1 --ssh-key-value={ssh_key_value} -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - - TEST_SSH_KEY_PUB = 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYpZoWGqsIbCKOvcrtPi5PpgoaP24pKJ8yk80qBYbqIjyVngCfM8rbgQCZKx4D8emmN7UxjiSt+c4WtV1aUfbT7VA5r4neuhPVgkqgp7CmkKdf0beV/0i5K28J7RojDTktllY9EYRYK6A4olLplaHJiuqbsMYa8amv43ol6IxgM3eE2BiEYm0/uvNKDmZ8AN4w07fFKjz1+wfdkluxC73qhijMY6FCgw+xEvvS1kd2Se6L/M/qV+VVnxW+S/bBT4Yew2dR6KWnauJvxXzdM8WQHyJy52jQ1n5PHxVRMgjRLhWvbcNNgPseFpULxe3a4ATS8kKO2Z9pzpSOgEpW7LVz' # pylint: disable=line-too-long + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_and_update_ssh_public_key( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "-c 1 --ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + TEST_SSH_KEY_PUB = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYpZoWGqsIbCKOvcrtPi5PpgoaP24pKJ8yk80qBYbqIjyVngCfM8rbgQCZKx4D8emmN7UxjiSt+c4WtV1aUfbT7VA5r4neuhPVgkqgp7CmkKdf0beV/0i5K28J7RojDTktllY9EYRYK6A4olLplaHJiuqbsMYa8amv43ol6IxgM3eE2BiEYm0/uvNKDmZ8AN4w07fFKjz1+wfdkluxC73qhijMY6FCgw+xEvvS1kd2Se6L/M/qV+VVnxW+S/bBT4Yew2dR6KWnauJvxXzdM8WQHyJy52jQ1n5PHxVRMgjRLhWvbcNNgPseFpULxe3a4ATS8kKO2Z9pzpSOgEpW7LVz" # pylint: disable=line-too-long _, pathname = tempfile.mkstemp() - with open(pathname, 'w') as key_file: + with open(pathname, "w") as key_file: key_file.write(TEST_SSH_KEY_PUB) - self.kwargs.update({ - 'ssh_key_value': pathname.replace('\\', '\\\\') - }) + self.kwargs.update({"ssh_key_value": pathname.replace("\\", "\\\\")}) - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('linuxProfile.ssh.publicKeys[0].keyData', TEST_SSH_KEY_PUB) - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("linuxProfile.ssh.publicKeys[0].keyData", TEST_SSH_KEY_PUB), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_no_ssh_key_and_update_ssh_public_key(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_no_ssh_key_and_update_ssh_public_key( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + } + ) - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '-c 1 --no-ssh-key -o json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "-c 1 --no-ssh-key -o json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) - TEST_SSH_KEY_PUB = 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYpZoWGqsIbCKOvcrtPi5PpgoaP24pKJ8yk80qBYbqIjyVngCfM8rbgQCZKx4D8emmN7UxjiSt+c4WtV1aUfbT7VA5r4neuhPVgkqgp7CmkKdf0beV/0i5K28J7RojDTktllY9EYRYK6A4olLplaHJiuqbsMYa8amv43ol6IxgM3eE2BiEYm0/uvNKDmZ8AN4w07fFKjz1+wfdkluxC73qhijMY6FCgw+xEvvS1kd2Se6L/M/qV+VVnxW+S/bBT4Yew2dR6KWnauJvxXzdM8WQHyJy52jQ1n5PHxVRMgjRLhWvbcNNgPseFpULxe3a4ATS8kKO2Z9pzpSOgEpW7LVz' # pylint: disable=line-too-long + TEST_SSH_KEY_PUB = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCYpZoWGqsIbCKOvcrtPi5PpgoaP24pKJ8yk80qBYbqIjyVngCfM8rbgQCZKx4D8emmN7UxjiSt+c4WtV1aUfbT7VA5r4neuhPVgkqgp7CmkKdf0beV/0i5K28J7RojDTktllY9EYRYK6A4olLplaHJiuqbsMYa8amv43ol6IxgM3eE2BiEYm0/uvNKDmZ8AN4w07fFKjz1+wfdkluxC73qhijMY6FCgw+xEvvS1kd2Se6L/M/qV+VVnxW+S/bBT4Yew2dR6KWnauJvxXzdM8WQHyJy52jQ1n5PHxVRMgjRLhWvbcNNgPseFpULxe3a4ATS8kKO2Z9pzpSOgEpW7LVz" # pylint: disable=line-too-long _, pathname = tempfile.mkstemp() - with open(pathname, 'w') as key_file: + with open(pathname, "w") as key_file: key_file.write(TEST_SSH_KEY_PUB) - self.kwargs.update({ - 'ssh_key_value': pathname.replace('\\', '\\\\') - }) - - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--ssh-key-value={ssh_key_value} -o json' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('linuxProfile.adminUsername', "azureuser"), - self.check('linuxProfile.ssh.publicKeys[0].keyData', TEST_SSH_KEY_PUB) - ]) + self.kwargs.update({"ssh_key_value": pathname.replace("\\", "\\\\")}) + + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--ssh-key-value={ssh_key_value} -o json" + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("linuxProfile.adminUsername", "azureuser"), + self.check("linuxProfile.ssh.publicKeys[0].keyData", TEST_SSH_KEY_PUB), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus2euap') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus2euap" + ) def test_node_public_ip_tags(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('n', 6) - nodepool_name_1 = self.create_random_name('n', 6) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - 'node_pool_name': nodepool_name, - 'node_vm_size': 'standard_d2a_v4', - "node_public_ip_tags": "RoutingPreference=Internet" - }) + aks_name = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("n", 6) + nodepool_name_1 = self.create_random_name("n", 6) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + "node_pool_name": nodepool_name, + "node_vm_size": "standard_d2a_v4", + "node_public_ip_tags": "RoutingPreference=Internet", + } + ) self.cmd( - 'aks create ' - '--resource-group={resource_group} ' - '--name={name} ' - '--location={location} ' - '--ssh-key-value={ssh_key_value} ' - '--nodepool-name={node_pool_name} ' - '--node-count=1 ' - '--node-vm-size={node_vm_size} ' - '--enable-node-public-ip ' - '--node-public-ip-tags={node_public_ip_tags} ' - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPTagsPreview', + "aks create " + "--resource-group={resource_group} " + "--name={name} " + "--location={location} " + "--ssh-key-value={ssh_key_value} " + "--nodepool-name={node_pool_name} " + "--node-count=1 " + "--node-vm-size={node_vm_size} " + "--enable-node-public-ip " + "--node-public-ip-tags={node_public_ip_tags} " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPTagsPreview", checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].networkProfile.nodePublicIpTags[0].ipTagType', "RoutingPreference"), - self.check('agentPoolProfiles[0].networkProfile.nodePublicIpTags[0].tag', "Internet"), + self.check("provisioningState", "Succeeded"), + self.check( + "agentPoolProfiles[0].networkProfile.nodePublicIpTags[0].ipTagType", + "RoutingPreference", + ), + self.check( + "agentPoolProfiles[0].networkProfile.nodePublicIpTags[0].tag", + "Internet", + ), ], ) - self.kwargs.update({ - 'node_pool_name': nodepool_name_1, - }) + self.kwargs.update( + { + "node_pool_name": nodepool_name_1, + } + ) + + self.cmd( + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name} " + "--node-vm-size={node_vm_size} " + "--enable-node-public-ip " + "--node-public-ip-tags={node_public_ip_tags} " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPTagsPreview", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "networkProfile.nodePublicIpTags[0].ipTagType", "RoutingPreference" + ), + self.check("networkProfile.nodePublicIpTags[0].tag", "Internet"), + ], + ) + # delete + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) self.cmd( - 'aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name} ' - '--node-vm-size={node_vm_size} ' - '--enable-node-public-ip ' - '--node-public-ip-tags={node_public_ip_tags} ' - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/NodePublicIPTagsPreview', + cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.nodePublicIpTags[0].ipTagType', "RoutingPreference"), - self.check('networkProfile.nodePublicIpTags[0].tag', "Internet"), + self.is_empty(), ], ) - # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) def test_vms_agentpool_type(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - nodepool_name = self.create_random_name('n', 6) - nodepool_name_1 = self.create_random_name('n', 6) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - 'node_pool_name': nodepool_name, - 'node_vm_size': 'standard_d2a_v4', - }) - - self.cmd( - 'aks create ' - '--resource-group={resource_group} ' - '--name={name} ' - '--location={location} ' - '--ssh-key-value={ssh_key_value} ' - '--nodepool-name={node_pool_name} ' - '--node-count=1 ' - '--node-vm-size={node_vm_size} ' + aks_name = self.create_random_name("cliakstest", 16) + nodepool_name = self.create_random_name("n", 6) + nodepool_name_1 = self.create_random_name("n", 6) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + "node_pool_name": nodepool_name, + "node_vm_size": "standard_d2a_v4", + } + ) + + self.cmd( + "aks create " + "--resource-group={resource_group} " + "--name={name} " + "--location={location} " + "--ssh-key-value={ssh_key_value} " + "--nodepool-name={node_pool_name} " + "--node-count=1 " + "--node-vm-size={node_vm_size} " '--vm-set-type="VirtualMachines" ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/VMsAgentPoolPreview', + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/VMsAgentPoolPreview", checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('agentPoolProfiles[0].type', "VirtualMachines"), + self.check("provisioningState", "Succeeded"), + self.check("agentPoolProfiles[0].type", "VirtualMachines"), ], ) - self.kwargs.update({ - 'node_pool_name': nodepool_name_1, - }) + self.kwargs.update( + { + "node_pool_name": nodepool_name_1, + } + ) self.cmd( - 'aks nodepool add ' - '--resource-group={resource_group} ' - '--cluster-name={name} ' - '--name={node_pool_name} ' - '--node-vm-size={node_vm_size} ' - '--vm-set-type=VirtualMachines ' - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/VMsAgentPoolPreview', + "aks nodepool add " + "--resource-group={resource_group} " + "--cluster-name={name} " + "--name={node_pool_name} " + "--node-vm-size={node_vm_size} " + "--vm-set-type=VirtualMachines " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/VMsAgentPoolPreview", checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('typePropertiesType', "VirtualMachines"), + self.check("provisioningState", "Succeeded"), + self.check("typePropertiesType", "VirtualMachines"), ], ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() def test_get_trustedaccess_roles(self): - versions_cmd = 'aks trustedaccess role list -l eastus -o json' + versions_cmd = "aks trustedaccess role list -l eastus -o json" roles = self.cmd(versions_cmd).get_output_in_json() assert len(roles) > 0 role = roles[0] - assert len(role['rules']) > 0 + assert len(role["rules"]) > 0 @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_trustedaccess_rolebinding(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_trustedaccess_rolebinding( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'resource_type': 'Microsoft.ContainerService/ManagedClusters', - 'vm_size': 'Standard_D4s_v3', - 'node_count': 1, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = ' '.join([ - 'aks', 'create', '--resource-group={resource_group}', '--name={name}', '--location={location}', - '--node-vm-size {vm_size}', - '--node-count {node_count}', - '--ssh-key-value={ssh_key_value}', - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/TrustedAccessPreview', - ]) - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) - - binding_name = 'testbinding' - node_rg_cmd = 'aks list -g {resource_group} --query "[0].nodeResourceGroup" -o tsv' + aks_name = self.create_random_name("cliakstest", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "resource_type": "Microsoft.ContainerService/ManagedClusters", + "vm_size": "Standard_D4s_v3", + "node_count": 1, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = " ".join( + [ + "aks", + "create", + "--resource-group={resource_group}", + "--name={name}", + "--location={location}", + "--node-vm-size {vm_size}", + "--node-count {node_count}", + "--ssh-key-value={ssh_key_value}", + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/TrustedAccessPreview", + ] + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) + + binding_name = "testbinding" + node_rg_cmd = ( + 'aks list -g {resource_group} --query "[0].nodeResourceGroup" -o tsv' + ) node_rg = self.cmd(node_rg_cmd).output.strip() - self.kwargs.update({'node_rg': node_rg, 'binding_name': binding_name}) + self.kwargs.update({"node_rg": node_rg, "binding_name": binding_name}) vmss_cmd = 'vmss list -g {node_rg} --query "[0].id" -o tsv' vmss_id = self.cmd(vmss_cmd).output.strip() - self.kwargs.update({'vmss_id': vmss_id}) + self.kwargs.update({"vmss_id": vmss_id}) # test create rolebinding - create_ta_binding_cmd = ' '.join([ - 'aks', 'trustedaccess', 'rolebinding', 'create', - '-g {resource_group}', - '--cluster-name {name}', - '-n {binding_name}', - '-s {vmss_id}', - '--roles Microsoft.Compute/virtualMachineScaleSets/test-node-reader,Microsoft.Compute/virtualMachineScaleSets/test-admin' - ]) - binding = self.cmd(create_ta_binding_cmd, checks=[ - self.check('name', binding_name), - self.check('type', 'Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings'), - self.check('sourceResourceId', vmss_id) - ]).get_output_in_json() - assert len(binding['roles']) == 2 + create_ta_binding_cmd = " ".join( + [ + "aks", + "trustedaccess", + "rolebinding", + "create", + "-g {resource_group}", + "--cluster-name {name}", + "-n {binding_name}", + "-s {vmss_id}", + "--roles Microsoft.Compute/virtualMachineScaleSets/test-node-reader,Microsoft.Compute/virtualMachineScaleSets/test-admin", + ] + ) + binding = self.cmd( + create_ta_binding_cmd, + checks=[ + self.check("name", binding_name), + self.check( + "type", + "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings", + ), + self.check("sourceResourceId", vmss_id), + ], + ).get_output_in_json() + assert len(binding["roles"]) == 2 time.sleep(20) # wait for binding creation # test list rolebinding - list_binding_cmd = 'aks trustedaccess rolebinding list --cluster-name {name} -g {resource_group}' + list_binding_cmd = "aks trustedaccess rolebinding list --cluster-name {name} -g {resource_group}" listed_bindings = self.cmd(list_binding_cmd).get_output_in_json() assert len(listed_bindings) == 1 # test get rolebinding - get_binding_cmd = 'aks trustedaccess rolebinding show --cluster-name {name} -g {resource_group} -n {binding_name}' + get_binding_cmd = "aks trustedaccess rolebinding show --cluster-name {name} -g {resource_group} -n {binding_name}" got_binding = self.cmd(get_binding_cmd).get_output_in_json() - assert got_binding['name'] == binding_name - assert len(got_binding['roles']) == 2 - assert got_binding['sourceResourceId'] == vmss_id - assert got_binding['type'] == 'Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings' + assert got_binding["name"] == binding_name + assert len(got_binding["roles"]) == 2 + assert got_binding["sourceResourceId"] == vmss_id + assert ( + got_binding["type"] + == "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings" + ) # test update rolebinding - update_binding_cmd = 'aks trustedaccess rolebinding update -g {resource_group} --cluster-name {name} -n {binding_name} \ - --roles Microsoft.Compute/virtualMachineScaleSets/test-node-reader' + update_binding_cmd = "aks trustedaccess rolebinding update -g {resource_group} --cluster-name {name} -n {binding_name} \ + --roles Microsoft.Compute/virtualMachineScaleSets/test-node-reader" updated_binding = self.cmd(update_binding_cmd).get_output_in_json() - assert updated_binding['name'] == binding_name - assert len(updated_binding['roles']) == 1 - assert updated_binding['roles'][0] == 'Microsoft.Compute/virtualMachineScaleSets/test-node-reader' + assert updated_binding["name"] == binding_name + assert len(updated_binding["roles"]) == 1 + assert ( + updated_binding["roles"][0] + == "Microsoft.Compute/virtualMachineScaleSets/test-node-reader" + ) # test delete rolebinding - delete_binding_cmd = 'aks trustedaccess rolebinding delete -g {resource_group} --cluster-name {name} -n {binding_name} -y' + delete_binding_cmd = "aks trustedaccess rolebinding delete -g {resource_group} --cluster-name {name} -n {binding_name} -y" self.cmd(delete_binding_cmd) time.sleep(20) # wait for binding deleting listed_bindings = self.cmd(list_binding_cmd).get_output_in_json() assert len(listed_bindings) == 0 @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_again_should_fail(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_again_should_fail( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--location={location} --ssh-key-value={ssh_key_value} --output=json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--location={location} --ssh-key-value={ssh_key_value} --output=json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # create again should fail - create_again_cmd = 'aks create --resource-group={resource_group} --name={name} ' \ - '--location={location} --ssh-key-value={ssh_key_value} --output=json' + create_again_cmd = ( + "aks create --resource-group={resource_group} --name={name} " + "--location={location} --ssh-key-value={ssh_key_value} --output=json" + ) try: - self.cmd(create_again_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + self.cmd( + create_again_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) except ClientRequestError as ex: if "already exists" not in str(ex): raise AssertionError( @@ -7713,15 +11130,24 @@ def test_aks_create_again_should_fail(self, resource_group, resource_group_locat ) # delete - cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(cmd, checks=[ - self.is_empty(), - ]) + cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_azure_service_mesh_enable_disable(self, resource_group, resource_group_location): - """ This test case exercises enabling and disabling service mesh profile. + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_azure_service_mesh_enable_disable( + self, resource_group, resource_group_location + ): + """This test case exercises enabling and disabling service mesh profile. It creates a cluster without azure service mesh profile. Then enable it by running `aks mesh enable` followed by disabling by running `aks mesh disable`. @@ -7730,44 +11156,68 @@ def test_aks_azure_service_mesh_enable_disable(self, resource_group, resource_gr # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create cluster without --enable-azure-service-mesh - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview ' \ - '--ssh-key-value={ssh_key_value} --output=json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview " + "--ssh-key-value={ssh_key_value} --output=json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # enable azure service mesh again - update_cmd = 'aks mesh enable --resource-group={resource_group} --name={name}' - self.cmd(update_cmd, checks=[ - self.check('serviceMeshProfile.mode', 'Istio'), - ]) + update_cmd = "aks mesh enable --resource-group={resource_group} --name={name}" + self.cmd( + update_cmd, + checks=[ + self.check("serviceMeshProfile.mode", "Istio"), + ], + ) # disable azure service mesh - update_cmd = 'aks mesh disable --resource-group={resource_group} --name={name} --yes' - self.cmd(update_cmd, checks=[ - self.check('serviceMeshProfile.mode', 'Disabled'), - ]) + update_cmd = ( + "aks mesh disable --resource-group={resource_group} --name={name} --yes" + ) + self.cmd( + update_cmd, + checks=[ + self.check("serviceMeshProfile.mode", "Disabled"), + ], + ) # delete the cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(delete_cmd, checks=[ - self.is_empty(), - ]) + delete_cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + delete_cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_azure_service_mesh_with_ingress_gateway(self, resource_group, resource_group_location): - """ This test case exercises enabling and disabling an ingress gateway. + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_azure_service_mesh_with_ingress_gateway( + self, resource_group, resource_group_location + ): + """This test case exercises enabling and disabling an ingress gateway. It creates a cluster with azure service mesh profile. After that, we enable an ingress gateway, then disable it. @@ -7776,52 +11226,90 @@ def test_aks_azure_service_mesh_with_ingress_gateway(self, resource_group, resou # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create cluster with --enable-azure-service-mesh - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--enable-azure-service-mesh --output=json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('serviceMeshProfile.mode', 'Istio'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview " + "--ssh-key-value={ssh_key_value} " + "--enable-azure-service-mesh --output=json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("serviceMeshProfile.mode", "Istio"), + ], + ) # enable ingress gateway - update_cmd = 'aks mesh enable-ingress-gateway --resource-group={resource_group} --name={name} ' \ - '--ingress-gateway-type Internal' - self.cmd(update_cmd, checks=[ - self.check('serviceMeshProfile.mode', 'Istio'), - self.check('serviceMeshProfile.istio.components.ingressGateways[0].mode', 'Internal'), - self.check('serviceMeshProfile.istio.components.ingressGateways[0].enabled', True) - ]) + update_cmd = ( + "aks mesh enable-ingress-gateway --resource-group={resource_group} --name={name} " + "--ingress-gateway-type Internal" + ) + self.cmd( + update_cmd, + checks=[ + self.check("serviceMeshProfile.mode", "Istio"), + self.check( + "serviceMeshProfile.istio.components.ingressGateways[0].mode", + "Internal", + ), + self.check( + "serviceMeshProfile.istio.components.ingressGateways[0].enabled", + True, + ), + ], + ) # disable ingress gateway - update_cmd = 'aks mesh disable-ingress-gateway --resource-group={resource_group} --name={name} ' \ - '--ingress-gateway-type Internal --yes' - self.cmd(update_cmd, checks=[ - self.check('serviceMeshProfile.mode', 'Istio'), - self.check('serviceMeshProfile.istio.components.ingressGateways[0].mode', 'Internal'), - self.check('serviceMeshProfile.istio.components.ingressGateways[0].enabled', None) - ]) + update_cmd = ( + "aks mesh disable-ingress-gateway --resource-group={resource_group} --name={name} " + "--ingress-gateway-type Internal --yes" + ) + self.cmd( + update_cmd, + checks=[ + self.check("serviceMeshProfile.mode", "Istio"), + self.check( + "serviceMeshProfile.istio.components.ingressGateways[0].mode", + "Internal", + ), + self.check( + "serviceMeshProfile.istio.components.ingressGateways[0].enabled", + None, + ), + ], + ) # delete the cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(delete_cmd, checks=[ - self.is_empty(), - ]) + delete_cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + delete_cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_azure_service_mesh_with_egress_gateway(self, resource_group, resource_group_location): - """ This test case exercises enabling and disabling an egress gateway. + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_azure_service_mesh_with_egress_gateway( + self, resource_group, resource_group_location + ): + """This test case exercises enabling and disabling an egress gateway. It creates a cluster with azure service mesh profile. After that, we enable an egress gateway, then disable it. @@ -7830,60 +11318,107 @@ def test_aks_azure_service_mesh_with_egress_gateway(self, resource_group, resour # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create cluster with --enable-azure-service-mesh - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--enable-azure-service-mesh --output=json' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('serviceMeshProfile.mode', 'Istio'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview " + "--ssh-key-value={ssh_key_value} " + "--enable-azure-service-mesh --output=json" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("serviceMeshProfile.mode", "Istio"), + ], + ) # enable egress gateway - update_cmd = 'aks mesh enable-egress-gateway --resource-group={resource_group} --name={name} ' \ - '--egress-gateway-nodeselector istio=egress' - self.cmd(update_cmd, checks=[ - self.check('serviceMeshProfile.mode', 'Istio'), - self.check('serviceMeshProfile.istio.components.egressGateways[0].nodeSelector.istio', 'egress'), - self.check('serviceMeshProfile.istio.components.egressGateways[0].enabled', True) - ]) + update_cmd = ( + "aks mesh enable-egress-gateway --resource-group={resource_group} --name={name} " + "--egress-gateway-nodeselector istio=egress" + ) + self.cmd( + update_cmd, + checks=[ + self.check("serviceMeshProfile.mode", "Istio"), + self.check( + "serviceMeshProfile.istio.components.egressGateways[0].nodeSelector.istio", + "egress", + ), + self.check( + "serviceMeshProfile.istio.components.egressGateways[0].enabled", + True, + ), + ], + ) # remove egress gateway nodeselector - update_cmd = 'aks mesh enable-egress-gateway --resource-group={resource_group} --name={name} ' \ - '--egress-gateway-nodeselector ' - self.cmd(update_cmd, checks=[ - self.check('serviceMeshProfile.mode', 'Istio'), - self.check('serviceMeshProfile.istio.components.egressGateways[0].nodeSelector.istio', None), - self.check('serviceMeshProfile.istio.components.egressGateways[0].enabled', True) - ]) + update_cmd = ( + "aks mesh enable-egress-gateway --resource-group={resource_group} --name={name} " + "--egress-gateway-nodeselector " + ) + self.cmd( + update_cmd, + checks=[ + self.check("serviceMeshProfile.mode", "Istio"), + self.check( + "serviceMeshProfile.istio.components.egressGateways[0].nodeSelector.istio", + None, + ), + self.check( + "serviceMeshProfile.istio.components.egressGateways[0].enabled", + True, + ), + ], + ) # disable egress gateway - update_cmd = 'aks mesh disable-egress-gateway --resource-group={resource_group} --name={name} --yes' - self.cmd(update_cmd, checks=[ - self.check('serviceMeshProfile.mode', 'Istio'), - self.check('serviceMeshProfile.istio.components.egressGateways[0].enabled', None), - self.check('serviceMeshProfile.istio.components.egressGateways[0].nodeSelector', None) - ]) + update_cmd = "aks mesh disable-egress-gateway --resource-group={resource_group} --name={name} --yes" + self.cmd( + update_cmd, + checks=[ + self.check("serviceMeshProfile.mode", "Istio"), + self.check( + "serviceMeshProfile.istio.components.egressGateways[0].enabled", + None, + ), + self.check( + "serviceMeshProfile.istio.components.egressGateways[0].nodeSelector", + None, + ), + ], + ) # delete the cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(delete_cmd, checks=[ - self.is_empty(), - ]) + delete_cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + delete_cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_azure_service_mesh_with_pluginca(self, resource_group, resource_group_location): - """ This test case exercises providing plugin ca params with mesh enable command. + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_azure_service_mesh_with_pluginca( + self, resource_group, resource_group_location + ): + """This test case exercises providing plugin ca params with mesh enable command. It creates a cluster, enables azure service mesh with plugica params, then disable it. """ @@ -7891,70 +11426,107 @@ def test_aks_azure_service_mesh_with_pluginca(self, resource_group, resource_gro # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - akv_resource_id = '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/foo/providers/Microsoft.KeyVault/vaults/foo' - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - 'akv_resource_id': akv_resource_id, - }) + aks_name = self.create_random_name("cliakstest", 16) + akv_resource_id = "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/foo/providers/Microsoft.KeyVault/vaults/foo" + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + "akv_resource_id": akv_resource_id, + } + ) # create cluster - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd(create_cmd, checks=[self.check("provisioningState", "Succeeded")]) # enable azurekeyvaultsecretsprovider addon - enable_cmd = 'aks enable-addons --addons azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json' - self.cmd(enable_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.enabled', True), - self.check( - 'addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation', "false") - ]) + enable_cmd = "aks enable-addons --addons azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json" + self.cmd( + enable_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + self.check( + "addonProfiles.azureKeyvaultSecretsProvider.config.enableSecretRotation", + "false", + ), + ], + ) # enable azure service mesh with pluginca - update_cmd = 'aks mesh enable --resource-group={resource_group} --name={name} ' \ - '--key-vault-id {akv_resource_id} ' \ - '--ca-cert-object-name my-ca-cert ' \ - '--ca-key-object-name my-ca-key ' \ - '--cert-chain-object-name my-cert-chain ' \ - '--root-cert-object-name my-root-cert' - - self.cmd(update_cmd, checks=[ - self.check('serviceMeshProfile.mode', 'Istio'), - self.check('serviceMeshProfile.istio.certificateAuthority.plugin.keyVaultId', akv_resource_id), - self.check('serviceMeshProfile.istio.certificateAuthority.plugin.certObjectName', 'my-ca-cert'), - self.check('serviceMeshProfile.istio.certificateAuthority.plugin.keyObjectName', 'my-ca-key'), - self.check('serviceMeshProfile.istio.certificateAuthority.plugin.rootCertObjectName', 'my-root-cert'), - self.check('serviceMeshProfile.istio.certificateAuthority.plugin.certChainObjectName', 'my-cert-chain') - ]) + update_cmd = ( + "aks mesh enable --resource-group={resource_group} --name={name} " + "--key-vault-id {akv_resource_id} " + "--ca-cert-object-name my-ca-cert " + "--ca-key-object-name my-ca-key " + "--cert-chain-object-name my-cert-chain " + "--root-cert-object-name my-root-cert" + ) + + self.cmd( + update_cmd, + checks=[ + self.check("serviceMeshProfile.mode", "Istio"), + self.check( + "serviceMeshProfile.istio.certificateAuthority.plugin.keyVaultId", + akv_resource_id, + ), + self.check( + "serviceMeshProfile.istio.certificateAuthority.plugin.certObjectName", + "my-ca-cert", + ), + self.check( + "serviceMeshProfile.istio.certificateAuthority.plugin.keyObjectName", + "my-ca-key", + ), + self.check( + "serviceMeshProfile.istio.certificateAuthority.plugin.rootCertObjectName", + "my-root-cert", + ), + self.check( + "serviceMeshProfile.istio.certificateAuthority.plugin.certChainObjectName", + "my-cert-chain", + ), + ], + ) # delete the cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(delete_cmd, checks=[ - self.is_empty(), - ]) + delete_cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + delete_cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_azure_service_mesh_get_revisions(self): - """ This test case exercises getting all the available revisions for the location. """ + """This test case exercises getting all the available revisions for the location.""" - revisions_cmd = 'aks mesh get-revisions -l westus2' + revisions_cmd = "aks mesh get-revisions -l westus2" revisions = self.cmd(revisions_cmd).get_output_in_json() - assert len(revisions['meshRevisions']) > 0 + assert len(revisions["meshRevisions"]) > 0 @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_azure_service_mesh_get_upgrades(self, resource_group, resource_group_location): - """ This test case exercises getting all the possible upgrades for azure service mesh enabled on the cluster. + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_azure_service_mesh_get_upgrades( + self, resource_group, resource_group_location + ): + """This test case exercises getting all the possible upgrades for azure service mesh enabled on the cluster. It creates a cluster, enables azure service mesh, then gets all the possible upgrades. """ @@ -7962,845 +11534,1217 @@ def test_aks_azure_service_mesh_get_upgrades(self, resource_group, resource_grou # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create cluster - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--aks-custom-headers=AKSHTTPCustomFeatures=Microsoft.ContainerService/AzureServiceMeshPreview " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd(create_cmd, checks=[self.check("provisioningState", "Succeeded")]) # enable azure service mesh - enable_cmd = 'aks mesh enable --resource-group={resource_group} --name={name}' - self.cmd(enable_cmd, checks=[ - self.check('serviceMeshProfile.mode', 'Istio'), - ]) + enable_cmd = "aks mesh enable --resource-group={resource_group} --name={name}" + self.cmd( + enable_cmd, + checks=[ + self.check("serviceMeshProfile.mode", "Istio"), + ], + ) - upgrades_cmd = 'aks mesh get-upgrades --resource-group={resource_group} --name={name}' + upgrades_cmd = ( + "aks mesh get-upgrades --resource-group={resource_group} --name={name}" + ) upgrades = self.cmd(upgrades_cmd).get_output_in_json() - assert 'compatibleWith' in upgrades and len(upgrades['compatibleWith']) > 0 + assert "compatibleWith" in upgrades and len(upgrades["compatibleWith"]) > 0 # delete the cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={name} --yes --no-wait' - self.cmd(delete_cmd, checks=[ - self.is_empty(), - ]) + delete_cmd = ( + "aks delete --resource-group={resource_group} --name={name} --yes --no-wait" + ) + self.cmd( + delete_cmd, + checks=[ + self.is_empty(), + ], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') - def test_aks_create_with_standard_sku(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) + def test_aks_create_with_standard_sku( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --node-count=1 --tier standard' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('sku.name', 'Base'), - self.check('sku.tier', 'Standard'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --node-count=1 --tier standard" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("sku.name", "Base"), + self.check("sku.tier", "Standard"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_create_with_premium_sku(self, resource_group, resource_group_location): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --tier premium --k8s-support-plan AKSLongTermSupport -k 1.27' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('sku.name', 'Base'), - self.check('sku.tier', 'Premium'), - self.check('supportPlan', 'AKSLongTermSupport'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --tier premium --k8s-support-plan AKSLongTermSupport -k 1.27" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("sku.name", "Base"), + self.check("sku.tier", "Premium"), + self.check("supportPlan", "AKSLongTermSupport"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) - + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_update_with_premium_sku(self, resource_group, resource_group_location): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + } + ) # create a free tier - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --node-count=1 --tier free -k 1.27' - self.cmd(create_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('sku.name', 'Base'), - self.check('sku.tier', 'Free'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --node-count=1 --tier free -k 1.27" + ) + self.cmd( + create_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("sku.name", "Base"), + self.check("sku.tier", "Free"), + ], + ) # update to premium tier - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--tier premium --k8s-support-plan AKSLongTermSupport --auto-upgrade-channel patch' - self.cmd(update_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('sku.name', 'Base'), - self.check('sku.tier', 'Premium'), - self.check('supportPlan', 'AKSLongTermSupport'), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--tier premium --k8s-support-plan AKSLongTermSupport --auto-upgrade-channel patch" + ) + self.cmd( + update_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("sku.name", "Base"), + self.check("sku.tier", "Premium"), + self.check("supportPlan", "AKSLongTermSupport"), + ], + ) # update to standard tier - update_cmd = 'aks update --resource-group={resource_group} --name={name} ' \ - '--tier standard --k8s-support-plan KubernetesOfficial' - self.cmd(update_cmd, checks=[ - self.exists('fqdn'), - self.exists('nodeResourceGroup'), - self.check('provisioningState', 'Succeeded'), - self.check('sku.name', 'Base'), - self.check('sku.tier', 'Standard'), - self.check('supportPlan', 'KubernetesOfficial'), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} " + "--tier standard --k8s-support-plan KubernetesOfficial" + ) + self.cmd( + update_cmd, + checks=[ + self.exists("fqdn"), + self.exists("nodeResourceGroup"), + self.check("provisioningState", "Succeeded"), + self.check("sku.name", "Base"), + self.check("sku.tier", "Standard"), + self.check("supportPlan", "KubernetesOfficial"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_update_upgrade_settings(self, resource_group, resource_group_location): - """ This test case exercises enabling and disabling forceUpgrade override in cluster upgradeSettings. - """ + """This test case exercises enabling and disabling forceUpgrade override in cluster upgradeSettings.""" # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--enable-managed-identity ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.not_exists('upgradeSettings') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--enable-managed-identity " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.not_exists("upgradeSettings"), + ], + ) # update upgrade settings - self.cmd('aks update --resource-group={resource_group} --name={name} --upgrade-override-until 2020-01-01T22:30:17+00:00', checks=[ - self.check('provisioningState', 'Succeeded'), - self.not_exists('upgradeSettings.overrideSettings.forceUpgrade'), - self.exists('upgradeSettings.overrideSettings.until') - ]) - self.cmd('aks update --resource-group={resource_group} --name={name} --enable-force-upgrade', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('upgradeSettings.overrideSettings.forceUpgrade', True), - self.exists('upgradeSettings.overrideSettings.until') - ]) - self.cmd('aks update --resource-group={resource_group} --name={name} --enable-force-upgrade --upgrade-override-until 2020-02-22T22:30:17+00:00', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('upgradeSettings.overrideSettings.forceUpgrade', True), - self.check('upgradeSettings.overrideSettings.until', '2020-02-22T22:30:17+00:00') - ]) - self.cmd('aks update --resource-group={resource_group} --name={name} --disable-force-upgrade', checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('upgradeSettings.overrideSettings.forceUpgrade', False), - self.check('upgradeSettings.overrideSettings.until', '2020-02-22T22:30:17+00:00') - ]) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --upgrade-override-until 2020-01-01T22:30:17+00:00", + checks=[ + self.check("provisioningState", "Succeeded"), + self.not_exists("upgradeSettings.overrideSettings.forceUpgrade"), + self.exists("upgradeSettings.overrideSettings.until"), + ], + ) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --enable-force-upgrade", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("upgradeSettings.overrideSettings.forceUpgrade", True), + self.exists("upgradeSettings.overrideSettings.until"), + ], + ) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --enable-force-upgrade --upgrade-override-until 2020-02-22T22:30:17+00:00", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("upgradeSettings.overrideSettings.forceUpgrade", True), + self.check( + "upgradeSettings.overrideSettings.until", + "2020-02-22T22:30:17+00:00", + ), + ], + ) + self.cmd( + "aks update --resource-group={resource_group} --name={name} --disable-force-upgrade", + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("upgradeSettings.overrideSettings.forceUpgrade", False), + self.check( + "upgradeSettings.overrideSettings.until", + "2020-02-22T22:30:17+00:00", + ), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_update_enable_network_observability(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - }) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_update_enable_network_observability( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + } + ) - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --node-count=1 --tier standard ' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --node-count=1 --tier standard " + ) + self.cmd(create_cmd, checks=[self.check("provisioningState", "Succeeded")]) # update to enable network observability - update_cmd = 'aks update --resource-group={resource_group} --name={name} --enable-network-observability ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NetworkObservabilityPreview ' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.monitoring.enabled', True), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} --enable-network-observability " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NetworkObservabilityPreview " + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.monitoring.enabled", True), + ], + ) # update to disable network observability - update_cmd_two = 'aks update --resource-group={resource_group} --name={name} --disable-network-observability ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NetworkObservabilityPreview ' - self.cmd(update_cmd_two, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.monitoring.enabled', False), - ]) + update_cmd_two = ( + "aks update --resource-group={resource_group} --name={name} --disable-network-observability " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NetworkObservabilityPreview " + ) + self.cmd( + update_cmd_two, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.monitoring.enabled", False), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_create_with_enable_network_observability(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_create_with_enable_network_observability( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --node-count=1 --tier standard --enable-network-observability ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NetworkObservabilityPreview' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('networkProfile.monitoring.enabled', True), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --node-count=1 --tier standard --enable-network-observability " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/NetworkObservabilityPreview" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("networkProfile.monitoring.enabled", True), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', - preserve_default_location=True) - def test_aks_create_with_enable_cost_analysis(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) + def test_aks_create_with_enable_cost_analysis( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --node-count=1 --tier standard --enable-cost-analysis ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ClusterCostAnalysis' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('metricsProfile.costAnalysis.enabled', True), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --node-count=1 --tier standard --enable-cost-analysis " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ClusterCostAnalysis" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("metricsProfile.costAnalysis.enabled", True), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', - preserve_default_location=True) - def test_aks_update_enable_cost_analysis(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) + def test_aks_update_enable_cost_analysis( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --node-count=1 --tier standard ' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded') - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --node-count=1 --tier standard " + ) + self.cmd(create_cmd, checks=[self.check("provisioningState", "Succeeded")]) # update to enable - update_cmd = 'aks update --resource-group={resource_group} --name={name} --enable-cost-analysis ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ClusterCostAnalysis ' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('metricsProfile.costAnalysis.enabled', True), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} --enable-cost-analysis " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ClusterCostAnalysis " + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("metricsProfile.costAnalysis.enabled", True), + ], + ) # update to disable - update_cmd = 'aks update --resource-group={resource_group} --name={name} --disable-cost-analysis ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ClusterCostAnalysis ' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('metricsProfile.costAnalysis.enabled', False), - ]) + update_cmd = ( + "aks update --resource-group={resource_group} --name={name} --disable-cost-analysis " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/ClusterCostAnalysis " + ) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("metricsProfile.costAnalysis.enabled", False), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', - preserve_default_location=True) - def test_aks_create_node_provisioning_mode_manual(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) + def test_aks_create_node_provisioning_mode_manual( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + } + ) # create # TODO: Use mode Auto instead? - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --node-count=1 --enable-managed-identity --node-provisioning-mode=Manual' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('nodeProvisioningProfile.mode', 'Manual'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --node-count=1 --enable-managed-identity --node-provisioning-mode=Manual" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("nodeProvisioningProfile.mode", "Manual"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westcentralus', - preserve_default_location=True) - def test_aks_update_node_provisioning_mode_manual(self, resource_group, resource_group_location): + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="westcentralus", + preserve_default_location=True, + ) + def test_aks_update_node_provisioning_mode_manual( + self, resource_group, resource_group_location + ): # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # kwargs for string formatting - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'location': resource_group_location, - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "location": resource_group_location, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --node-count=1 --enable-managed-identity' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} --location={location} " + "--ssh-key-value={ssh_key_value} --node-count=1 --enable-managed-identity" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # update - update_cmd = 'aks update --resource-group={resource_group} --name={name} --node-provisioning-mode=Manual' - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('nodeProvisioningProfile.mode', 'Manual'), - ]) + update_cmd = "aks update --resource-group={resource_group} --name={name} --node-provisioning-mode=Manual" + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("nodeProvisioningProfile.mode", "Manual"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_create_with_custom_headers(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_create_with_custom_headers( + self, resource_group, resource_group_location + ): + aks_name = self.create_random_name("cliakstest", 16) _, create_version = self._get_versions(resource_group_location) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - 'k8s_version': create_version, - }) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + "k8s_version": create_version, + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} -k {k8s_version} -c 1 ' \ - '--ssh-key-value={ssh_key_value} ' \ - '--aks-custom-headers x-ms-correlation-request-id=12345678-90ab-cdef-1234-567890abcdef' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} -k {k8s_version} -c 1 " + "--ssh-key-value={ssh_key_value} " + "--aks-custom-headers x-ms-correlation-request-id=12345678-90ab-cdef-1234-567890abcdef" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # scale cluster - scale_cluster_cmd = 'aks scale --resource-group={resource_group} --name={name} ' \ - '-c 2 --aks-custom-headers x-ms-correlation-request-id=12345678-90ab-cdef-1234-567890abcdef' - self.cmd(scale_cluster_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + scale_cluster_cmd = ( + "aks scale --resource-group={resource_group} --name={name} " + "-c 2 --aks-custom-headers x-ms-correlation-request-id=12345678-90ab-cdef-1234-567890abcdef" + ) + self.cmd( + scale_cluster_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # scale nodepool - scale_nodepool_cmd = 'aks nodepool scale --resource-group={resource_group} --cluster-name={name} --name=nodepool1 ' \ - '-c 1 --aks-custom-headers x-ms-correlation-request-id=12345678-90ab-cdef-1234-567890abcdef' - self.cmd(scale_nodepool_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + scale_nodepool_cmd = ( + "aks nodepool scale --resource-group={resource_group} --cluster-name={name} --name=nodepool1 " + "-c 1 --aks-custom-headers x-ms-correlation-request-id=12345678-90ab-cdef-1234-567890abcdef" + ) + self.cmd( + scale_nodepool_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # show - show_cmd = 'aks show --resource-group={resource_group} --name={name} ' \ - '--aks-custom-headers x-ms-correlation-request-id=12345678-90ab-cdef-1234-567890abcdef' - self.cmd(show_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + show_cmd = ( + "aks show --resource-group={resource_group} --name={name} " + "--aks-custom-headers x-ms-correlation-request-id=12345678-90ab-cdef-1234-567890abcdef" + ) + self.cmd( + show_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # delete self.cmd( - 'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus') - def test_aks_create_with_app_routing_enabled(self, resource_group, resource_group_location): - """ This test case exercises creating an AKS cluster with app routing addon enabled. - """ + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="eastus" + ) + def test_aks_create_with_app_routing_enabled( + self, resource_group, resource_group_location + ): + """This test case exercises creating an AKS cluster with app routing addon enabled.""" # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # create cluster with app routing addon enabled - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'aks_name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={aks_name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --enable-app-routing ' \ - - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True) - ]) - - @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_approuting_enable_disable(self, resource_group, resource_group_location): - """ This test case exercises enabling and disabling app routing addon in an AKS cluster. - """ + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "aks_name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={aks_name} --location={location} " + "--ssh-key-value={ssh_key_value} --enable-app-routing " + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + ], + ) + + @AllowLargeResponse() + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_approuting_enable_disable( + self, resource_group, resource_group_location + ): + """This test case exercises enabling and disabling app routing addon in an AKS cluster.""" # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # create cluster without app routing - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'aks_name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) - create_cmd = 'aks create --resource-group={resource_group} --name={aks_name} --location={location} ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "aks_name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + create_cmd = ( + "aks create --resource-group={resource_group} --name={aks_name} --location={location} " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # enable app routing - enable_app_routing_cmd = 'aks approuting enable --resource-group={resource_group} --name={aks_name}' - self.cmd(enable_app_routing_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True) - ]) + enable_app_routing_cmd = ( + "aks approuting enable --resource-group={resource_group} --name={aks_name}" + ) + self.cmd( + enable_app_routing_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + ], + ) # disable app routing - disable_app_routing_cmd = 'aks approuting disable --resource-group={resource_group} --name={aks_name} --yes' - self.cmd(disable_app_routing_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', False) - ]) + disable_app_routing_cmd = "aks approuting disable --resource-group={resource_group} --name={aks_name} --yes" + self.cmd( + disable_app_routing_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", False), + ], + ) # delete cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait' + delete_cmd = "aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait" self.cmd(delete_cmd, checks=[self.is_empty()]) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_approuting_enable_with_keyvault_secrets_provider_addon(self, resource_group, resource_group_location): - """ This test case exercises enabling app routing addon in an AKS cluster along with keyvault secrets provider addon. - """ + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_approuting_enable_with_keyvault_secrets_provider_addon( + self, resource_group, resource_group_location + ): + """This test case exercises enabling app routing addon in an AKS cluster along with keyvault secrets provider addon.""" # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 # create cluster - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'aks_name': aks_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - create_cmd = 'aks create --resource-group={resource_group} --name={aks_name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} ' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "aks_name": aks_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_cmd = ( + "aks create --resource-group={resource_group} --name={aks_name} --location={location} " + "--ssh-key-value={ssh_key_value} " + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # enable app routing with keyvault secrets provider addon enabled - enable_app_routing_cmd = 'aks approuting enable --enable-kv --resource-group={resource_group} --name={aks_name}' - self.cmd(enable_app_routing_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True), - self.check('addonProfiles.azureKeyvaultSecretsProvider.enabled', True) - ]) - - # delete cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait' + enable_app_routing_cmd = "aks approuting enable --enable-kv --resource-group={resource_group} --name={aks_name}" + self.cmd( + enable_app_routing_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + ], + ) + + # delete cluster + delete_cmd = "aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait" self.cmd(delete_cmd, checks=[self.is_empty()]) @live_only() @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) def test_aks_approuting_update(self, resource_group, resource_group_location): - """ This test case exercises updating app routing addon in an AKS cluster. - """ + """This test case exercises updating app routing addon in an AKS cluster.""" # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 - - aks_name = self.create_random_name('cliakstest', 16) - kv_name = self.create_random_name('cliakstestkv', 16) - - self.kwargs.update({ - 'resource_group': resource_group, - 'aks_name': aks_name, - 'kv_name' : kv_name, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + kv_name = self.create_random_name("cliakstestkv", 16) + + self.kwargs.update( + { + "resource_group": resource_group, + "aks_name": aks_name, + "kv_name": kv_name, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create keyvault with rbac auth enabled - create_keyvault_cmd = 'keyvault create --resource-group={resource_group} --location={location} --name={kv_name} --enable-rbac-authorization=true' - keyvault = self.cmd(create_keyvault_cmd, checks=[ - self.check('properties.provisioningState', 'Succeeded'), - self.check('properties.enableRbacAuthorization', True), - self.check('name', kv_name) - ]).get_output_in_json() - keyvault_id = keyvault['id'] - - self.kwargs.update({ - 'keyvault_id': keyvault_id - }) + create_keyvault_cmd = "keyvault create --resource-group={resource_group} --location={location} --name={kv_name} --enable-rbac-authorization=true" + keyvault = self.cmd( + create_keyvault_cmd, + checks=[ + self.check("properties.provisioningState", "Succeeded"), + self.check("properties.enableRbacAuthorization", True), + self.check("name", kv_name), + ], + ).get_output_in_json() + keyvault_id = keyvault["id"] + + self.kwargs.update({"keyvault_id": keyvault_id}) # create cluster with app routing enabled - create_cmd = 'aks create --resource-group={resource_group} --name={aks_name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --enable-app-routing' - result = self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True), - ]).get_output_in_json() - object_id = result['ingressProfile']['webAppRouting']['identity']['objectId'] - - self.kwargs.update({ - 'object_id': object_id - }) + create_cmd = ( + "aks create --resource-group={resource_group} --name={aks_name} --location={location} " + "--ssh-key-value={ssh_key_value} --enable-app-routing" + ) + result = self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + ], + ).get_output_in_json() + object_id = result["ingressProfile"]["webAppRouting"]["identity"]["objectId"] + + self.kwargs.update({"object_id": object_id}) # update with enable_rbac_authroization flag in keyvault set to true - update_cmd = 'aks approuting update --resource-group={resource_group} --name={aks_name} ' \ - '--attach-kv {keyvault_id}' + update_cmd = ( + "aks approuting update --resource-group={resource_group} --name={aks_name} " + "--attach-kv {keyvault_id}" + ) - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True) - ]) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + ], + ) check_role_assignment_cmd = 'role assignment list --scope {keyvault_id} --assignee {object_id} --role "Key Vault Secrets User" --output json' - self.cmd(check_role_assignment_cmd, checks=[ - self.check('length(@)', 1), - self.check('[0].roleDefinitionName', 'Key Vault Secrets User'), - self.check('[0].principalId', '{object_id}'), - self.check('[0].scope', keyvault_id) - ]) + self.cmd( + check_role_assignment_cmd, + checks=[ + self.check("length(@)", 1), + self.check("[0].roleDefinitionName", "Key Vault Secrets User"), + self.check("[0].principalId", "{object_id}"), + self.check("[0].scope", keyvault_id), + ], + ) # create keyvault with rbac auth disabled - kv_name = self.create_random_name('cliakstestkv', 16) - self.kwargs.update({ - 'kv_name': kv_name - }) - create_keyvault_cmd = 'keyvault create --resource-group={resource_group} --location={location} --name={kv_name} --enable-rbac-authorization=false' - keyvault = self.cmd(create_keyvault_cmd, checks=[ - self.check('properties.provisioningState', 'Succeeded'), - self.check('properties.enableRbacAuthorization', False), - self.check('name', kv_name) - ]).get_output_in_json() - keyvault_id = keyvault['id'] - - self.kwargs.update({ - 'keyvault_id': keyvault_id - }) + kv_name = self.create_random_name("cliakstestkv", 16) + self.kwargs.update({"kv_name": kv_name}) + create_keyvault_cmd = "keyvault create --resource-group={resource_group} --location={location} --name={kv_name} --enable-rbac-authorization=false" + keyvault = self.cmd( + create_keyvault_cmd, + checks=[ + self.check("properties.provisioningState", "Succeeded"), + self.check("properties.enableRbacAuthorization", False), + self.check("name", kv_name), + ], + ).get_output_in_json() + keyvault_id = keyvault["id"] + + self.kwargs.update({"keyvault_id": keyvault_id}) # update with enable_rbac_authroization flag in keyvault set to false - update_cmd = 'aks approuting update --resource-group={resource_group} --name={aks_name} ' \ - '--attach-kv {keyvault_id}' + update_cmd = ( + "aks approuting update --resource-group={resource_group} --name={aks_name} " + "--attach-kv {keyvault_id}" + ) - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True) - ]) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + ], + ) - check_access_policy_cmd = 'az keyvault show --resource-group={resource_group} --name={kv_name} --query "properties.accessPolicies[?objectId==\'{object_id}\']" -o json' + check_access_policy_cmd = "az keyvault show --resource-group={resource_group} --name={kv_name} --query \"properties.accessPolicies[?objectId=='{object_id}']\" -o json" print(check_access_policy_cmd) - self.cmd(check_access_policy_cmd, checks=[ - self.check('length(@)', 1), - self.check('[0].objectId', '{object_id}'), - self.check('[0].permissions.certificates', ['Get']), - self.check('[0].permissions.keys', None), - self.check('[0].permissions.secrets', ['Get']), - self.check('[0].permissions.storage', None), - ]) + self.cmd( + check_access_policy_cmd, + checks=[ + self.check("length(@)", 1), + self.check("[0].objectId", "{object_id}"), + self.check("[0].permissions.certificates", ["Get"]), + self.check("[0].permissions.keys", None), + self.check("[0].permissions.secrets", ["Get"]), + self.check("[0].permissions.storage", None), + ], + ) # update with --enable-kv flag - update_cmd = 'aks approuting update --resource-group={resource_group} --name={aks_name} --enable-kv' + update_cmd = "aks approuting update --resource-group={resource_group} --name={aks_name} --enable-kv" - self.cmd(update_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True), - self.check('addonProfiles.azureKeyvaultSecretsProvider.enabled', True) - ]) + self.cmd( + update_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + self.check("addonProfiles.azureKeyvaultSecretsProvider.enabled", True), + ], + ) # delete cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait' + delete_cmd = "aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait" self.cmd(delete_cmd, checks=[self.is_empty()]) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) - def test_aks_approuting_zone_add_delete_list(self, resource_group, resource_group_location): - """ This test case exercises adding, deleting and listing zones to app routing addon in an AKS cluster. - """ + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) + def test_aks_approuting_zone_add_delete_list( + self, resource_group, resource_group_location + ): + """This test case exercises adding, deleting and listing zones to app routing addon in an AKS cluster.""" # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 - aks_name = self.create_random_name('cliakstest', 16) - dns_zone_1 = self.create_random_name('cliakstest', 16) + ".com" - dns_zone_2 = self.create_random_name('cliakstest', 16) + ".com" - - self.kwargs.update({ - 'resource_group': resource_group, - 'aks_name': aks_name, - 'dns_zone_1': dns_zone_1, - 'dns_zone_2': dns_zone_2, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - - create_dns_zone_cmd_1 = 'network dns zone create --resource-group={resource_group} --name {dns_zone_1}' - dns_zone_result = self.cmd(create_dns_zone_cmd_1, checks=[ - self.check('name', dns_zone_1), - ]).get_output_in_json() - dns_zone_id_1 = dns_zone_result['id'] - - create_dns_zone_cmd_2 = 'network dns zone create --resource-group={resource_group} --name {dns_zone_2}' - dns_zone_result = self.cmd(create_dns_zone_cmd_2, checks=[ - self.check('name', dns_zone_2), - ]).get_output_in_json() - dns_zone_id_2 = dns_zone_result['id'] - - self.kwargs.update({ - 'dns_zone_id_1': dns_zone_id_1, - 'dns_zone_id_2': dns_zone_id_2 - }) + aks_name = self.create_random_name("cliakstest", 16) + dns_zone_1 = self.create_random_name("cliakstest", 16) + ".com" + dns_zone_2 = self.create_random_name("cliakstest", 16) + ".com" + + self.kwargs.update( + { + "resource_group": resource_group, + "aks_name": aks_name, + "dns_zone_1": dns_zone_1, + "dns_zone_2": dns_zone_2, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_dns_zone_cmd_1 = "network dns zone create --resource-group={resource_group} --name {dns_zone_1}" + dns_zone_result = self.cmd( + create_dns_zone_cmd_1, + checks=[ + self.check("name", dns_zone_1), + ], + ).get_output_in_json() + dns_zone_id_1 = dns_zone_result["id"] + + create_dns_zone_cmd_2 = "network dns zone create --resource-group={resource_group} --name {dns_zone_2}" + dns_zone_result = self.cmd( + create_dns_zone_cmd_2, + checks=[ + self.check("name", dns_zone_2), + ], + ).get_output_in_json() + dns_zone_id_2 = dns_zone_result["id"] + + self.kwargs.update( + {"dns_zone_id_1": dns_zone_id_1, "dns_zone_id_2": dns_zone_id_2} + ) # create cluster with app routing enabled - create_cmd = 'aks create --resource-group={resource_group} --name={aks_name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --enable-app-routing' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True), - self.check('ingressProfile.webAppRouting.dnsZoneResourceIds', None) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={aks_name} --location={location} " + "--ssh-key-value={ssh_key_value} --enable-app-routing" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + self.check("ingressProfile.webAppRouting.dnsZoneResourceIds", None), + ], + ) # add dns zone - add_dns_zone_cmd = 'aks approuting zone add --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_1}' - self.cmd(add_dns_zone_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.dnsZoneResourceIds[0]', dns_zone_id_1), - ]) + add_dns_zone_cmd = "aks approuting zone add --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_1}" + self.cmd( + add_dns_zone_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "ingressProfile.webAppRouting.dnsZoneResourceIds[0]", dns_zone_id_1 + ), + ], + ) # add dns zone with --atach-zones flag - add_dns_zone_cmd = 'aks approuting zone add --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_2} --attach-zones' - self.cmd(add_dns_zone_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.dnsZoneResourceIds[0]', dns_zone_id_1), - self.check('ingressProfile.webAppRouting.dnsZoneResourceIds[1]', dns_zone_id_2) - ]) + add_dns_zone_cmd = "aks approuting zone add --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_2} --attach-zones" + self.cmd( + add_dns_zone_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "ingressProfile.webAppRouting.dnsZoneResourceIds[0]", dns_zone_id_1 + ), + self.check( + "ingressProfile.webAppRouting.dnsZoneResourceIds[1]", dns_zone_id_2 + ), + ], + ) # list dns zone - list_dns_zone_cmd = 'aks approuting zone list --resource-group={resource_group} --name={aks_name}' - self.cmd(list_dns_zone_cmd, checks=[ - self.check('length(@)', 2), - self.check('[0].resource_group', resource_group), - self.check('[0].type', "dnszones"), - self.check('[0].name', dns_zone_1), - self.check('[1].resource_group', resource_group), - self.check('[1].type', "dnszones"), - self.check('[1].name', dns_zone_2) - ]) + list_dns_zone_cmd = "aks approuting zone list --resource-group={resource_group} --name={aks_name}" + self.cmd( + list_dns_zone_cmd, + checks=[ + self.check("length(@)", 2), + self.check("[0].resource_group", resource_group), + self.check("[0].type", "dnszones"), + self.check("[0].name", dns_zone_1), + self.check("[1].resource_group", resource_group), + self.check("[1].type", "dnszones"), + self.check("[1].name", dns_zone_2), + ], + ) # delete dns zone - delete_dns_zone_cmd = 'aks approuting zone delete --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_1} --yes' - self.cmd(delete_dns_zone_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.dnsZoneResourceIds[0]', dns_zone_id_2) - ]) + delete_dns_zone_cmd = "aks approuting zone delete --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_1} --yes" + self.cmd( + delete_dns_zone_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "ingressProfile.webAppRouting.dnsZoneResourceIds[0]", dns_zone_id_2 + ), + ], + ) # delete cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait' + delete_cmd = "aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait" self.cmd(delete_cmd, checks=[self.is_empty()]) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus', preserve_default_location=True) + @AKSCustomResourceGroupPreparer( + random_name_length=17, + name_prefix="clitest", + location="eastus", + preserve_default_location=True, + ) def test_aks_approuting_zone_update(self, resource_group, resource_group_location): - """ This test case exercises updating zones to app routing addon in an AKS cluster. - """ + """This test case exercises updating zones to app routing addon in an AKS cluster.""" # reset the count so in replay mode the random names will start with 0 self.test_resources_count = 0 - aks_name = self.create_random_name('cliakstest', 16) - dns_zone_1 = self.create_random_name('cliakstest', 16) + ".com" - dns_zone_2 = self.create_random_name('cliakstest', 16) + ".com" - - self.kwargs.update({ - 'resource_group': resource_group, - 'aks_name': aks_name, - 'dns_zone_1' : dns_zone_1, - 'dns_zone_2' : dns_zone_2, - 'location': resource_group_location, - 'ssh_key_value': self.generate_ssh_keys(), - }) - - - create_dns_zone_cmd_1 = 'network dns zone create --resource-group={resource_group} --name {dns_zone_1}' - dns_zone_1 = self.cmd(create_dns_zone_cmd_1,checks=[ - self.check('name', dns_zone_1), - ]).get_output_in_json() - dns_zone_id_1 = dns_zone_1['id'] - - create_dns_zone_cmd_2 = 'network dns zone create --resource-group={resource_group} --name {dns_zone_2}' - dns_zone_2 = self.cmd(create_dns_zone_cmd_2,checks=[ - self.check('name', dns_zone_2), - ]).get_output_in_json() - dns_zone_id_2 = dns_zone_2['id'] - - self.kwargs.update({ - 'dns_zone_id_1': dns_zone_id_1, - 'dns_zone_id_2': dns_zone_id_2 - }) + aks_name = self.create_random_name("cliakstest", 16) + dns_zone_1 = self.create_random_name("cliakstest", 16) + ".com" + dns_zone_2 = self.create_random_name("cliakstest", 16) + ".com" + + self.kwargs.update( + { + "resource_group": resource_group, + "aks_name": aks_name, + "dns_zone_1": dns_zone_1, + "dns_zone_2": dns_zone_2, + "location": resource_group_location, + "ssh_key_value": self.generate_ssh_keys(), + } + ) + + create_dns_zone_cmd_1 = "network dns zone create --resource-group={resource_group} --name {dns_zone_1}" + dns_zone_1 = self.cmd( + create_dns_zone_cmd_1, + checks=[ + self.check("name", dns_zone_1), + ], + ).get_output_in_json() + dns_zone_id_1 = dns_zone_1["id"] + + create_dns_zone_cmd_2 = "network dns zone create --resource-group={resource_group} --name {dns_zone_2}" + dns_zone_2 = self.cmd( + create_dns_zone_cmd_2, + checks=[ + self.check("name", dns_zone_2), + ], + ).get_output_in_json() + dns_zone_id_2 = dns_zone_2["id"] + + self.kwargs.update( + {"dns_zone_id_1": dns_zone_id_1, "dns_zone_id_2": dns_zone_id_2} + ) # create cluster with app routing enabled - create_cmd = 'aks create --resource-group={resource_group} --name={aks_name} --location={location} ' \ - '--ssh-key-value={ssh_key_value} --enable-app-routing' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.enabled', True), - self.check('ingressProfile.webAppRouting.dnsZoneResourceIds', None) - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={aks_name} --location={location} " + "--ssh-key-value={ssh_key_value} --enable-app-routing" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("ingressProfile.webAppRouting.enabled", True), + self.check("ingressProfile.webAppRouting.dnsZoneResourceIds", None), + ], + ) # add dns zone - add_dns_zone_cmd = 'aks approuting zone add --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_1}' - self.cmd(add_dns_zone_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.dnsZoneResourceIds[0]', dns_zone_id_1), - ]) + add_dns_zone_cmd = "aks approuting zone add --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_1}" + self.cmd( + add_dns_zone_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "ingressProfile.webAppRouting.dnsZoneResourceIds[0]", dns_zone_id_1 + ), + ], + ) # update dns zone - update_dns_zone_cmd = 'aks approuting zone update --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_2}' - self.cmd(update_dns_zone_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('ingressProfile.webAppRouting.dnsZoneResourceIds[0]', dns_zone_id_2), - ]) + update_dns_zone_cmd = "aks approuting zone update --resource-group={resource_group} --name={aks_name} --ids {dns_zone_id_2}" + self.cmd( + update_dns_zone_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check( + "ingressProfile.webAppRouting.dnsZoneResourceIds[0]", dns_zone_id_2 + ), + ], + ) # delete cluster - delete_cmd = 'aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait' + delete_cmd = "aks delete --resource-group={resource_group} --name={aks_name} --yes --no-wait" self.cmd(delete_cmd, checks=[self.is_empty()]) @AllowLargeResponse() - @AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='westus2') + @AKSCustomResourceGroupPreparer( + random_name_length=17, name_prefix="clitest", location="westus2" + ) def test_aks_update_agentpool_os_sku(self, resource_group, resource_group_location): - aks_name = self.create_random_name('cliakstest', 16) - self.kwargs.update({ - 'resource_group': resource_group, - 'name': aks_name, - 'ssh_key_value': self.generate_ssh_keys(), - }) + aks_name = self.create_random_name("cliakstest", 16) + self.kwargs.update( + { + "resource_group": resource_group, + "name": aks_name, + "ssh_key_value": self.generate_ssh_keys(), + } + ) # create - create_cmd = 'aks create --resource-group={resource_group} --name={name} -c 1 ' \ - '--ssh-key-value={ssh_key_value}' - self.cmd(create_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - ]) + create_cmd = ( + "aks create --resource-group={resource_group} --name={name} -c 1 " + "--ssh-key-value={ssh_key_value}" + ) + self.cmd( + create_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + ], + ) # update nodepool - update_nodepool_cmd = 'aks nodepool update --resource-group={resource_group} --cluster-name={name} ' \ - '--name=nodepool1 --os-sku AzureLinux ' \ - '--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/OSSKUMigrationPreview' - self.cmd(update_nodepool_cmd, checks=[ - self.check('provisioningState', 'Succeeded'), - self.check('osSku', 'AzureLinux'), - ]) + update_nodepool_cmd = ( + "aks nodepool update --resource-group={resource_group} --cluster-name={name} " + "--name=nodepool1 --os-sku AzureLinux " + "--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/OSSKUMigrationPreview" + ) + self.cmd( + update_nodepool_cmd, + checks=[ + self.check("provisioningState", "Succeeded"), + self.check("osSku", "AzureLinux"), + ], + ) # delete - self.cmd('aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()]) + self.cmd( + "aks delete -g {resource_group} -n {name} --yes --no-wait", + checks=[self.is_empty()], + ) diff --git a/src/aks-preview/azext_aks_preview/tests/latest/test_helpers.py b/src/aks-preview/azext_aks_preview/tests/latest/test_helpers.py index 8db7555cb5b..2a761a3ea5c 100644 --- a/src/aks-preview/azext_aks_preview/tests/latest/test_helpers.py +++ b/src/aks-preview/azext_aks_preview/tests/latest/test_helpers.py @@ -117,6 +117,7 @@ def test_get_cluster_snapshot(self): ), self.assertRaises(BadRequestError): get_cluster_snapshot("mock_cli_ctx", "test_sub", "mock_rg", "mock_snapshot_name") + class CheckManagedClusterTestCase(unittest.TestCase): def setUp(self): # manually register CUSTOM_MGMT_AKS_PREVIEW diff --git a/src/aks-preview/azext_aks_preview/tests/latest/test_loadbalancer.py b/src/aks-preview/azext_aks_preview/tests/latest/test_loadbalancer.py index 47a76b07800..1c916ee4eee 100644 --- a/src/aks-preview/azext_aks_preview/tests/latest/test_loadbalancer.py +++ b/src/aks-preview/azext_aks_preview/tests/latest/test_loadbalancer.py @@ -7,13 +7,9 @@ from azext_aks_preview import _loadbalancer as loadbalancer from azext_aks_preview.__init__ import register_aks_preview_resource_type from azext_aks_preview._client_factory import CUSTOM_MGMT_AKS_PREVIEW -from azext_aks_preview.managed_cluster_decorator import ( - AKSPreviewManagedClusterModels, -) +from azext_aks_preview.managed_cluster_decorator import AKSPreviewManagedClusterModels from azext_aks_preview.tests.latest.mocks import MockCLI, MockCmd -from azure.cli.core.azclierror import ( - InvalidArgumentValueError, -) + class TestLoadBalancer(unittest.TestCase): def setUp(self): @@ -51,15 +47,17 @@ def test_configure_load_balancer_profile(self): profile = ManagedClusterLoadBalancerProfile() # ips -> i_ps due to track 2 naming issue - profile.managed_outbound_i_ps = ManagedClusterLoadBalancerProfileManagedOutboundIPs( - count=2 + profile.managed_outbound_i_ps = ( + ManagedClusterLoadBalancerProfileManagedOutboundIPs(count=2) ) # ips -> i_ps due to track 2 naming issue profile.outbound_i_ps = ManagedClusterLoadBalancerProfileOutboundIPs( public_i_ps="public_ips" ) - profile.outbound_ip_prefixes = ManagedClusterLoadBalancerProfileOutboundIPPrefixes( - public_ip_prefixes="public_ip_prefixes" + profile.outbound_ip_prefixes = ( + ManagedClusterLoadBalancerProfileOutboundIPPrefixes( + public_ip_prefixes="public_ip_prefixes" + ) ) p = loadbalancer.configure_load_balancer_profile( @@ -107,17 +105,18 @@ def test_configure_load_balancer_profile_error(self): profile = ManagedClusterLoadBalancerProfile() # ips -> i_ps due to track 2 naming issue - profile.managed_outbound_i_ps = ManagedClusterLoadBalancerProfileManagedOutboundIPs( - count=2 + profile.managed_outbound_i_ps = ( + ManagedClusterLoadBalancerProfileManagedOutboundIPs(count=2) ) # ips -> i_ps due to track 2 naming issue profile.outbound_i_ps = ManagedClusterLoadBalancerProfileOutboundIPs( public_i_ps="public_ips" ) - profile.outbound_ip_prefixes = ManagedClusterLoadBalancerProfileOutboundIPPrefixes( - public_ip_prefixes="public_ip_prefixes" + profile.outbound_ip_prefixes = ( + ManagedClusterLoadBalancerProfileOutboundIPPrefixes( + public_ip_prefixes="public_ip_prefixes" + ) ) - err = "outbound ip/ipprefix and managed ip should be mutual exclusive." p = loadbalancer.configure_load_balancer_profile( managed_outbound_ip_count, managed_outbound_ipv6_count, @@ -131,11 +130,18 @@ def test_configure_load_balancer_profile_error(self): ) self.assertEqual(p.managed_outbound_i_ps.count, 5) self.assertEqual(p.managed_outbound_i_ps.count_ipv6, 3) - self.assertEqual(p.outbound_i_ps.public_i_ps, [self.load_balancer_models.ResourceReference(id=x.strip()) for x in ["testpip1","testpip2"]]) + self.assertEqual( + p.outbound_i_ps.public_i_ps, + [ + self.load_balancer_models.ResourceReference(id=x.strip()) + for x in ["testpip1", "testpip2"] + ], + ) self.assertEqual(p.outbound_ip_prefixes, None) self.assertEqual(p.allocated_outbound_ports, 80) self.assertEqual(p.idle_timeout_in_minutes, 3600) self.assertEqual(p.backend_pool_type, "nodeIP") -if __name__ == '__main__': + +if __name__ == "__main__": unittest.main() diff --git a/src/aks-preview/azext_aks_preview/tests/latest/test_maintenanceconfiguration.py b/src/aks-preview/azext_aks_preview/tests/latest/test_maintenanceconfiguration.py index 422dd33eadd..11d329304b5 100644 --- a/src/aks-preview/azext_aks_preview/tests/latest/test_maintenanceconfiguration.py +++ b/src/aks-preview/azext_aks_preview/tests/latest/test_maintenanceconfiguration.py @@ -5,15 +5,15 @@ import unittest from types import SimpleNamespace -# from azure.cli.core.util import CLIError +import azext_aks_preview.maintenanceconfiguration as mc +from azext_aks_preview.__init__ import register_aks_preview_resource_type +from azure.cli.command_modules.acs.tests.latest.mocks import MockCLI, MockCmd from azure.cli.core.azclierror import ( InvalidArgumentValueError, - RequiredArgumentMissingError, MutuallyExclusiveArgumentError, + RequiredArgumentMissingError, ) -from azext_aks_preview.__init__ import register_aks_preview_resource_type -import azext_aks_preview.maintenanceconfiguration as mc -from azure.cli.command_modules.acs.tests.latest.mocks import MockCLI, MockCmd + class TestAddMaintenanceConfiguration(unittest.TestCase): def test_add_maintenance_configuration_with_invalid_name(self): @@ -24,7 +24,7 @@ def test_add_maintenance_configuration_with_invalid_name(self): "config_name": "something", } - err = ("--config-name must be one of default, aksManagedAutoUpgradeSchedule or aksManagedNodeOSUpgradeSchedule, not something") + err = "--config-name must be one of default, aksManagedAutoUpgradeSchedule or aksManagedNodeOSUpgradeSchedule, not something" with self.assertRaises(InvalidArgumentValueError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) @@ -40,11 +40,11 @@ def test_add_default_maintenance_configuration_with_schedule_type(self): "schedule_type": "Weekly", } - err = ("--schedule-type is not supported for default maintenance configuration.") + err = "--schedule-type is not supported for default maintenance configuration." with self.assertRaises(MutuallyExclusiveArgumentError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) - + def test_add_non_default_schedule_with_weekday(self): cmd = SimpleNamespace() raw_parameters = { @@ -54,11 +54,11 @@ def test_add_non_default_schedule_with_weekday(self): "weekday": "Monday", } - err = ("--weekday and --start-hour are only applicable to default maintenance configuration.") + err = "--weekday and --start-hour are only applicable to default maintenance configuration." with self.assertRaises(MutuallyExclusiveArgumentError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) - + def test_add_daily_schedule_with_missing_options(self): register_aks_preview_resource_type() cli_ctx = MockCLI() @@ -70,11 +70,11 @@ def test_add_daily_schedule_with_missing_options(self): "schedule_type": "Daily", } - err = ("Please specify --interval-days when using daily schedule.") + err = "Please specify --interval-days when using daily schedule." with self.assertRaises(RequiredArgumentMissingError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) - + def test_add_daily_schedule_with_invalid_options(self): register_aks_preview_resource_type() cli_ctx = MockCLI() @@ -88,7 +88,7 @@ def test_add_daily_schedule_with_invalid_options(self): "day_of_week": "Monday", } - err = ("--interval-weeks, --interval-months, --day-of-week, --day-of-month and --week-index cannot be used for Daily schedule.") + err = "--interval-weeks, --interval-months, --day-of-week, --day-of-month and --week-index cannot be used for Daily schedule." with self.assertRaises(MutuallyExclusiveArgumentError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) @@ -107,11 +107,11 @@ def test_add_weekly_schedule_with_invalid_options(self): "week_index": "First", } - err = ("--interval-months, --day-of-month and --week-index cannot be used for Weekly schedule.") + err = "--interval-months, --day-of-month and --week-index cannot be used for Weekly schedule." with self.assertRaises(MutuallyExclusiveArgumentError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) - + def test_add_absolute_monthly_schedule_with_missing_options(self): register_aks_preview_resource_type() cli_ctx = MockCLI() @@ -125,7 +125,7 @@ def test_add_absolute_monthly_schedule_with_missing_options(self): "interval_months": 3, } - err = ("Please specify --interval-months and --day-of-month when using absolute monthly schedule.") + err = "Please specify --interval-months and --day-of-month when using absolute monthly schedule." with self.assertRaises(RequiredArgumentMissingError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) @@ -144,11 +144,11 @@ def test_add_absolute_monthly_schedule_with_invalid_options(self): "week_index": "First", } - err = ("--interval-days, --interval-weeks, --day-of-week and --week-index cannot be used for AbsoluteMonthly schedule.") + err = "--interval-days, --interval-weeks, --day-of-week and --week-index cannot be used for AbsoluteMonthly schedule." with self.assertRaises(MutuallyExclusiveArgumentError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) - + def test_add_relative_monthly_schedule_with_missing_options(self): register_aks_preview_resource_type() cli_ctx = MockCLI() @@ -162,11 +162,11 @@ def test_add_relative_monthly_schedule_with_missing_options(self): "interval_months": 3, } - err = ("Please specify --interval-months, --day-of-week and --week-index when using relative monthly schedule.") + err = "Please specify --interval-months, --day-of-week and --week-index when using relative monthly schedule." with self.assertRaises(RequiredArgumentMissingError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) - + def test_add_dedicated_schedule_with_missing_options(self): register_aks_preview_resource_type() cli_ctx = MockCLI() @@ -181,8 +181,7 @@ def test_add_dedicated_schedule_with_missing_options(self): "start_time": "00:00", } - err = ("Please specify --duration for maintenance window.") + err = "Please specify --duration for maintenance window." with self.assertRaises(RequiredArgumentMissingError) as cm: mc.aks_maintenanceconfiguration_update_internal(cmd, None, raw_parameters) self.assertEqual(str(cm.exception), err) - \ No newline at end of file diff --git a/src/aks-preview/azext_aks_preview/tests/latest/test_managed_cluster_decorator.py b/src/aks-preview/azext_aks_preview/tests/latest/test_managed_cluster_decorator.py index d44c54d8ceb..8e498ad64d8 100644 --- a/src/aks-preview/azext_aks_preview/tests/latest/test_managed_cluster_decorator.py +++ b/src/aks-preview/azext_aks_preview/tests/latest/test_managed_cluster_decorator.py @@ -15,7 +15,11 @@ CONST_ACC_SGX_QUOTE_HELPER_ENABLED, CONST_AZURE_KEYVAULT_SECRETS_PROVIDER_ADDON_NAME, CONST_AZURE_POLICY_ADDON_NAME, + CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_COMPLETE, + CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_ROLLBACK, + CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_START, CONST_CONFCOM_ADDON_NAME, + CONST_CUSTOM_CA_TEST_CERT, CONST_DEFAULT_NODE_OS_TYPE, CONST_DEFAULT_NODE_VM_SIZE, CONST_DISK_DRIVER_V2, @@ -28,8 +32,8 @@ CONST_INGRESS_APPGW_SUBNET_ID, CONST_INGRESS_APPGW_WATCH_NAMESPACE, CONST_KUBE_DASHBOARD_ADDON_NAME, - CONST_LOAD_BALANCER_SKU_STANDARD, CONST_LOAD_BALANCER_BACKEND_POOL_TYPE_NODE_IP, + CONST_LOAD_BALANCER_SKU_STANDARD, CONST_MONITORING_ADDON_NAME, CONST_MONITORING_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID, CONST_MONITORING_USING_AAD_MSI_AUTH, @@ -43,10 +47,6 @@ CONST_VIRTUAL_NODE_ADDON_NAME, CONST_VIRTUAL_NODE_SUBNET_NAME, CONST_WORKLOAD_RUNTIME_OCI_CONTAINER, - CONST_CUSTOM_CA_TEST_CERT, - CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_START, - CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_COMPLETE, - CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_ROLLBACK, ) from azext_aks_preview.agentpool_decorator import AKSPreviewAgentPoolContext from azext_aks_preview.managed_cluster_decorator import ( @@ -77,8 +77,6 @@ RequiredArgumentMissingError, UnknownError, ) - -from azure.cli.core.util import read_file_content from dateutil.parser import parse @@ -97,8 +95,10 @@ def test_models(self): sdk_profile = AZURE_API_PROFILES["latest"][CUSTOM_MGMT_AKS_PREVIEW] api_version = sdk_profile.default_api_version - module_name = "azext_aks_preview.vendored_sdks.azure_mgmt_preview_aks.v{}.models".format( - api_version.replace("-", "_") + module_name = ( + "azext_aks_preview.vendored_sdks.azure_mgmt_preview_aks.v{}.models".format( + api_version.replace("-", "_") + ) ) module = importlib.import_module(module_name) @@ -121,7 +121,9 @@ def setUp(self): self.cmd = MockCmd(self.cli_ctx) self.models = AKSPreviewManagedClusterModels(self.cmd, CUSTOM_MGMT_AKS_PREVIEW) - def create_attach_agentpool_context(self, ctx: AKSPreviewManagedClusterContext, **kwargs): + def create_attach_agentpool_context( + self, ctx: AKSPreviewManagedClusterContext, **kwargs + ): """Helper function to create an AKSPreviewAgentPoolContext based on AKSPreviewManagedClusterContext and attach it to the given context. @@ -145,14 +147,18 @@ def test_validate_pod_identity_with_kubenet(self): self.models, decorator_mode=DecoratorMode.CREATE, ) - network_profile_1 = self.models.ContainerServiceNetworkProfile(network_plugin="kubenet") + network_profile_1 = self.models.ContainerServiceNetworkProfile( + network_plugin="kubenet" + ) mc_1 = self.models.ManagedCluster( location="test_location", network_profile=network_profile_1, ) # fail on enable_pod_identity_with_kubenet not specified with self.assertRaises(RequiredArgumentMissingError): - ctx_1._AKSPreviewManagedClusterContext__validate_pod_identity_with_kubenet(mc_1, True, False) + ctx_1._AKSPreviewManagedClusterContext__validate_pod_identity_with_kubenet( + mc_1, True, False + ) def test_get_addon_consts(self): # default @@ -201,7 +207,9 @@ def test_get_http_proxy_config(self): self.assertEqual(ctx_1.get_http_proxy_config(), None) mc = self.models.ManagedCluster( location="test_location", - http_proxy_config=self.models.ManagedClusterHTTPProxyConfig(http_proxy="test_http_proxy"), + http_proxy_config=self.models.ManagedClusterHTTPProxyConfig( + http_proxy="test_http_proxy" + ), ) ctx_1.attach_mc(mc) self.assertEqual( @@ -223,7 +231,9 @@ def test_get_http_proxy_config(self): # custom value ctx_3 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({"http_proxy_config": get_test_data_file_path("invalidconfig.json")}), + AKSManagedClusterParamDict( + {"http_proxy_config": get_test_data_file_path("invalidconfig.json")} + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -236,7 +246,7 @@ def test_get_guardrails_level(self): self.cmd, AKSManagedClusterParamDict({"guardrails_level": None}), self.models, - decorator_mode=DecoratorMode.CREATE + decorator_mode=DecoratorMode.CREATE, ) self.assertEqual(ctx1.get_guardrails_level(), None) @@ -244,11 +254,13 @@ def test_get_guardrails_level(self): self.cmd, AKSManagedClusterParamDict({"guardrails_level": "Warning"}), self.models, - decorator_mode=DecoratorMode.CREATE + decorator_mode=DecoratorMode.CREATE, ) mc2 = self.models.ManagedCluster( location="test_location", - guardrails_profile=self.models.GuardrailsProfile(level="Warning", excluded_namespaces=None, version="") + guardrails_profile=self.models.GuardrailsProfile( + level="Warning", excluded_namespaces=None, version="" + ), ) ctx2.attach_mc(mc2) self.assertEqual(ctx2.get_guardrails_level(), "Warning") @@ -258,7 +270,7 @@ def test_get_guardrails_version(self): self.cmd, AKSManagedClusterParamDict({"guardrails_version": None}), self.models, - decorator_mode=DecoratorMode.CREATE + decorator_mode=DecoratorMode.CREATE, ) self.assertEqual(ctx1.get_guardrails_version(), None) @@ -266,12 +278,14 @@ def test_get_guardrails_version(self): self.cmd, AKSManagedClusterParamDict({"guardrails_version": "v1.0.0"}), self.models, - decorator_mode=DecoratorMode.CREATE + decorator_mode=DecoratorMode.CREATE, ) mc2 = self.models.ManagedCluster( location="test_location", - guardrails_profile=self.models.GuardrailsProfile(version="v1.0.0", level=None, excluded_namespaces=None) + guardrails_profile=self.models.GuardrailsProfile( + version="v1.0.0", level=None, excluded_namespaces=None + ), ) ctx2.attach_mc(mc2) self.assertEqual(ctx2.get_guardrails_version(), "v1.0.0") @@ -281,7 +295,7 @@ def test_get_guardrails_excluded_namespaces(self): self.cmd, AKSManagedClusterParamDict({"guardrails_excluded_ns": None}), self.models, - decorator_mode=DecoratorMode.CREATE + decorator_mode=DecoratorMode.CREATE, ) self.assertEqual(ctx1.get_guardrails_excluded_namespaces(), None) @@ -289,12 +303,14 @@ def test_get_guardrails_excluded_namespaces(self): self.cmd, AKSManagedClusterParamDict({"guardrails_excluded_ns": "ns1,ns2"}), self.models, - decorator_mode=DecoratorMode.CREATE + decorator_mode=DecoratorMode.CREATE, ) mc2 = self.models.ManagedCluster( location="test_location", - guardrails_profile=self.models.GuardrailsProfile(excluded_namespaces=["ns1","ns2"], level=None, version=None) + guardrails_profile=self.models.GuardrailsProfile( + excluded_namespaces=["ns1", "ns2"], level=None, version=None + ), ) ctx2.attach_mc(mc2) self.assertEqual(ctx2.get_guardrails_excluded_namespaces(), "ns1,ns2") @@ -310,12 +326,18 @@ def test_get_kube_proxy_config(self): self.assertEqual(ctx_1.get_kube_proxy_config(), None) mc = self.models.ManagedCluster( location="test_location", - network_profile=self.models.ContainerServiceNetworkProfile(kube_proxy_config=self.models.ContainerServiceNetworkProfileKubeProxyConfig(kube_proxy="test_kube_proxy")), + network_profile=self.models.ContainerServiceNetworkProfile( + kube_proxy_config=self.models.ContainerServiceNetworkProfileKubeProxyConfig( + kube_proxy="test_kube_proxy" + ) + ), ) ctx_1.attach_mc(mc) self.assertEqual( ctx_1.get_kube_proxy_config(), - self.models.ContainerServiceNetworkProfileKubeProxyConfig(kube_proxy="test_kube_proxy"), + self.models.ContainerServiceNetworkProfileKubeProxyConfig( + kube_proxy="test_kube_proxy" + ), ) # custom value @@ -332,7 +354,9 @@ def test_get_kube_proxy_config(self): # custom value ctx_3 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({"kube_proxy_config": get_test_data_file_path("invalidconfig.json")}), + AKSManagedClusterParamDict( + {"kube_proxy_config": get_test_data_file_path("invalidconfig.json")} + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -343,7 +367,9 @@ def test_get_kube_proxy_config(self): # custom value ctx_4 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({"kube_proxy_config": get_test_data_file_path("kubeproxyconfig.json")}), + AKSManagedClusterParamDict( + {"kube_proxy_config": get_test_data_file_path("kubeproxyconfig.json")} + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -356,7 +382,13 @@ def test_get_kube_proxy_config(self): # update case ctx_5 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({"kube_proxy_config": get_test_data_file_path("kubeproxyconfig_update.json")}), + AKSManagedClusterParamDict( + { + "kube_proxy_config": get_test_data_file_path( + "kubeproxyconfig_update.json" + ) + } + ), self.models, decorator_mode=DecoratorMode.UPDATE, ) @@ -364,12 +396,15 @@ def test_get_kube_proxy_config(self): # existing cluster mc_5 = self.models.ManagedCluster( location="test_location", - network_profile=self.models.ContainerServiceNetworkProfile(kube_proxy_config=self.models.ContainerServiceNetworkProfileKubeProxyConfig( - enabled=True, - mode="IPTABLES", - ipvs_config=self.models.ContainerServiceNetworkProfileKubeProxyConfigIpvsConfig( - scheduler="RoundRobin", - ))), + network_profile=self.models.ContainerServiceNetworkProfile( + kube_proxy_config=self.models.ContainerServiceNetworkProfileKubeProxyConfig( + enabled=True, + mode="IPTABLES", + ipvs_config=self.models.ContainerServiceNetworkProfileKubeProxyConfigIpvsConfig( + scheduler="RoundRobin", + ), + ) + ), ) ctx_5.attach_mc(mc_5) config_5 = ctx_5.get_kube_proxy_config() @@ -388,7 +423,9 @@ def test_get_pod_cidrs(self): self.assertEqual(ctx_1.get_pod_cidrs(), None) mc = self.models.ManagedCluster( location="test_location", - network_profile=self.models.ContainerServiceNetworkProfile(pod_cidrs="test_pod_cidrs"), + network_profile=self.models.ContainerServiceNetworkProfile( + pod_cidrs="test_pod_cidrs" + ), ) ctx_1.attach_mc(mc) self.assertEqual( @@ -423,7 +460,9 @@ def test_get_service_cidrs(self): self.assertEqual(ctx_1.get_service_cidrs(), None) mc = self.models.ManagedCluster( location="test_location", - network_profile=self.models.ContainerServiceNetworkProfile(service_cidrs="test_service_cidrs"), + network_profile=self.models.ContainerServiceNetworkProfile( + service_cidrs="test_service_cidrs" + ), ) ctx_1.attach_mc(mc) self.assertEqual( @@ -441,7 +480,9 @@ def test_get_service_cidrs(self): ctx_3 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({"service_cidrs": "10.244.0.0/16,2001:abcd::/64"}), + AKSManagedClusterParamDict( + {"service_cidrs": "10.244.0.0/16,2001:abcd::/64"} + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -458,7 +499,9 @@ def test_get_ip_families(self): self.assertEqual(ctx_1.get_ip_families(), None) mc = self.models.ManagedCluster( location="test_location", - network_profile=self.models.ContainerServiceNetworkProfile(ip_families="test_ip_families"), + network_profile=self.models.ContainerServiceNetworkProfile( + ip_families="test_ip_families" + ), ) ctx_1.attach_mc(mc) self.assertEqual( @@ -500,8 +543,12 @@ def test_get_load_balancer_managed_outbound_ip_count(self): count=10 ) ) - network_profile = self.models.ContainerServiceNetworkProfile(load_balancer_profile=load_balancer_profile) - mc = self.models.ManagedCluster(location="test_location", network_profile=network_profile) + network_profile = self.models.ContainerServiceNetworkProfile( + load_balancer_profile=load_balancer_profile + ) + mc = self.models.ManagedCluster( + location="test_location", network_profile=network_profile + ) ctx_1.attach_mc(mc) self.assertEqual(ctx_1.get_load_balancer_managed_outbound_ip_count(), None) @@ -523,14 +570,26 @@ def test_get_load_balancer_managed_outbound_ip_count(self): count=10, count_ipv6=20 ), outbound_i_ps=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPs( - public_i_ps=[self.models.load_balancer_models.ResourceReference(id="test_public_ip")] + public_i_ps=[ + self.models.load_balancer_models.ResourceReference( + id="test_public_ip" + ) + ] ), outbound_ip_prefixes=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPPrefixes( - public_ip_prefixes=[self.models.load_balancer_models.ResourceReference(id="test_public_ip_prefix")] + public_ip_prefixes=[ + self.models.load_balancer_models.ResourceReference( + id="test_public_ip_prefix" + ) + ] ), ) - network_profile_2 = self.models.ContainerServiceNetworkProfile(load_balancer_profile=load_balancer_profile_2) - mc_2 = self.models.ManagedCluster(location="test_location", network_profile=network_profile_2) + network_profile_2 = self.models.ContainerServiceNetworkProfile( + load_balancer_profile=load_balancer_profile_2 + ) + mc_2 = self.models.ManagedCluster( + location="test_location", network_profile=network_profile_2 + ) ctx_2.attach_mc(mc_2) self.assertEqual(ctx_2.get_load_balancer_managed_outbound_ip_count(), None) @@ -552,15 +611,21 @@ def test_get_load_balancer_managed_outbound_ipv6_count(self): count_ipv6=10 ) ) - network_profile = self.models.ContainerServiceNetworkProfile(load_balancer_profile=load_balancer_profile) - mc = self.models.ManagedCluster(location="test_location", network_profile=network_profile) + network_profile = self.models.ContainerServiceNetworkProfile( + load_balancer_profile=load_balancer_profile + ) + mc = self.models.ManagedCluster( + location="test_location", network_profile=network_profile + ) ctx_1.attach_mc(mc) self.assertEqual(ctx_1.get_load_balancer_managed_outbound_ipv6_count(), None) # custom value ctx_2 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({"load_balancer_managed_outbound_ipv6_count": 0}), + AKSManagedClusterParamDict( + {"load_balancer_managed_outbound_ipv6_count": 0} + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -584,14 +649,26 @@ def test_get_load_balancer_managed_outbound_ipv6_count(self): count=10, count_ipv6=20 ), outbound_i_ps=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPs( - public_i_ps=[self.models.load_balancer_models.ResourceReference(id="test_public_ip")] + public_i_ps=[ + self.models.load_balancer_models.ResourceReference( + id="test_public_ip" + ) + ] ), outbound_ip_prefixes=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPPrefixes( - public_ip_prefixes=[self.models.load_balancer_models.ResourceReference(id="test_public_ip_prefix")] + public_ip_prefixes=[ + self.models.load_balancer_models.ResourceReference( + id="test_public_ip_prefix" + ) + ] ), ) - network_profile_3 = self.models.ContainerServiceNetworkProfile(load_balancer_profile=load_balancer_profile_3) - mc_3 = self.models.ManagedCluster(location="test_location", network_profile=network_profile_3) + network_profile_3 = self.models.ContainerServiceNetworkProfile( + load_balancer_profile=load_balancer_profile_3 + ) + mc_3 = self.models.ManagedCluster( + location="test_location", network_profile=network_profile_3 + ) ctx_3.attach_mc(mc_3) self.assertEqual(ctx_3.get_load_balancer_managed_outbound_ipv6_count(), None) @@ -608,7 +685,6 @@ def test_get_load_balancer_backend_pool_type(self): ) self.assertEqual(ctx.get_load_balancer_backend_pool_type(), "nodeIP") - def test_get_enable_pod_security_policy(self): # default ctx_1 = AKSPreviewManagedClusterContext( @@ -686,8 +762,12 @@ def test_get_network_plugin(self): DecoratorMode.CREATE, ) self.assertEqual(ctx_1.get_network_plugin(), None) - network_profile_1 = self.models.ContainerServiceNetworkProfile(network_plugin="test_network_plugin") - mc = self.models.ManagedCluster(location="test_location", network_profile=network_profile_1) + network_profile_1 = self.models.ContainerServiceNetworkProfile( + network_plugin="test_network_plugin" + ) + mc = self.models.ManagedCluster( + location="test_location", network_profile=network_profile_1 + ) ctx_1.attach_mc(mc) self.assertEqual(ctx_1.get_network_plugin(), "test_network_plugin") @@ -846,7 +926,7 @@ def test_mc_get_enable_cilium_dataplane(self): self.models, decorator_mode=DecoratorMode.CREATE, ) - self.assertEqual(ctx_1.get_enable_cilium_dataplane(), False) + self.assertEqual(ctx_3.get_enable_cilium_dataplane(), False) def test_mc_get_enable_network_observability(self): # Default, not set. @@ -917,7 +997,9 @@ def test_get_enable_managed_identity(self): # custom value ctx_1 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({"enable_managed_identity": False, "enable_pod_identity": True}), + AKSManagedClusterParamDict( + {"enable_managed_identity": False, "enable_pod_identity": True} + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -949,7 +1031,11 @@ def test_get_enable_pod_identity(self): decorator_mode=DecoratorMode.CREATE, ) self.assertEqual(ctx_1.get_enable_pod_identity(), False) - pod_identity_profile = self.models.pod_identity_models.ManagedClusterPodIdentityProfile(enabled=True) + pod_identity_profile = ( + self.models.pod_identity_models.ManagedClusterPodIdentityProfile( + enabled=True + ) + ) mc = self.models.ManagedCluster( location="test_location", pod_identity_profile=pod_identity_profile, @@ -972,7 +1058,9 @@ def test_get_enable_pod_identity(self): self.models, decorator_mode=DecoratorMode.CREATE, ) - network_profile_2 = self.models.ContainerServiceNetworkProfile(network_plugin="kubenet") + network_profile_2 = self.models.ContainerServiceNetworkProfile( + network_plugin="kubenet" + ) mc_2 = self.models.ManagedCluster( location="test_location", network_profile=network_profile_2, @@ -1055,9 +1143,11 @@ def test_get_enable_pod_identity_with_kubenet(self): decorator_mode=DecoratorMode.CREATE, ) self.assertEqual(ctx_1.get_enable_pod_identity_with_kubenet(), False) - pod_identity_profile = self.models.pod_identity_models.ManagedClusterPodIdentityProfile( - enabled=True, - allow_network_plugin_kubenet=True, + pod_identity_profile = ( + self.models.pod_identity_models.ManagedClusterPodIdentityProfile( + enabled=True, + allow_network_plugin_kubenet=True, + ) ) mc = self.models.ManagedCluster( location="test_location", @@ -1081,7 +1171,9 @@ def test_get_enable_pod_identity_with_kubenet(self): self.models, decorator_mode=DecoratorMode.CREATE, ) - network_profile_2 = self.models.ContainerServiceNetworkProfile(network_plugin="kubenet") + network_profile_2 = self.models.ContainerServiceNetworkProfile( + network_plugin="kubenet" + ) mc_2 = self.models.ManagedCluster( location="test_location", network_profile=network_profile_2, @@ -1093,7 +1185,10 @@ def test_get_enable_pod_identity_with_kubenet(self): def test_get_oidc_issuer_profile__create_not_set(self): ctx = AKSPreviewManagedClusterContext( - self.cmd, AKSManagedClusterParamDict({}), self.models, decorator_mode=DecoratorMode.CREATE + self.cmd, + AKSManagedClusterParamDict({}), + self.models, + decorator_mode=DecoratorMode.CREATE, ) self.assertIsNone(ctx.get_oidc_issuer_profile()) @@ -1114,7 +1209,10 @@ def test_get_oidc_issuer_profile__create_enable(self): def test_get_oidc_issuer_profile__update_not_set(self): ctx = AKSPreviewManagedClusterContext( - self.cmd, AKSManagedClusterParamDict({}), self.models, decorator_mode=DecoratorMode.UPDATE + self.cmd, + AKSManagedClusterParamDict({}), + self.models, + decorator_mode=DecoratorMode.UPDATE, ) ctx.attach_mc(self.models.ManagedCluster(location="test_location")) self.assertIsNone(ctx.get_oidc_issuer_profile()) @@ -1123,10 +1221,15 @@ def test_get_oidc_issuer_profile__update_not_set_with_previous_profile( self, ): ctx = AKSPreviewManagedClusterContext( - self.cmd, AKSManagedClusterParamDict({}), self.models, decorator_mode=DecoratorMode.UPDATE + self.cmd, + AKSManagedClusterParamDict({}), + self.models, + decorator_mode=DecoratorMode.UPDATE, ) mc = self.models.ManagedCluster(location="test_location") - mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile(enabled=True) + mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile( + enabled=True + ) ctx.attach_mc(self.models.ManagedCluster(location="test_location")) self.assertIsNone(ctx.get_oidc_issuer_profile()) @@ -1140,7 +1243,9 @@ def test_get_oidc_issuer_profile__update_enable_with_previous_profile( decorator_mode=DecoratorMode.UPDATE, ) mc = self.models.ManagedCluster(location="test_location") - mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile(enabled=False) + mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile( + enabled=False + ) ctx.attach_mc(mc) profile = ctx.get_oidc_issuer_profile() self.assertIsNotNone(profile) @@ -1164,7 +1269,10 @@ def test_get_oidc_issuer_profile__update_enable(self): def test_get_workload_identity_profile__create_no_set(self): ctx = AKSPreviewManagedClusterContext( - self.cmd, AKSManagedClusterParamDict({}), self.models, decorator_mode=DecoratorMode.CREATE + self.cmd, + AKSManagedClusterParamDict({}), + self.models, + decorator_mode=DecoratorMode.CREATE, ) self.assertIsNone(ctx.get_workload_identity_profile()) @@ -1199,7 +1307,10 @@ def test_get_workload_identity_profile__create_enable_with_oidc_issuer(self): def test_get_workload_identity_profile__update_not_set(self): ctx = AKSPreviewManagedClusterContext( - self.cmd, AKSManagedClusterParamDict({}), self.models, decorator_mode=DecoratorMode.UPDATE + self.cmd, + AKSManagedClusterParamDict({}), + self.models, + decorator_mode=DecoratorMode.UPDATE, ) ctx.attach_mc(self.models.ManagedCluster(location="test_location")) self.assertIsNone(ctx.get_workload_identity_profile()) @@ -1213,13 +1324,16 @@ def test_get_workload_identity_profile__update_with_enable_and_disable(self): "disable_workload_identity": True, } ), - self.models, decorator_mode=DecoratorMode.UPDATE + self.models, + decorator_mode=DecoratorMode.UPDATE, ) ctx.attach_mc(self.models.ManagedCluster(location="test_location")) with self.assertRaises(MutuallyExclusiveArgumentError): ctx.get_workload_identity_profile() - def test_get_workload_identity_profile__update_with_enable_without_oidc_issuer(self): + def test_get_workload_identity_profile__update_with_enable_without_oidc_issuer( + self, + ): ctx = AKSPreviewManagedClusterContext( self.cmd, AKSManagedClusterParamDict( @@ -1251,7 +1365,9 @@ def test_get_workload_identity_profile__update_with_enable(self): decorator_mode=DecoratorMode.UPDATE, ) mc = self.models.ManagedCluster(location="test_location") - mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile(enabled=True) + mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile( + enabled=True + ) if previous_enablement_status is None: mc.security_profile = None else: @@ -1281,7 +1397,9 @@ def test_get_workload_identity_profile__update_with_disable(self): decorator_mode=DecoratorMode.UPDATE, ) mc = self.models.ManagedCluster(location="test_location") - mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile(enabled=True) + mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile( + enabled=True + ) if previous_enablement_status is None: mc.security_profile = None else: @@ -1393,7 +1511,6 @@ def test_get_image_cleaner_interval_hours(self): ) self.assertIsNone(ctx_0.get_image_cleaner_interval_hours()) - ctx_1 = AKSPreviewManagedClusterContext( self.cmd, AKSManagedClusterParamDict( @@ -1431,9 +1548,11 @@ def test_get_image_cleaner_interval_hours(self): decorator_mode=DecoratorMode.UPDATE, ) security_profile = self.models.ManagedClusterSecurityProfile() - security_profile.image_cleaner = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=True, - interval_hours=25, + security_profile.image_cleaner = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=True, + interval_hours=25, + ) ) mc = self.models.ManagedCluster( location="test_location", @@ -1453,9 +1572,11 @@ def test_get_image_cleaner_interval_hours(self): decorator_mode=DecoratorMode.UPDATE, ) security_profile = self.models.ManagedClusterSecurityProfile() - security_profile.image_cleaner = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=False, - interval_hours=25, + security_profile.image_cleaner = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=False, + interval_hours=25, + ) ) mc = self.models.ManagedCluster( location="test_location", @@ -1501,7 +1622,9 @@ def test_get_enable_azure_keyvault_kms(self): ) self.assertEqual(ctx_1.get_enable_azure_keyvault_kms(), False) - key_id_1 = "https://fakekeyvault.vault.azure.net/secrets/fakekeyname/fakekeyversion" + key_id_1 = ( + "https://fakekeyvault.vault.azure.net/secrets/fakekeyname/fakekeyversion" + ) ctx_2 = AKSPreviewManagedClusterContext( self.cmd, AKSManagedClusterParamDict( @@ -1628,7 +1751,9 @@ def test_get_azure_keyvault_kms_key_id(self): ) self.assertIsNone(ctx_0.get_azure_keyvault_kms_key_id()) - key_id_1 = "https://fakekeyvault.vault.azure.net/secrets/fakekeyname/fakekeyversion" + key_id_1 = ( + "https://fakekeyvault.vault.azure.net/secrets/fakekeyname/fakekeyversion" + ) ctx_1 = AKSPreviewManagedClusterContext( self.cmd, AKSManagedClusterParamDict( @@ -1653,7 +1778,9 @@ def test_get_azure_keyvault_kms_key_id(self): self.models, decorator_mode=DecoratorMode.CREATE, ) - key_id_2 = "https://fakekeyvault2.vault.azure.net/secrets/fakekeyname2/fakekeyversion2" + key_id_2 = ( + "https://fakekeyvault2.vault.azure.net/secrets/fakekeyname2/fakekeyversion2" + ) security_profile = self.models.ManagedClusterSecurityProfile() security_profile.azure_key_vault_kms = self.models.AzureKeyVaultKms( enabled=True, @@ -1731,9 +1858,11 @@ def test_get_azure_keyvault_kms_key_vault_network_access(self): ctx_1 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_1, - }), + AKSManagedClusterParamDict( + { + "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_1, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1742,10 +1871,12 @@ def test_get_azure_keyvault_kms_key_vault_network_access(self): ctx_2 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": False, - "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_1, - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": False, + "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_1, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1754,21 +1885,28 @@ def test_get_azure_keyvault_kms_key_vault_network_access(self): ctx_3 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_1, - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_1, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) - self.assertEqual(ctx_3.get_azure_keyvault_kms_key_vault_network_access(), key_vault_network_access_1) + self.assertEqual( + ctx_3.get_azure_keyvault_kms_key_vault_network_access(), + key_vault_network_access_1, + ) ctx_4 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_2, - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_2, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1777,23 +1915,30 @@ def test_get_azure_keyvault_kms_key_vault_network_access(self): ctx_5 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_2, - "azure_keyvault_kms_key_vault_resource_id": "fake-resource-id", - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_2, + "azure_keyvault_kms_key_vault_resource_id": "fake-resource-id", + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) - self.assertEqual(ctx_5.get_azure_keyvault_kms_key_vault_network_access(), key_vault_network_access_2) + self.assertEqual( + ctx_5.get_azure_keyvault_kms_key_vault_network_access(), + key_vault_network_access_2, + ) ctx_6 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_2, - "azure_keyvault_kms_key_vault_resource_id": "fake-resource-id", - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": key_vault_network_access_2, + "azure_keyvault_kms_key_vault_resource_id": "fake-resource-id", + } + ), self.models, decorator_mode=DecoratorMode.UPDATE, ) @@ -1807,7 +1952,10 @@ def test_get_azure_keyvault_kms_key_vault_network_access(self): security_profile=security_profile, ) ctx_6.attach_mc(mc) - self.assertEqual(ctx_6.get_azure_keyvault_kms_key_vault_network_access(), key_vault_network_access_2) + self.assertEqual( + ctx_6.get_azure_keyvault_kms_key_vault_network_access(), + key_vault_network_access_2, + ) def test_get_azure_keyvault_kms_key_vault_resource_id(self): key_vault_resource_id_1 = "/subscriptions/8ecadfc9-d1a3-4ea4-b844-0d9f87e4d7c8/resourceGroups/foo/providers/Microsoft.KeyVault/vaults/foo" @@ -1823,10 +1971,12 @@ def test_get_azure_keyvault_kms_key_vault_resource_id(self): ctx_1 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": "Public", - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": "Public", + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1834,11 +1984,13 @@ def test_get_azure_keyvault_kms_key_vault_resource_id(self): ctx_2 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": "Public", - "azure_keyvault_kms_key_vault_resource_id": "", - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": "Public", + "azure_keyvault_kms_key_vault_resource_id": "", + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1846,23 +1998,30 @@ def test_get_azure_keyvault_kms_key_vault_resource_id(self): ctx_3 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": "Private", - "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": "Private", + "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) - self.assertEqual(ctx_3.get_azure_keyvault_kms_key_vault_resource_id(), key_vault_resource_id_1) + self.assertEqual( + ctx_3.get_azure_keyvault_kms_key_vault_resource_id(), + key_vault_resource_id_1, + ) ctx_4 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": "Private", - "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": "Private", + "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1877,15 +2036,20 @@ def test_get_azure_keyvault_kms_key_vault_resource_id(self): security_profile=security_profile, ) ctx_4.attach_mc(mc) - self.assertEqual(ctx_4.get_azure_keyvault_kms_key_vault_resource_id(), key_vault_resource_id_2) + self.assertEqual( + ctx_4.get_azure_keyvault_kms_key_vault_resource_id(), + key_vault_resource_id_2, + ) ctx_5 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": "Private", - "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_2, - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": "Private", + "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_2, + } + ), self.models, decorator_mode=DecoratorMode.UPDATE, ) @@ -1900,13 +2064,18 @@ def test_get_azure_keyvault_kms_key_vault_resource_id(self): security_profile=security_profile, ) ctx_5.attach_mc(mc) - self.assertEqual(ctx_5.get_azure_keyvault_kms_key_vault_resource_id(), key_vault_resource_id_2) + self.assertEqual( + ctx_5.get_azure_keyvault_kms_key_vault_resource_id(), + key_vault_resource_id_2, + ) ctx_6 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, - }), + AKSManagedClusterParamDict( + { + "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1915,10 +2084,12 @@ def test_get_azure_keyvault_kms_key_vault_resource_id(self): ctx_7 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": False, - "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": False, + "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1927,11 +2098,13 @@ def test_get_azure_keyvault_kms_key_vault_resource_id(self): ctx_8 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": "Public", - "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": "Public", + "azure_keyvault_kms_key_vault_resource_id": key_vault_resource_id_1, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1940,11 +2113,13 @@ def test_get_azure_keyvault_kms_key_vault_resource_id(self): ctx_9 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_azure_keyvault_kms": True, - "azure_keyvault_kms_key_vault_network_access": "Private", - "azure_keyvault_kms_key_vault_resource_id": "", - }), + AKSManagedClusterParamDict( + { + "enable_azure_keyvault_kms": True, + "azure_keyvault_kms_key_vault_network_access": "Private", + "azure_keyvault_kms_key_vault_resource_id": "", + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -1964,8 +2139,12 @@ def test_get_cluster_snapshot_id(self): decorator_mode=DecoratorMode.CREATE, ) self.assertEqual(ctx_1.get_cluster_snapshot_id(), None) - creation_data = self.models.CreationData(source_resource_id="test_source_resource_id") - agent_pool_profile = self.models.ManagedClusterAgentPoolProfile(name="test_nodepool_name") + creation_data = self.models.CreationData( + source_resource_id="test_source_resource_id" + ) + agent_pool_profile = self.models.ManagedClusterAgentPoolProfile( + name="test_nodepool_name" + ) mc = self.models.ManagedCluster( location="test_location", agent_pool_profiles=[agent_pool_profile], @@ -2005,14 +2184,18 @@ def test_get_kubernetes_version(self): ) self.create_attach_agentpool_context(ctx_1) self.assertEqual(ctx_1.get_kubernetes_version(), "") - mc_1 = self.models.ManagedCluster(location="test_location", kubernetes_version="test_kubernetes_version") + mc_1 = self.models.ManagedCluster( + location="test_location", kubernetes_version="test_kubernetes_version" + ) ctx_1.attach_mc(mc_1) self.assertEqual(ctx_1.get_kubernetes_version(), "test_kubernetes_version") # custom value ctx_2 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({"kubernetes_version": "", "snapshot_id": "test_snapshot_id"}), + AKSManagedClusterParamDict( + {"kubernetes_version": "", "snapshot_id": "test_snapshot_id"} + ), self.models, DecoratorMode.CREATE, ) @@ -2042,7 +2225,9 @@ def test_get_kubernetes_version(self): "azext_aks_preview.agentpool_decorator.get_nodepool_snapshot_by_snapshot_id", return_value=mock_snapshot, ): - self.assertEqual(ctx_3.get_kubernetes_version(), "custom_kubernetes_version") + self.assertEqual( + ctx_3.get_kubernetes_version(), "custom_kubernetes_version" + ) # custom value ctx_4 = AKSPreviewManagedClusterContext( @@ -2058,9 +2243,15 @@ def test_get_kubernetes_version(self): decorator_mode=DecoratorMode.CREATE, ) self.create_attach_agentpool_context(ctx_4) - mock_snapshot = Mock(managed_cluster_properties_read_only=Mock(kubernetes_version="test_kubernetes_version")) + mock_snapshot = Mock( + managed_cluster_properties_read_only=Mock( + kubernetes_version="test_kubernetes_version" + ) + ) mock_mc_snapshot = Mock( - managed_cluster_properties_read_only=Mock(kubernetes_version="test_cluster_kubernetes_version") + managed_cluster_properties_read_only=Mock( + kubernetes_version="test_cluster_kubernetes_version" + ) ) with patch( "azext_aks_preview.agentpool_decorator.get_nodepool_snapshot_by_snapshot_id", @@ -2069,7 +2260,9 @@ def test_get_kubernetes_version(self): "azext_aks_preview.managed_cluster_decorator.get_cluster_snapshot_by_snapshot_id", return_value=mock_mc_snapshot, ): - self.assertEqual(ctx_4.get_kubernetes_version(), "test_cluster_kubernetes_version") + self.assertEqual( + ctx_4.get_kubernetes_version(), "test_cluster_kubernetes_version" + ) # custom value ctx_5 = AKSPreviewManagedClusterContext( @@ -2085,9 +2278,15 @@ def test_get_kubernetes_version(self): decorator_mode=DecoratorMode.CREATE, ) self.create_attach_agentpool_context(ctx_5) - mock_snapshot = Mock(managed_cluster_properties_read_only=Mock(kubernetes_version="test_kubernetes_version")) + mock_snapshot = Mock( + managed_cluster_properties_read_only=Mock( + kubernetes_version="test_kubernetes_version" + ) + ) mock_mc_snapshot = Mock( - managed_cluster_properties_read_only=Mock(kubernetes_version="test_cluster_kubernetes_version") + managed_cluster_properties_read_only=Mock( + kubernetes_version="test_cluster_kubernetes_version" + ) ) with patch( "azext_aks_preview.agentpool_decorator.get_nodepool_snapshot_by_snapshot_id", @@ -2096,7 +2295,9 @@ def test_get_kubernetes_version(self): "azext_aks_preview.managed_cluster_decorator.get_cluster_snapshot_by_snapshot_id", return_value=mock_mc_snapshot, ): - self.assertEqual(ctx_5.get_kubernetes_version(), "custom_kubernetes_version") + self.assertEqual( + ctx_5.get_kubernetes_version(), "custom_kubernetes_version" + ) def test_get_disk_driver(self): ctx_1 = AKSPreviewManagedClusterContext( @@ -2145,20 +2346,20 @@ def test_get_disk_driver(self): version="v2", ) ) - self.assertEqual( - ctx_2.get_disk_driver(), ground_truth_disk_csi_driver_2 - ) + self.assertEqual(ctx_2.get_disk_driver(), ground_truth_disk_csi_driver_2) # fail with enable-disk-driver as false and value passed for disk_driver_version ctx_3 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "disable_disk_driver": True, - "disk_driver_version": "v2", - }), - self.models, - decorator_mode=DecoratorMode.UPDATE, - ) + AKSManagedClusterParamDict( + { + "disable_disk_driver": True, + "disk_driver_version": "v2", + } + ), + self.models, + decorator_mode=DecoratorMode.UPDATE, + ) # fail on argument usage error with self.assertRaises(ArgumentUsageError): @@ -2167,9 +2368,11 @@ def test_get_disk_driver(self): # fail with enable-disk-driver as false and value passed for disk_driver_version ctx_4 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "disk_driver_version": "v2", - }), + AKSManagedClusterParamDict( + { + "disk_driver_version": "v2", + } + ), self.models, decorator_mode=DecoratorMode.UPDATE, ) @@ -2180,9 +2383,11 @@ def test_get_disk_driver(self): # fail on prompt_y_n not specified when disabling disk driver ctx_5 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "disable_disk_driver": True, - }), + AKSManagedClusterParamDict( + { + "disable_disk_driver": True, + } + ), self.models, decorator_mode=DecoratorMode.UPDATE, ) @@ -2194,9 +2399,11 @@ def test_get_disk_driver(self): ctx_6 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "disable_disk_driver": True, - }), + AKSManagedClusterParamDict( + { + "disable_disk_driver": True, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2205,15 +2412,15 @@ def test_get_disk_driver(self): enabled=False, ) ) - self.assertEqual( - ctx_6.get_disk_driver(), ground_truth_disk_csi_driver_6 - ) + self.assertEqual(ctx_6.get_disk_driver(), ground_truth_disk_csi_driver_6) ctx_7 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "disk_driver_version": CONST_DISK_DRIVER_V2, - }), + AKSManagedClusterParamDict( + { + "disk_driver_version": CONST_DISK_DRIVER_V2, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2223,9 +2430,7 @@ def test_get_disk_driver(self): version=CONST_DISK_DRIVER_V2, ) ) - self.assertEqual( - ctx_7.get_disk_driver(), ground_truth_disk_csi_driver_7 - ) + self.assertEqual(ctx_7.get_disk_driver(), ground_truth_disk_csi_driver_7) def test_get_enable_apiserver_vnet_integration(self): ctx_0 = AKSPreviewManagedClusterContext( @@ -2238,9 +2443,11 @@ def test_get_enable_apiserver_vnet_integration(self): ctx_1 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_apiserver_vnet_integration": False, - }), + AKSManagedClusterParamDict( + { + "enable_apiserver_vnet_integration": False, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2248,10 +2455,12 @@ def test_get_enable_apiserver_vnet_integration(self): ctx_2 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_apiserver_vnet_integration": False, - "enable_private_cluster": False, - }), + AKSManagedClusterParamDict( + { + "enable_apiserver_vnet_integration": False, + "enable_private_cluster": False, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2267,10 +2476,12 @@ def test_get_enable_apiserver_vnet_integration(self): ctx_3 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_apiserver_vnet_integration": True, - "enable_private_cluster": True, - }), + AKSManagedClusterParamDict( + { + "enable_apiserver_vnet_integration": True, + "enable_private_cluster": True, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2278,21 +2489,24 @@ def test_get_enable_apiserver_vnet_integration(self): ctx_5 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_apiserver_vnet_integration": True, - }), + AKSManagedClusterParamDict( + { + "enable_apiserver_vnet_integration": True, + } + ), self.models, decorator_mode=DecoratorMode.UPDATE, ) with self.assertRaises(RequiredArgumentMissingError): ctx_5.get_enable_apiserver_vnet_integration() - ctx_6 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_apiserver_vnet_integration": True, - }), + AKSManagedClusterParamDict( + { + "enable_apiserver_vnet_integration": True, + } + ), self.models, decorator_mode=DecoratorMode.UPDATE, ) @@ -2319,12 +2533,14 @@ def test_get_apiserver_subnet_id(self): vnet_subnet_id = "/subscriptions/fakesub/resourceGroups/fakerg/providers/Microsoft.Network/virtualNetworks/fakevnet/subnets/node" ctx_1 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_apiserver_vnet_integration": True, - "enable_private_cluster": True, - "apiserver_subnet_id": apiserver_subnet_id, - "vnet_subnet_id": vnet_subnet_id, - }), + AKSManagedClusterParamDict( + { + "enable_apiserver_vnet_integration": True, + "enable_private_cluster": True, + "apiserver_subnet_id": apiserver_subnet_id, + "vnet_subnet_id": vnet_subnet_id, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2333,11 +2549,13 @@ def test_get_apiserver_subnet_id(self): ctx_2 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_apiserver_vnet_integration": True, - "enable_private_cluster": True, - "vnet_subnet_id": vnet_subnet_id - }), + AKSManagedClusterParamDict( + { + "enable_apiserver_vnet_integration": True, + "enable_private_cluster": True, + "vnet_subnet_id": vnet_subnet_id, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2353,10 +2571,12 @@ def test_get_apiserver_subnet_id(self): ctx_3 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_apiserver_vnet_integration": True, - "apiserver_subnet_id": apiserver_subnet_id, - }), + AKSManagedClusterParamDict( + { + "enable_apiserver_vnet_integration": True, + "apiserver_subnet_id": apiserver_subnet_id, + } + ), self.models, decorator_mode=DecoratorMode.UPDATE, ) @@ -2365,11 +2585,13 @@ def test_get_apiserver_subnet_id(self): ctx_4 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_private_cluster": True, - "apiserver_subnet_id": apiserver_subnet_id, - "vnet_subnet_id": vnet_subnet_id, - }), + AKSManagedClusterParamDict( + { + "enable_private_cluster": True, + "apiserver_subnet_id": apiserver_subnet_id, + "vnet_subnet_id": vnet_subnet_id, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2379,11 +2601,13 @@ def test_get_apiserver_subnet_id(self): ctx_5 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "enable_apiserver_vnet_integration": False, - "apiserver_subnet_id": apiserver_subnet_id, - "vnet_subnet_id": vnet_subnet_id, - }), + AKSManagedClusterParamDict( + { + "enable_apiserver_vnet_integration": False, + "apiserver_subnet_id": apiserver_subnet_id, + "vnet_subnet_id": vnet_subnet_id, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2393,9 +2617,11 @@ def test_get_apiserver_subnet_id(self): ctx_6 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict({ - "apiserver_subnet_id": apiserver_subnet_id, - }), + AKSManagedClusterParamDict( + { + "apiserver_subnet_id": apiserver_subnet_id, + } + ), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2414,7 +2640,9 @@ def test_get_dns_zone_resource_ids(self): self.models, decorator_mode=DecoratorMode.CREATE, ) - self.assertEqual(ctx_1.get_dns_zone_resource_ids(), ["test_dns_zone_resource_id"]) + self.assertEqual( + ctx_1.get_dns_zone_resource_ids(), ["test_dns_zone_resource_id"] + ) mc_1 = self.models.ManagedCluster( location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( @@ -2425,7 +2653,9 @@ def test_get_dns_zone_resource_ids(self): ), ) ctx_1.attach_mc(mc_1) - self.assertEqual(ctx_1.get_dns_zone_resource_ids(), ["test_mc_dns_zone_resource_id"]) + self.assertEqual( + ctx_1.get_dns_zone_resource_ids(), ["test_mc_dns_zone_resource_id"] + ) ctx_2 = AKSPreviewManagedClusterContext( self.cmd, @@ -2437,7 +2667,10 @@ def test_get_dns_zone_resource_ids(self): self.models, decorator_mode=DecoratorMode.CREATE, ) - self.assertEqual(ctx_2.get_dns_zone_resource_ids(), ["test_dns_zone_resource_id_1", "test_dns_zone_resource_id_2"]) + self.assertEqual( + ctx_2.get_dns_zone_resource_ids(), + ["test_dns_zone_resource_id_1", "test_dns_zone_resource_id_2"], + ) ctx_3 = AKSPreviewManagedClusterContext( self.cmd, @@ -2449,7 +2682,9 @@ def test_get_dns_zone_resource_ids(self): self.models, decorator_mode=DecoratorMode.CREATE, ) - self.assertEqual(ctx_3.get_dns_zone_resource_ids(), ["test_dns_zone_resource_id_1"]) + self.assertEqual( + ctx_3.get_dns_zone_resource_ids(), ["test_dns_zone_resource_id_1"] + ) def test_get_enable_keda(self): # Returns the value of enable_keda if keda is None in existing profile. @@ -2541,9 +2776,7 @@ def test_get_enable_keda(self): # Throws exception when both enable_keda and disable_keda are True. ctx_8 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict( - {"enable_keda": True, "disable_keda": True} - ), + AKSManagedClusterParamDict({"enable_keda": True, "disable_keda": True}), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2590,9 +2823,7 @@ def test_get_disable_keda(self): # Throws exception when both enable_keda and disable_keda are True. ctx_4 = AKSPreviewManagedClusterContext( self.cmd, - AKSManagedClusterParamDict( - {"enable_keda": True, "disable_keda": True} - ), + AKSManagedClusterParamDict({"enable_keda": True, "disable_keda": True}), self.models, decorator_mode=DecoratorMode.CREATE, ) @@ -2625,9 +2856,7 @@ def test_get_defender_config(self): AKSManagedClusterParamDict( { "enable_defender": True, - "defender_config": get_test_data_file_path( - "defenderconfig.json" - ), + "defender_config": get_test_data_file_path("defenderconfig.json"), } ), self.models, @@ -2723,8 +2952,8 @@ def test_get_enable_node_restriction(self): decorator_mode=DecoratorMode.CREATE, ) security_profile = self.models.ManagedClusterSecurityProfile() - security_profile.node_restriction = self.models.ManagedClusterSecurityProfileNodeRestriction( - enabled=True + security_profile.node_restriction = ( + self.models.ManagedClusterSecurityProfileNodeRestriction(enabled=True) ) mc = self.models.ManagedCluster( location="test_location", @@ -2744,8 +2973,8 @@ def test_get_enable_node_restriction(self): decorator_mode=DecoratorMode.UPDATE, ) security_profile = self.models.ManagedClusterSecurityProfile() - security_profile.node_restriction = self.models.ManagedClusterSecurityProfileNodeRestriction( - enabled=True + security_profile.node_restriction = ( + self.models.ManagedClusterSecurityProfileNodeRestriction(enabled=True) ) mc = self.models.ManagedCluster( location="test_location", @@ -2986,13 +3215,15 @@ def test_get_enable_private_cluster(self): AKSManagedClusterParamDict( { "enable_private_cluster": True, - "enable_apiserver_vnet_integration": True + "enable_apiserver_vnet_integration": True, } ), self.models, DecoratorMode.UPDATE, ) - api_server_access_profile_10 = self.models.ManagedClusterAPIServerAccessProfile() + api_server_access_profile_10 = ( + self.models.ManagedClusterAPIServerAccessProfile() + ) mc_10 = self.models.ManagedCluster( location="test_location", api_server_access_profile=api_server_access_profile_10, @@ -3095,13 +3326,15 @@ def test_get_disable_private_cluster(self): AKSManagedClusterParamDict( { "disable_private_cluster": True, - "enable_apiserver_vnet_integration": True + "enable_apiserver_vnet_integration": True, } ), self.models, DecoratorMode.UPDATE, ) - api_server_access_profile_10 = self.models.ManagedClusterAPIServerAccessProfile() + api_server_access_profile_10 = ( + self.models.ManagedClusterAPIServerAccessProfile() + ) mc_10 = self.models.ManagedCluster( location="test_location", api_server_access_profile=api_server_access_profile_10, @@ -3251,7 +3484,9 @@ def test_get_private_dns_zone(self): ) # fail on invalid private_dns_zone when fqdn_subdomain is specified with self.assertRaises(InvalidArgumentValueError): - self.assertEqual(ctx_3.get_private_dns_zone(), CONST_PRIVATE_DNS_ZONE_SYSTEM) + self.assertEqual( + ctx_3.get_private_dns_zone(), CONST_PRIVATE_DNS_ZONE_SYSTEM + ) # custom value ctx_4 = AKSPreviewManagedClusterContext( @@ -3308,8 +3543,14 @@ def test_get_enable_vpa(self): self.models, decorator_mode=DecoratorMode.CREATE, ) - workload_auto_scaler_profile = self.models.ManagedClusterWorkloadAutoScalerProfile() - workload_auto_scaler_profile.vertical_pod_autoscaler = self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler(enable=True) + workload_auto_scaler_profile = ( + self.models.ManagedClusterWorkloadAutoScalerProfile() + ) + workload_auto_scaler_profile.vertical_pod_autoscaler = ( + self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler( + enable=True + ) + ) mc = self.models.ManagedCluster( location="test_location", workload_auto_scaler_profile=workload_auto_scaler_profile, @@ -3327,9 +3568,13 @@ def test_get_enable_vpa(self): self.models, decorator_mode=DecoratorMode.UPDATE, ) - workload_auto_scaler_profile = self.models.ManagedClusterWorkloadAutoScalerProfile() - workload_auto_scaler_profile.vertical_pod_autoscaler = self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler( - enabled=True + workload_auto_scaler_profile = ( + self.models.ManagedClusterWorkloadAutoScalerProfile() + ) + workload_auto_scaler_profile.vertical_pod_autoscaler = ( + self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler( + enabled=True + ) ) mc = self.models.ManagedCluster( location="test_location", @@ -3444,6 +3689,7 @@ def test_get_upgrade_override_until(self): ) self.assertEqual(ctx_1.get_upgrade_override_until(), "2022-11-01T13:00:00Z") + class AKSPreviewManagedClusterCreateDecoratorTestCase(unittest.TestCase): def setUp(self): # manually register CUSTOM_MGMT_AKS_PREVIEW @@ -3456,28 +3702,25 @@ def setUp(self): def test_set_up_guardrails_profile(self): # Base case - no options specified, GuardrailsProfile should be None dec_1 = AKSPreviewManagedClusterCreateDecorator( - self.cmd, - self.client, - {}, - CUSTOM_MGMT_AKS_PREVIEW + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW ) mc_1 = self.models.ManagedCluster(location="test_location") dec_1.context.attach_mc(mc_1) dec_mc_1 = dec_1.set_up_guardrails_profile(mc_1) gt_mc_1 = self.models.ManagedCluster(location="test_location") - self.assertEqual(dec_mc_1,gt_mc_1) + self.assertEqual(dec_mc_1, gt_mc_1) # Make sure GuardrailsProfile is filled out appropriately dec_2 = AKSPreviewManagedClusterCreateDecorator( self.cmd, self.client, { - "guardrails_level": "Warning", - "guardrails_version": "v1.0.0", - "guardrails_excluded_ns": "ns1,ns2" + "guardrails_level": "Warning", + "guardrails_version": "v1.0.0", + "guardrails_excluded_ns": "ns1,ns2", }, - CUSTOM_MGMT_AKS_PREVIEW + CUSTOM_MGMT_AKS_PREVIEW, ) mc_2 = self.models.ManagedCluster(location="test_location") @@ -3485,11 +3728,9 @@ def test_set_up_guardrails_profile(self): dec_mc_2 = dec_2.set_up_guardrails_profile(mc_2) gt_mc_2 = self.models.ManagedCluster(location="test_location") gt_mc_2.guardrails_profile = self.models.GuardrailsProfile( - level="Warning", - version="v1.0.0", - excluded_namespaces=["ns1","ns2"] + level="Warning", version="v1.0.0", excluded_namespaces=["ns1", "ns2"] ) - self.assertEqual(dec_mc_2,gt_mc_2) + self.assertEqual(dec_mc_2, gt_mc_2) def test_set_up_agentpool_profile(self): dec_1 = AKSPreviewManagedClusterCreateDecorator( @@ -3548,7 +3789,9 @@ def test_set_up_agentpool_profile(self): vm_size="Standard_DSx_vy", os_type=CONST_DEFAULT_NODE_OS_TYPE, os_sku="snapshot_os_sku", - creation_data=self.models.CreationData(source_resource_id="test_snapshot_id"), + creation_data=self.models.CreationData( + source_resource_id="test_snapshot_id" + ), vnet_subnet_id="test_vnet_subnet_id", pod_subnet_id="test_pod_subnet_id", enable_node_public_ip=True, @@ -3618,12 +3861,16 @@ def test_set_up_network_profile(self): network_profile_1 = self.models.ContainerServiceNetworkProfile() # TODO: remove this temp fix once aks-preview's dependency on core azure-cli is updated to 2.26.0 for attr_name, attr_value in vars(network_profile_1).items(): - if not attr_name.startswith("_") and attr_name not in ["additional_properties", "outbound_type"] and attr_value is not None: - setattr(network_profile_1, attr_name, None) + if ( + not attr_name.startswith("_") + and attr_name not in ["additional_properties", "outbound_type"] + and attr_value is not None + ): + setattr(network_profile_1, attr_name, None) network_profile_1.load_balancer_sku = CONST_LOAD_BALANCER_SKU_STANDARD network_profile_1.ip_families = ["IPv4", "IPv6"] network_profile_1.pod_cidrs = ["10.246.0.0/16", "2001:abcd::/64"] - network_profile_1.service_cidrs=["10.0.0.0/16", "2001:ffff::/108"] + network_profile_1.service_cidrs = ["10.0.0.0/16", "2001:ffff::/108"] load_balancer_profile_1 = self.models.load_balancer_models.ManagedClusterLoadBalancerProfile( managed_outbound_i_ps=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileManagedOutboundIPs( @@ -3632,7 +3879,9 @@ def test_set_up_network_profile(self): backend_pool_type=CONST_LOAD_BALANCER_BACKEND_POOL_TYPE_NODE_IP, ) network_profile_1.load_balancer_profile = load_balancer_profile_1 - ground_truth_mc_1 = self.models.ManagedCluster(location="test_location", network_profile=network_profile_1) + ground_truth_mc_1 = self.models.ManagedCluster( + location="test_location", network_profile=network_profile_1 + ) self.assertEqual(dec_mc_1, ground_truth_mc_1) def test_set_up_api_server_access_profile(self): @@ -3642,14 +3891,10 @@ def test_set_up_api_server_access_profile(self): {}, CUSTOM_MGMT_AKS_PREVIEW, ) - mc_1 = self.models.ManagedCluster( - location="test_location" - ) + mc_1 = self.models.ManagedCluster(location="test_location") dec_1.context.attach_mc(mc_1) dec_mc_1 = dec_1.set_up_api_server_access_profile(mc_1) - ground_truth_mc_1 = self.models.ManagedCluster( - location="test_location" - ) + ground_truth_mc_1 = self.models.ManagedCluster(location="test_location") self.assertEqual(dec_mc_1, ground_truth_mc_1) apiserver_subnet_id = "/subscriptions/fakesub/resourceGroups/fakerg/providers/Microsoft.Network/virtualNetworks/fakevnet/subnets/apiserver" @@ -3668,11 +3913,13 @@ def test_set_up_api_server_access_profile(self): mc_2 = self.models.ManagedCluster(location="test_location") dec_2.context.attach_mc(mc_2) dec_mc_2 = dec_2.set_up_api_server_access_profile(mc_2) - ground_truth_api_server_access_profile_2 = self.models.ManagedClusterAPIServerAccessProfile( - enable_vnet_integration=True, - subnet_id=apiserver_subnet_id, - enable_private_cluster=True, - authorized_ip_ranges=[], + ground_truth_api_server_access_profile_2 = ( + self.models.ManagedClusterAPIServerAccessProfile( + enable_vnet_integration=True, + subnet_id=apiserver_subnet_id, + enable_private_cluster=True, + authorized_ip_ranges=[], + ) ) ground_truth_mc_2 = self.models.ManagedCluster( location="test_location", @@ -3692,8 +3939,10 @@ def test_set_up_api_server_access_profile(self): mc_3 = self.models.ManagedCluster(location="test_location") dec_3.context.attach_mc(mc_3) dec_mc_3 = dec_3.set_up_api_server_access_profile(mc_3) - ground_truth_api_server_access_profile_3 = self.models.ManagedClusterAPIServerAccessProfile( - enable_vnet_integration=True, + ground_truth_api_server_access_profile_3 = ( + self.models.ManagedClusterAPIServerAccessProfile( + enable_vnet_integration=True, + ) ) ground_truth_mc_3 = self.models.ManagedCluster( location="test_location", @@ -3711,14 +3960,10 @@ def test_build_gitops_addon_profile(self): ) gitops_addon_profile = dec_1.build_gitops_addon_profile() - ground_truth_gitops_addon_profile = ( - self.models.ManagedClusterAddonProfile( - enabled=True, - ) - ) - self.assertEqual( - gitops_addon_profile, ground_truth_gitops_addon_profile + ground_truth_gitops_addon_profile = self.models.ManagedClusterAddonProfile( + enabled=True, ) + self.assertEqual(gitops_addon_profile, ground_truth_gitops_addon_profile) def test_set_up_addon_profiles(self): # default value in `aks_create` @@ -3756,9 +4001,7 @@ def test_set_up_addon_profiles(self): ) self.assertEqual(dec_mc_1, ground_truth_mc_1) self.assertEqual(dec_1.context.get_intermediate("monitoring"), None) - self.assertEqual( - dec_1.context.get_intermediate("enable_virtual_node"), None - ) + self.assertEqual(dec_1.context.get_intermediate("enable_virtual_node"), None) self.assertEqual( dec_1.context.get_intermediate("ingress_appgw_addon_enabled"), None ) @@ -3785,9 +4028,7 @@ def test_set_up_addon_profiles(self): }, CUSTOM_MGMT_AKS_PREVIEW, ) - dec_2.context.set_intermediate( - "subscription_id", "test_subscription_id" - ) + dec_2.context.set_intermediate("subscription_id", "test_subscription_id") mc_2 = self.models.ManagedCluster(location="test_location") dec_2.context.attach_mc(mc_2) with patch( @@ -3822,9 +4063,15 @@ def test_set_up_addon_profiles(self): location="test_location", addon_profiles=addon_profiles_2 ) self.assertEqual(dec_mc_2, ground_truth_mc_2) - self.assertEqual(dec_2.context.get_intermediate("monitoring_addon_enabled"), True) - self.assertEqual(dec_2.context.get_intermediate("virtual_node_addon_enabled"), None) - self.assertEqual(dec_2.context.get_intermediate("ingress_appgw_addon_enabled"), True) + self.assertEqual( + dec_2.context.get_intermediate("monitoring_addon_enabled"), True + ) + self.assertEqual( + dec_2.context.get_intermediate("virtual_node_addon_enabled"), None + ) + self.assertEqual( + dec_2.context.get_intermediate("ingress_appgw_addon_enabled"), True + ) def test_set_up_http_proxy_config(self): dec_1 = AKSPreviewManagedClusterCreateDecorator( @@ -3866,7 +4113,9 @@ def test_set_up_pod_security_policy(self): with self.assertRaises(CLIInternalError): dec_1.set_up_pod_security_policy(None) dec_mc_1 = dec_1.set_up_pod_security_policy(mc_1) - ground_truth_mc_1 = self.models.ManagedCluster(location="test_location", enable_pod_security_policy=False) + ground_truth_mc_1 = self.models.ManagedCluster( + location="test_location", enable_pod_security_policy=False + ) self.assertEqual(dec_mc_1, ground_truth_mc_1) # custom value @@ -3916,14 +4165,22 @@ def test_set_up_pod_identity_profile(self): }, CUSTOM_MGMT_AKS_PREVIEW, ) - network_profile_2 = self.models.ContainerServiceNetworkProfile(network_plugin="kubenet") - mc_2 = self.models.ManagedCluster(location="test_location", network_profile=network_profile_2) + network_profile_2 = self.models.ContainerServiceNetworkProfile( + network_plugin="kubenet" + ) + mc_2 = self.models.ManagedCluster( + location="test_location", network_profile=network_profile_2 + ) dec_2.context.attach_mc(mc_2) dec_mc_2 = dec_2.set_up_pod_identity_profile(mc_2) - network_profile_2 = self.models.ContainerServiceNetworkProfile(network_plugin="kubenet") - pod_identity_profile_2 = self.models.pod_identity_models.ManagedClusterPodIdentityProfile( - enabled=True, - allow_network_plugin_kubenet=True, + network_profile_2 = self.models.ContainerServiceNetworkProfile( + network_plugin="kubenet" + ) + pod_identity_profile_2 = ( + self.models.pod_identity_models.ManagedClusterPodIdentityProfile( + enabled=True, + allow_network_plugin_kubenet=True, + ) ) ground_truth_mc_2 = self.models.ManagedCluster( location="test_location", @@ -3933,7 +4190,9 @@ def test_set_up_pod_identity_profile(self): self.assertEqual(dec_mc_2, ground_truth_mc_2) def test_set_up_oidc_issuer_profile__default_value(self): - dec = AKSPreviewManagedClusterCreateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) + dec = AKSPreviewManagedClusterCreateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) mc = self.models.ManagedCluster(location="test_location") dec.context.attach_mc(mc) updated_mc = dec.set_up_oidc_issuer_profile(mc) @@ -3964,21 +4223,29 @@ def test_set_up_oidc_issuer_profile__enabled_mc_enabled(self): CUSTOM_MGMT_AKS_PREVIEW, ) mc = self.models.ManagedCluster(location="test_location") - mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile(enabled=True) + mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile( + enabled=True + ) dec.context.attach_mc(mc) updated_mc = dec.set_up_oidc_issuer_profile(mc) self.assertIsNotNone(updated_mc.oidc_issuer_profile) self.assertTrue(updated_mc.oidc_issuer_profile.enabled) def test_set_up_workload_identity_profile__default_value(self): - dec = AKSPreviewManagedClusterCreateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) + dec = AKSPreviewManagedClusterCreateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) mc = self.models.ManagedCluster(location="test_location") dec.context.attach_mc(mc) updated_mc = dec.set_up_workload_identity_profile(mc) self.assertIsNone(updated_mc.security_profile) - def test_set_up_workload_identity_profile__default_value_with_security_profile(self): - dec = AKSPreviewManagedClusterCreateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) + def test_set_up_workload_identity_profile__default_value_with_security_profile( + self, + ): + dec = AKSPreviewManagedClusterCreateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) mc = self.models.ManagedCluster(location="test_location") mc.security_profile = self.models.ManagedClusterSecurityProfile() dec.context.attach_mc(mc) @@ -4025,9 +4292,11 @@ def test_set_up_image_cleaner(self): dec_1.context.attach_mc(mc_1) dec_mc_1 = dec_1.set_up_image_cleaner(mc_1) - ground_truth_image_cleaner_profile_1 = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=True, - interval_hours=7*24, + ground_truth_image_cleaner_profile_1 = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=True, + interval_hours=7 * 24, + ) ) ground_truth_security_profile_1 = self.models.ManagedClusterSecurityProfile( image_cleaner=ground_truth_image_cleaner_profile_1, @@ -4041,19 +4310,18 @@ def test_set_up_image_cleaner(self): dec_2 = AKSPreviewManagedClusterCreateDecorator( self.cmd, self.client, - { - "enable_image_cleaner": True, - "image_cleaner_interval_hours": 24 - }, + {"enable_image_cleaner": True, "image_cleaner_interval_hours": 24}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_2 = self.models.ManagedCluster(location="test_location") dec_2.context.attach_mc(mc_2) dec_mc_2 = dec_2.set_up_image_cleaner(mc_2) - ground_truth_image_cleaner_profile_2 = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=True, - interval_hours=24, + ground_truth_image_cleaner_profile_2 = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=True, + interval_hours=24, + ) ) ground_truth_security_profile_2 = self.models.ManagedClusterSecurityProfile( image_cleaner=ground_truth_image_cleaner_profile_2, @@ -4065,7 +4333,9 @@ def test_set_up_image_cleaner(self): self.assertEqual(dec_mc_2, ground_truth_mc_2) def test_set_up_azure_keyvault_kms(self): - key_id_1 = "https://fakekeyvault.vault.azure.net/secrets/fakekeyname/fakekeyversion" + key_id_1 = ( + "https://fakekeyvault.vault.azure.net/secrets/fakekeyname/fakekeyversion" + ) dec_1 = AKSPreviewManagedClusterCreateDecorator( self.cmd, @@ -4151,7 +4421,9 @@ def test_set_up_creationdata_of_cluster_snapshot(self): dec_1.context.attach_mc(mc_1) dec_mc_1 = dec_1.set_up_creationdata_of_cluster_snapshot(mc_1) cd = self.models.CreationData(source_resource_id="test_cluster_snapshot_id") - ground_truth_mc_1 = self.models.ManagedCluster(location="test_location", creation_data=cd) + ground_truth_mc_1 = self.models.ManagedCluster( + location="test_location", creation_data=cd + ) self.assertEqual(dec_mc_1, ground_truth_mc_1) def test_set_up_custom_ca_trust_certificates(self): @@ -4165,16 +4437,23 @@ def test_set_up_custom_ca_trust_certificates(self): dec_1.context.attach_mc(mc_1) dec_mc_1 = dec_1.set_up_custom_ca_trust_certificates(mc_1) sec_profile = self.models.ManagedClusterSecurityProfile( - custom_ca_trust_certificates=[str.encode(CONST_CUSTOM_CA_TEST_CERT) for _ in range(2)] + custom_ca_trust_certificates=[ + str.encode(CONST_CUSTOM_CA_TEST_CERT) for _ in range(2) + ] + ) + ground_truth_mc_1 = self.models.ManagedCluster( + location="test_location", security_profile=sec_profile ) - ground_truth_mc_1 = self.models.ManagedCluster(location="test_location", security_profile=sec_profile) self.assertEqual(dec_mc_1, ground_truth_mc_1) def test_set_up_ingress_web_app_routing(self): dec_1 = AKSPreviewManagedClusterCreateDecorator( self.cmd, self.client, - {"enable_addons": "web_application_routing", "dns_zone_resource_ids": "test_dns_zone_resource_id"}, + { + "enable_addons": "web_application_routing", + "dns_zone_resource_ids": "test_dns_zone_resource_id", + }, CUSTOM_MGMT_AKS_PREVIEW, ) mc_1 = self.models.ManagedCluster(location="test_location") @@ -4198,7 +4477,7 @@ def test_set_up_workload_auto_scaler_profile(self): ) with self.assertRaisesRegex( CLIInternalError, - "^Unexpected mc object with type ''\.$", + r"^Unexpected mc object with type ''\.$", ): dec_1.set_up_workload_auto_scaler_profile(None) @@ -4252,8 +4531,8 @@ def test_set_up_defender(self): dec_1.context.set_intermediate("subscription_id", "test_subscription_id") with patch( - "azure.cli.command_modules.acs.managed_cluster_decorator.ensure_default_log_analytics_workspace_for_monitoring", - return_value="test_workspace_resource_id", + "azure.cli.command_modules.acs.managed_cluster_decorator.ensure_default_log_analytics_workspace_for_monitoring", + return_value="test_workspace_resource_id", ): dec_mc_1 = dec_1.set_up_defender(mc_1) @@ -4286,9 +4565,7 @@ def test_set_up_node_restriction(self): dec_2 = AKSPreviewManagedClusterCreateDecorator( self.cmd, self.client, - { - "enable_node_restriction": True - }, + {"enable_node_restriction": True}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_2 = self.models.ManagedCluster(location="test_location") @@ -4298,8 +4575,8 @@ def test_set_up_node_restriction(self): ground_truth_mc_2 = self.models.ManagedCluster( location="test_location", security_profile=self.models.ManagedClusterSecurityProfile( - node_restriction = self.models.ManagedClusterSecurityProfileNodeRestriction( - enabled = True, + node_restriction=self.models.ManagedClusterSecurityProfileNodeRestriction( + enabled=True, ) ), ) @@ -4321,9 +4598,7 @@ def test_set_up_vpa(self): dec_2 = AKSPreviewManagedClusterCreateDecorator( self.cmd, self.client, - { - "enable_vpa": True - }, + {"enable_vpa": True}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_2 = self.models.ManagedCluster(location="test_location") @@ -4333,8 +4608,8 @@ def test_set_up_vpa(self): ground_truth_mc_2 = self.models.ManagedCluster( location="test_location", workload_auto_scaler_profile=self.models.ManagedClusterWorkloadAutoScalerProfile( - vertical_pod_autoscaler = self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler( - enabled = True, + vertical_pod_autoscaler=self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler( + enabled=True, ) ), ) @@ -4369,8 +4644,7 @@ def test_set_up_azure_service_mesh(self): ground_truth_mc_2 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( - mode="Istio", - istio=self.models.IstioServiceMesh() + mode="Istio", istio=self.models.IstioServiceMesh() ), ) @@ -4431,7 +4705,9 @@ def test_construct_mc_profile_preview(self): raw_param_dict.update(optional_params) # default value in `aks_create` - dec_1 = AKSPreviewManagedClusterCreateDecorator(self.cmd, self.client, raw_param_dict, CUSTOM_MGMT_AKS_PREVIEW) + dec_1 = AKSPreviewManagedClusterCreateDecorator( + self.cmd, self.client, raw_param_dict, CUSTOM_MGMT_AKS_PREVIEW + ) mock_profile = Mock(get_subscription_id=Mock(return_value="1234-5678-9012")) with patch( @@ -4467,7 +4743,9 @@ def test_construct_mc_profile_preview(self): ssh_config_1 = self.models.ContainerServiceSshConfiguration( public_keys=[self.models.ContainerServiceSshPublicKey(key_data=public_key)] ) - linux_profile_1 = self.models.ContainerServiceLinuxProfile(admin_username="azureuser", ssh=ssh_config_1) + linux_profile_1 = self.models.ContainerServiceLinuxProfile( + admin_username="azureuser", ssh=ssh_config_1 + ) network_profile_1 = self.models.ContainerServiceNetworkProfile( load_balancer_sku="standard", ) @@ -4600,8 +4878,12 @@ def test_update_load_balancer_profile(self): load_balancer_profile=self.models.load_balancer_models.ManagedClusterLoadBalancerProfile( outbound_ip_prefixes=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPPrefixes( public_ip_prefixes=[ - self.models.load_balancer_models.ResourceReference(id="id1"), - self.models.load_balancer_models.ResourceReference(id="id2"), + self.models.load_balancer_models.ResourceReference( + id="id1" + ), + self.models.load_balancer_models.ResourceReference( + id="id2" + ), ] ) ) @@ -4616,8 +4898,12 @@ def test_update_load_balancer_profile(self): load_balancer_profile=self.models.load_balancer_models.ManagedClusterLoadBalancerProfile( outbound_ip_prefixes=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPPrefixes( public_ip_prefixes=[ - self.models.load_balancer_models.ResourceReference(id="id3"), - self.models.load_balancer_models.ResourceReference(id="id4"), + self.models.load_balancer_models.ResourceReference( + id="id3" + ), + self.models.load_balancer_models.ResourceReference( + id="id4" + ), ] ) ) @@ -4643,8 +4929,12 @@ def test_update_load_balancer_profile(self): load_balancer_profile=self.models.load_balancer_models.ManagedClusterLoadBalancerProfile( outbound_i_ps=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPs( public_i_ps=[ - self.models.load_balancer_models.ResourceReference(id="id1"), - self.models.load_balancer_models.ResourceReference(id="id2"), + self.models.load_balancer_models.ResourceReference( + id="id1" + ), + self.models.load_balancer_models.ResourceReference( + id="id2" + ), ] ) ) @@ -4659,8 +4949,12 @@ def test_update_load_balancer_profile(self): load_balancer_profile=self.models.load_balancer_models.ManagedClusterLoadBalancerProfile( outbound_i_ps=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPs( public_i_ps=[ - self.models.load_balancer_models.ResourceReference(id="id3"), - self.models.load_balancer_models.ResourceReference(id="id4"), + self.models.load_balancer_models.ResourceReference( + id="id3" + ), + self.models.load_balancer_models.ResourceReference( + id="id4" + ), ] ) ) @@ -4820,8 +5114,12 @@ def test_update_load_balancer_profile(self): load_balancer_profile=self.models.load_balancer_models.ManagedClusterLoadBalancerProfile( outbound_i_ps=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPs( public_i_ps=[ - self.models.load_balancer_models.ResourceReference(id="id1"), - self.models.load_balancer_models.ResourceReference(id="id2"), + self.models.load_balancer_models.ResourceReference( + id="id1" + ), + self.models.load_balancer_models.ResourceReference( + id="id2" + ), ] ) ) @@ -4845,11 +5143,19 @@ def test_update_load_balancer_profile(self): load_balancer_profile_8 = self.models.load_balancer_models.ManagedClusterLoadBalancerProfile( outbound_ip_prefixes=self.models.load_balancer_models.ManagedClusterLoadBalancerProfileOutboundIPPrefixes( - public_ip_prefixes=[self.models.load_balancer_models.ResourceReference(id="test_public_ip_prefix")] + public_ip_prefixes=[ + self.models.load_balancer_models.ResourceReference( + id="test_public_ip_prefix" + ) + ] ), ) - network_profile_8 = self.models.ContainerServiceNetworkProfile(load_balancer_profile=load_balancer_profile_8) - mc_8 = self.models.ManagedCluster(location="test_location", network_profile=network_profile_8) + network_profile_8 = self.models.ContainerServiceNetworkProfile( + load_balancer_profile=load_balancer_profile_8 + ) + mc_8 = self.models.ManagedCluster( + location="test_location", network_profile=network_profile_8 + ) dec_8.context.attach_mc(mc_8) dec_mc_8 = dec_8.update_load_balancer_profile(mc_8) @@ -4993,9 +5299,7 @@ def test_update_network_plugin_settings(self): mc_1 = self.models.ManagedCluster( location="test_location", network_profile=self.models.ContainerServiceNetworkProfile( - network_plugin="azure", - pod_cidr=None, - service_cidr="192.168.0.0/16" + network_plugin="azure", pod_cidr=None, service_cidr="192.168.0.0/16" ), ) @@ -5031,7 +5335,7 @@ def test_update_network_plugin_settings(self): network_profile=self.models.ContainerServiceNetworkProfile( network_plugin="azure", pod_cidr="100.64.0.0/16", - service_cidr="192.168.0.0/16" + service_cidr="192.168.0.0/16", ), ) @@ -5067,7 +5371,7 @@ def test_update_network_plugin_settings(self): network_plugin="azure", network_plugin_mode="overlay", pod_cidr="100.64.0.0/16", - service_cidr="192.168.0.0/16" + service_cidr="192.168.0.0/16", ), ) @@ -5106,7 +5410,7 @@ def test_update_network_plugin_settings(self): network_dataplane="cilium", network_policy="", pod_cidr="100.64.0.0/16", - service_cidr="192.168.0.0/16" + service_cidr="192.168.0.0/16", ), ) @@ -5143,7 +5447,7 @@ def test_update_network_plugin_settings(self): network_plugin="azure", network_plugin_mode="overlay", pod_cidr="100.64.0.0/16", - service_cidr="192.168.0.0/16" + service_cidr="192.168.0.0/16", ), ) @@ -5261,9 +5565,11 @@ def test_update_api_server_access_profile(self): mc_2 = self.models.ManagedCluster(location="test_location") dec_2.context.attach_mc(mc_2) dec_mc_2 = dec_2.update_api_server_access_profile(mc_2) - ground_truth_api_server_access_profile_2 = self.models.ManagedClusterAPIServerAccessProfile( - enable_vnet_integration=True, - subnet_id=apiserver_subnet_id, + ground_truth_api_server_access_profile_2 = ( + self.models.ManagedClusterAPIServerAccessProfile( + enable_vnet_integration=True, + subnet_id=apiserver_subnet_id, + ) ) ground_truth_mc_2 = self.models.ManagedCluster( location="test_location", @@ -5283,12 +5589,16 @@ def test_update_api_server_access_profile(self): api_server_access_profile = self.models.ManagedClusterAPIServerAccessProfile() api_server_access_profile.enable_vnet_integration = True api_server_access_profile.enable_private_cluster = True - mc_3 = self.models.ManagedCluster(location="test_location", api_server_access_profile=api_server_access_profile) + mc_3 = self.models.ManagedCluster( + location="test_location", + api_server_access_profile=api_server_access_profile, + ) dec_3.context.attach_mc(mc_3) dec_mc_3 = dec_3.update_api_server_access_profile(mc_3) - ground_truth_api_server_access_profile_3 = self.models.ManagedClusterAPIServerAccessProfile( - enable_vnet_integration=True, - enable_private_cluster=False + ground_truth_api_server_access_profile_3 = ( + self.models.ManagedClusterAPIServerAccessProfile( + enable_vnet_integration=True, enable_private_cluster=False + ) ) ground_truth_mc_3 = self.models.ManagedCluster( location="test_location", @@ -5306,12 +5616,16 @@ def test_update_api_server_access_profile(self): ) api_server_access_profile = self.models.ManagedClusterAPIServerAccessProfile() api_server_access_profile.enable_vnet_integration = True - mc_4 = self.models.ManagedCluster(location="test_location", api_server_access_profile=api_server_access_profile) + mc_4 = self.models.ManagedCluster( + location="test_location", + api_server_access_profile=api_server_access_profile, + ) dec_4.context.attach_mc(mc_4) dec_mc_4 = dec_4.update_api_server_access_profile(mc_4) - ground_truth_api_server_access_profile_4 = self.models.ManagedClusterAPIServerAccessProfile( - enable_vnet_integration=True, - enable_private_cluster=True + ground_truth_api_server_access_profile_4 = ( + self.models.ManagedClusterAPIServerAccessProfile( + enable_vnet_integration=True, enable_private_cluster=True + ) ) ground_truth_mc_4 = self.models.ManagedCluster( location="test_location", @@ -5536,16 +5850,22 @@ def test_update_pod_identity_profile(self): self.assertEqual(dec_mc_4, ground_truth_mc_4) def test_update_oidc_issuer_profile__default_value(self): - dec = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) - mc = self.models.ManagedCluster(location="test_location") - dec.context.attach_mc(mc) + dec = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) + mc = self.models.ManagedCluster(location="test_location") + dec.context.attach_mc(mc) updated_mc = dec.update_oidc_issuer_profile(mc) self.assertIsNone(updated_mc.oidc_issuer_profile) def test_update_oidc_issuer_profile__default_value_mc_enabled(self): - dec = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) + dec = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) mc = self.models.ManagedCluster(location="test_location") - mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile(enabled=True) + mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile( + enabled=True + ) dec.context.attach_mc(mc) updated_mc = dec.update_oidc_issuer_profile(mc) self.assertTrue(updated_mc.oidc_issuer_profile.enabled) @@ -5575,21 +5895,27 @@ def test_update_oidc_issuer_profile__enabled_mc_enabled(self): CUSTOM_MGMT_AKS_PREVIEW, ) mc = self.models.ManagedCluster(location="test_location") - mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile(enabled=True) + mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile( + enabled=True + ) dec.context.attach_mc(mc) updated_mc = dec.update_oidc_issuer_profile(mc) self.assertIsNotNone(updated_mc.oidc_issuer_profile) self.assertTrue(updated_mc.oidc_issuer_profile.enabled) def test_update_workload_identity_profile__default_value(self): - dec = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) + dec = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) mc = self.models.ManagedCluster(location="test_location") dec.context.attach_mc(mc) updated_mc = dec.update_workload_identity_profile(mc) self.assertIsNone(updated_mc.security_profile) def test_update_workload_identity_profile__default_value_mc_enabled(self): - dec = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) + dec = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) mc = self.models.ManagedCluster(location="test_location") mc.security_profile = self.models.ManagedClusterSecurityProfile( workload_identity=self.models.ManagedClusterSecurityProfileWorkloadIdentity( @@ -5610,7 +5936,9 @@ def test_update_workload_identity_profile__enabled(self): CUSTOM_MGMT_AKS_PREVIEW, ) mc = self.models.ManagedCluster(location="test_location") - mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile(enabled=True) + mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile( + enabled=True + ) dec.context.attach_mc(mc) updated_mc = dec.update_workload_identity_profile(mc) self.assertTrue(updated_mc.security_profile.workload_identity.enabled) @@ -5625,7 +5953,9 @@ def test_update_workload_identity_profile__disabled(self): CUSTOM_MGMT_AKS_PREVIEW, ) mc = self.models.ManagedCluster(location="test_location") - mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile(enabled=True) + mc.oidc_issuer_profile = self.models.ManagedClusterOIDCIssuerProfile( + enabled=True + ) dec.context.attach_mc(mc) updated_mc = dec.update_workload_identity_profile(mc) self.assertFalse(updated_mc.security_profile.workload_identity.enabled) @@ -5661,9 +5991,11 @@ def test_update_image_cleaner(self): dec_1.context.attach_mc(mc_1) dec_mc_1 = dec_1.update_image_cleaner(mc_1) - ground_truth_image_cleaner_profile_1 = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=True, - interval_hours=7*24, + ground_truth_image_cleaner_profile_1 = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=True, + interval_hours=7 * 24, + ) ) ground_truth_security_profile_1 = self.models.ManagedClusterSecurityProfile( image_cleaner=ground_truth_image_cleaner_profile_1, @@ -5677,15 +6009,15 @@ def test_update_image_cleaner(self): dec_2 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "image_cleaner_interval_hours": 24 - }, + {"image_cleaner_interval_hours": 24}, CUSTOM_MGMT_AKS_PREVIEW, ) security_profile = self.models.ManagedClusterSecurityProfile() - security_profile.image_cleaner = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=True, - interval_hours=25, + security_profile.image_cleaner = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=True, + interval_hours=25, + ) ) mc_2 = self.models.ManagedCluster( location="test_location", @@ -5694,9 +6026,11 @@ def test_update_image_cleaner(self): dec_2.context.attach_mc(mc_2) dec_mc_2 = dec_2.update_image_cleaner(mc_2) - ground_truth_image_cleaner_profile_2 = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=True, - interval_hours=24, + ground_truth_image_cleaner_profile_2 = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=True, + interval_hours=24, + ) ) ground_truth_security_profile_2 = self.models.ManagedClusterSecurityProfile( image_cleaner=ground_truth_image_cleaner_profile_2, @@ -5716,9 +6050,11 @@ def test_update_image_cleaner(self): CUSTOM_MGMT_AKS_PREVIEW, ) security_profile = self.models.ManagedClusterSecurityProfile() - security_profile.image_cleaner = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=False, - interval_hours=25, + security_profile.image_cleaner = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=False, + interval_hours=25, + ) ) mc_3 = self.models.ManagedCluster( location="test_location", @@ -5727,9 +6063,11 @@ def test_update_image_cleaner(self): dec_3.context.attach_mc(mc_3) dec_mc_3 = dec_3.update_image_cleaner(mc_3) - ground_truth_image_cleaner_profile_3 = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=True, - interval_hours=25, + ground_truth_image_cleaner_profile_3 = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=True, + interval_hours=25, + ) ) ground_truth_security_profile_3 = self.models.ManagedClusterSecurityProfile( image_cleaner=ground_truth_image_cleaner_profile_3, @@ -5749,9 +6087,11 @@ def test_update_image_cleaner(self): CUSTOM_MGMT_AKS_PREVIEW, ) security_profile = self.models.ManagedClusterSecurityProfile() - security_profile.image_cleaner = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=True, - interval_hours=25, + security_profile.image_cleaner = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=True, + interval_hours=25, + ) ) mc_4 = self.models.ManagedCluster( location="test_location", @@ -5760,9 +6100,11 @@ def test_update_image_cleaner(self): dec_4.context.attach_mc(mc_4) dec_mc_4 = dec_4.update_image_cleaner(mc_4) - ground_truth_image_cleaner_profile_4 = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=False, - interval_hours=25, + ground_truth_image_cleaner_profile_4 = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=False, + interval_hours=25, + ) ) ground_truth_security_profile_4 = self.models.ManagedClusterSecurityProfile( image_cleaner=ground_truth_image_cleaner_profile_4, @@ -5783,9 +6125,11 @@ def test_update_image_cleaner(self): CUSTOM_MGMT_AKS_PREVIEW, ) security_profile = self.models.ManagedClusterSecurityProfile() - security_profile.image_cleaner = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=False, - interval_hours=25, + security_profile.image_cleaner = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=False, + interval_hours=25, + ) ) mc_5 = self.models.ManagedCluster( location="test_location", @@ -5794,9 +6138,11 @@ def test_update_image_cleaner(self): dec_5.context.attach_mc(mc_5) dec_mc_5 = dec_5.update_image_cleaner(mc_5) - ground_truth_image_cleaner_profile_5 = self.models.ManagedClusterSecurityProfileImageCleaner( - enabled=True, - interval_hours=24, + ground_truth_image_cleaner_profile_5 = ( + self.models.ManagedClusterSecurityProfileImageCleaner( + enabled=True, + interval_hours=24, + ) ) ground_truth_security_profile_5 = self.models.ManagedClusterSecurityProfile( image_cleaner=ground_truth_image_cleaner_profile_5, @@ -5824,7 +6170,9 @@ def test_update_azure_keyvault_kms(self): ) self.assertEqual(dec_mc_1, ground_truth_mc_1) - key_id_1 = "https://fakekeyvault.vault.azure.net/secrets/fakekeyname/fakekeyversion" + key_id_1 = ( + "https://fakekeyvault.vault.azure.net/secrets/fakekeyname/fakekeyversion" + ) dec_2 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, @@ -5909,9 +6257,11 @@ def test_update_azure_keyvault_kms(self): dec_mc_6 = dec_6.update_azure_keyvault_kms(mc_6) ground_truth_azure_keyvault_kms_profile_6 = self.models.AzureKeyVaultKms() - ground_truth_azure_keyvault_kms_profile_6.enabled=False + ground_truth_azure_keyvault_kms_profile_6.enabled = False ground_truth_security_profile_6 = self.models.ManagedClusterSecurityProfile() - ground_truth_security_profile_6.azure_key_vault_kms=ground_truth_azure_keyvault_kms_profile_6 + ground_truth_security_profile_6.azure_key_vault_kms = ( + ground_truth_azure_keyvault_kms_profile_6 + ) ground_truth_mc_6 = self.models.ManagedCluster( location="test_location", security_profile=ground_truth_security_profile_6, @@ -5951,18 +6301,29 @@ def test_update_azure_keyvault_kms(self): def test_update_workload_auto_scaler_profile(self): # Throws exception when incorrect mc object is passed. - dec_1 = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) - with self.assertRaisesRegex(CLIInternalError, "^Unexpected mc object with type ''\.$"): + dec_1 = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) + with self.assertRaisesRegex( + CLIInternalError, r"^Unexpected mc object with type ''\.$" + ): dec_1.update_workload_auto_scaler_profile(None) # Throws exception when the mc object passed does not match the one in context. - dec_2 = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) - with self.assertRaisesRegex(CLIInternalError, "^Inconsistent state detected\. The incoming `mc` is not the same as the `mc` in the context\.$"): + dec_2 = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) + with self.assertRaisesRegex( + CLIInternalError, + r"^Inconsistent state detected\. The incoming `mc` is not the same as the `mc` in the context\.$", + ): mc_in = self.models.ManagedCluster(location="test_location") dec_2.update_workload_auto_scaler_profile(mc_in) # Leaves profile as None without raw parameters. - dec_3 = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) + dec_3 = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) mc_in = self.models.ManagedCluster(location="test_location") dec_3.context.attach_mc(mc_in) mc_out = dec_3.update_workload_auto_scaler_profile(mc_in) @@ -5970,10 +6331,15 @@ def test_update_workload_auto_scaler_profile(self): self.assertIsNone(mc_out.workload_auto_scaler_profile) # Leaves existing profile untouched without raw parameters. - dec_4 = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW) + dec_4 = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {}, CUSTOM_MGMT_AKS_PREVIEW + ) profile = self.models.ManagedClusterWorkloadAutoScalerProfile( - keda = self.models.ManagedClusterWorkloadAutoScalerProfileKeda(enabled=True)) - mc_in = self.models.ManagedCluster(location="test_location", workload_auto_scaler_profile = profile) + keda=self.models.ManagedClusterWorkloadAutoScalerProfileKeda(enabled=True) + ) + mc_in = self.models.ManagedCluster( + location="test_location", workload_auto_scaler_profile=profile + ) dec_4.context.attach_mc(mc_in) mc_out = dec_4.update_workload_auto_scaler_profile(mc_in) self.assertEqual(mc_out, mc_in) @@ -5982,7 +6348,9 @@ def test_update_workload_auto_scaler_profile(self): self.assertTrue(mc_out.workload_auto_scaler_profile.keda.enabled) # Enables keda when enable_keda is True. - dec_5 = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {"enable_keda": True}, CUSTOM_MGMT_AKS_PREVIEW) + dec_5 = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {"enable_keda": True}, CUSTOM_MGMT_AKS_PREVIEW + ) mc_in = self.models.ManagedCluster(location="test_location") dec_5.context.attach_mc(mc_in) mc_out = dec_5.update_workload_auto_scaler_profile(mc_in) @@ -5992,10 +6360,15 @@ def test_update_workload_auto_scaler_profile(self): self.assertTrue(mc_out.workload_auto_scaler_profile.keda.enabled) # Enables keda in existing profile when enable_keda is True. - dec_6 = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {"enable_keda": True}, CUSTOM_MGMT_AKS_PREVIEW) + dec_6 = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {"enable_keda": True}, CUSTOM_MGMT_AKS_PREVIEW + ) profile = self.models.ManagedClusterWorkloadAutoScalerProfile( - keda = self.models.ManagedClusterWorkloadAutoScalerProfileKeda(enabled=False)) - mc_in = self.models.ManagedCluster(location="test_location", workload_auto_scaler_profile = profile) + keda=self.models.ManagedClusterWorkloadAutoScalerProfileKeda(enabled=False) + ) + mc_in = self.models.ManagedCluster( + location="test_location", workload_auto_scaler_profile=profile + ) dec_6.context.attach_mc(mc_in) mc_out = dec_6.update_workload_auto_scaler_profile(mc_in) self.assertEqual(mc_out, mc_in) @@ -6004,7 +6377,9 @@ def test_update_workload_auto_scaler_profile(self): self.assertTrue(mc_out.workload_auto_scaler_profile.keda.enabled) # Disables keda when disable_keda is True. - dec_7 = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {"disable_keda": True}, CUSTOM_MGMT_AKS_PREVIEW) + dec_7 = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {"disable_keda": True}, CUSTOM_MGMT_AKS_PREVIEW + ) mc_in = self.models.ManagedCluster(location="test_location") dec_7.context.attach_mc(mc_in) mc_out = dec_7.update_workload_auto_scaler_profile(mc_in) @@ -6014,10 +6389,15 @@ def test_update_workload_auto_scaler_profile(self): self.assertFalse(mc_out.workload_auto_scaler_profile.keda.enabled) # Disables keda in existing profile when disable_keda is True. - dec_8 = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {"disable_keda": True}, CUSTOM_MGMT_AKS_PREVIEW) + dec_8 = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, self.client, {"disable_keda": True}, CUSTOM_MGMT_AKS_PREVIEW + ) profile = self.models.ManagedClusterWorkloadAutoScalerProfile( - keda = self.models.ManagedClusterWorkloadAutoScalerProfileKeda(enabled=True)) - mc_in = self.models.ManagedCluster(location="test_location", workload_auto_scaler_profile = profile) + keda=self.models.ManagedClusterWorkloadAutoScalerProfileKeda(enabled=True) + ) + mc_in = self.models.ManagedCluster( + location="test_location", workload_auto_scaler_profile=profile + ) dec_8.context.attach_mc(mc_in) mc_out = dec_8.update_workload_auto_scaler_profile(mc_in) self.assertEqual(mc_out, mc_in) @@ -6026,7 +6406,12 @@ def test_update_workload_auto_scaler_profile(self): self.assertFalse(mc_out.workload_auto_scaler_profile.keda.enabled) # Throws exception when both enable_keda and disable_keda are True. - dec_9 = AKSPreviewManagedClusterUpdateDecorator(self.cmd, self.client, {"enable_keda": True, "disable_keda": True}, CUSTOM_MGMT_AKS_PREVIEW) + dec_9 = AKSPreviewManagedClusterUpdateDecorator( + self.cmd, + self.client, + {"enable_keda": True, "disable_keda": True}, + CUSTOM_MGMT_AKS_PREVIEW, + ) mc_in = self.models.ManagedCluster(location="test_location") dec_9.context.attach_mc(mc_in) with self.assertRaises(MutuallyExclusiveArgumentError): @@ -6039,17 +6424,13 @@ def test_update_defender(self): self.client, { "enable_defender": True, - "defender_config": get_test_data_file_path( - "defenderconfig.json" - ), + "defender_config": get_test_data_file_path("defenderconfig.json"), }, CUSTOM_MGMT_AKS_PREVIEW, ) mc_1 = self.models.ManagedCluster(location="test_location") dec_1.context.attach_mc(mc_1) - dec_1.context.set_intermediate( - "subscription_id", "test_subscription_id" - ) + dec_1.context.set_intermediate("subscription_id", "test_subscription_id") dec_mc_1 = dec_1.update_defender(mc_1) @@ -6085,9 +6466,7 @@ def test_update_defender(self): ), ) dec_2.context.attach_mc(mc_2) - dec_2.context.set_intermediate( - "subscription_id", "test_subscription_id" - ) + dec_2.context.set_intermediate("subscription_id", "test_subscription_id") dec_mc_2 = dec_2.update_defender(mc_2) @@ -6115,16 +6494,16 @@ def test_update_custom_ca_certificates(self): ) mc_1 = self.models.ManagedCluster(location="test_location") dec_1.context.attach_mc(mc_1) - dec_1.context.set_intermediate( - "subscription_id", "test_subscription_id" - ) + dec_1.context.set_intermediate("subscription_id", "test_subscription_id") dec_mc_1 = dec_1.update_custom_ca_trust_certificates(mc_1) ground_truth_mc_1 = self.models.ManagedCluster( location="test_location", security_profile=self.models.ManagedClusterSecurityProfile( - custom_ca_trust_certificates=[str.encode(CONST_CUSTOM_CA_TEST_CERT) for _ in range(2)] + custom_ca_trust_certificates=[ + str.encode(CONST_CUSTOM_CA_TEST_CERT) for _ in range(2) + ] ), ) self.assertEqual(dec_mc_1, ground_truth_mc_1) @@ -6143,9 +6522,7 @@ def test_update_custom_ca_certificates(self): ), ) dec_2.context.attach_mc(mc_2) - dec_2.context.set_intermediate( - "subscription_id", "test_subscription_id" - ) + dec_2.context.set_intermediate("subscription_id", "test_subscription_id") dec_mc_2 = dec_2.update_custom_ca_trust_certificates(mc_2) @@ -6177,9 +6554,7 @@ def test_update_node_restriction(self): dec_2 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "enable_node_restriction": True - }, + {"enable_node_restriction": True}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_2 = self.models.ManagedCluster(location="test_location") @@ -6189,8 +6564,8 @@ def test_update_node_restriction(self): ground_truth_mc_2 = self.models.ManagedCluster( location="test_location", security_profile=self.models.ManagedClusterSecurityProfile( - node_restriction = self.models.ManagedClusterSecurityProfileNodeRestriction( - enabled = True, + node_restriction=self.models.ManagedClusterSecurityProfileNodeRestriction( + enabled=True, ) ), ) @@ -6211,8 +6586,8 @@ def test_update_node_restriction(self): ground_truth_mc_3 = self.models.ManagedCluster( location="test_location", security_profile=self.models.ManagedClusterSecurityProfile( - node_restriction = self.models.ManagedClusterSecurityProfileNodeRestriction( - enabled = False, + node_restriction=self.models.ManagedClusterSecurityProfileNodeRestriction( + enabled=False, ) ), ) @@ -6238,9 +6613,7 @@ def test_update_vpa(self): dec_2 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "enable_vpa": True - }, + {"enable_vpa": True}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_2 = self.models.ManagedCluster(location="test_location") @@ -6250,8 +6623,8 @@ def test_update_vpa(self): ground_truth_mc_2 = self.models.ManagedCluster( location="test_location", workload_auto_scaler_profile=self.models.ManagedClusterWorkloadAutoScalerProfile( - vertical_pod_autoscaler = self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler( - enabled = True, + vertical_pod_autoscaler=self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler( + enabled=True, ) ), ) @@ -6272,10 +6645,10 @@ def test_update_vpa(self): ground_truth_mc_3 = self.models.ManagedCluster( location="test_location", workload_auto_scaler_profile=self.models.ManagedClusterWorkloadAutoScalerProfile( - vertical_pod_autoscaler = self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler( - enabled = False, + vertical_pod_autoscaler=self.models.ManagedClusterWorkloadAutoScalerProfileVerticalPodAutoscaler( + enabled=False, ) - ) + ), ) self.assertEqual(dec_mc_3, ground_truth_mc_3) @@ -6312,10 +6685,12 @@ def test_update_linux_profile(self): location="test_location", linux_profile=self.models.ContainerServiceLinuxProfile( admin_username="azureuser", - ssh= self.models.ContainerServiceSshConfiguration( - public_keys=[self.models.ContainerServiceSshPublicKey(key_data="test_key")] - ) - ) + ssh=self.models.ContainerServiceSshConfiguration( + public_keys=[ + self.models.ContainerServiceSshPublicKey(key_data="test_key") + ] + ), + ), ) self.assertEqual(dec_mc_1, ground_truth_mc_1) @@ -6329,10 +6704,12 @@ def test_update_linux_profile(self): location="test_location", linux_profile=self.models.ContainerServiceLinuxProfile( admin_username="olduser", - ssh= self.models.ContainerServiceSshConfiguration( - public_keys=[self.models.ContainerServiceSshPublicKey(key_data="old_key")] - ) - ) + ssh=self.models.ContainerServiceSshConfiguration( + public_keys=[ + self.models.ContainerServiceSshPublicKey(key_data="old_key") + ] + ), + ), ) dec_2.context.attach_mc(mc_2) dec_mc_2 = dec_2.update_linux_profile(mc_2) @@ -6340,10 +6717,12 @@ def test_update_linux_profile(self): location="test_location", linux_profile=self.models.ContainerServiceLinuxProfile( admin_username="olduser", - ssh= self.models.ContainerServiceSshConfiguration( - public_keys=[self.models.ContainerServiceSshPublicKey(key_data="new_key")] - ) - ) + ssh=self.models.ContainerServiceSshConfiguration( + public_keys=[ + self.models.ContainerServiceSshPublicKey(key_data="new_key") + ] + ), + ), ) self.assertEqual(dec_mc_2, ground_truth_mc_2) @@ -6351,10 +6730,7 @@ def test_update_service_mesh_profile(self): dec_1 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "enable_azure_service_mesh": True, - "revision": "asm-1-18" - }, + {"enable_azure_service_mesh": True, "revision": "asm-1-18"}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_1 = self.models.ManagedCluster( @@ -6365,11 +6741,8 @@ def test_update_service_mesh_profile(self): ground_truth_mc_1 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( - mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-18"] - ) - ) + mode="Istio", istio=self.models.IstioServiceMesh(revisions=["asm-1-18"]) + ), ) self.assertEqual(dec_mc_1, ground_truth_mc_1) @@ -6401,8 +6774,8 @@ def test_update_service_mesh_profile(self): ) ] ) - ) - ) + ), + ), ) self.assertEqual(dec_mc_2, ground_truth_mc_2) @@ -6431,15 +6804,15 @@ def test_update_service_mesh_profile(self): istio=self.models.IstioServiceMesh( certificate_authority=self.models.IstioCertificateAuthority( plugin=self.models.IstioPluginCertificateAuthority( - key_vault_id='/subscriptions/8ecadfc9-d1a3-4ea4-b844-0d9f87e4d7c8/resourceGroups/foo/providers/Microsoft.KeyVault/vaults/foo', - cert_object_name='my-ca-cert', - key_object_name='my-ca-key', - root_cert_object_name='my-root-cert', - cert_chain_object_name='my-cert-chain', + key_vault_id="/subscriptions/8ecadfc9-d1a3-4ea4-b844-0d9f87e4d7c8/resourceGroups/foo/providers/Microsoft.KeyVault/vaults/foo", + cert_object_name="my-ca-cert", + key_object_name="my-ca-key", + root_cert_object_name="my-root-cert", + cert_chain_object_name="my-cert-chain", ) ) - ) - ) + ), + ), ) self.assertEqual(dec_mc_3, ground_truth_mc_3) @@ -6466,13 +6839,12 @@ def test_update_service_mesh_profile(self): components=self.models.IstioComponents( egress_gateways=[ self.models.IstioEgressGateway( - enabled=True, - nodeSelector={"istio": "egress"} + enabled=True, nodeSelector={"istio": "egress"} ) ] ) - ) - ) + ), + ), ) self.assertEqual(dec_mc_4, ground_truth_mc_4) @@ -6482,18 +6854,15 @@ def test_update_service_mesh_profile(self): self.client, { "mesh_upgrade_command": CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_START, - "revision": "asm-1-18" + "revision": "asm-1-18", }, CUSTOM_MGMT_AKS_PREVIEW, ) mc_5 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( - mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-17"] - ) - ) + mode="Istio", istio=self.models.IstioServiceMesh(revisions=["asm-1-17"]) + ), ) dec_5.context.attach_mc(mc_5) dec_mc_5 = dec_5.update_azure_service_mesh_profile(mc_5) @@ -6501,10 +6870,8 @@ def test_update_service_mesh_profile(self): location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-17", "asm-1-18"] - ) - ) + istio=self.models.IstioServiceMesh(revisions=["asm-1-17", "asm-1-18"]), + ), ) self.assertEqual(dec_mc_5, ground_truth_mc_5) @@ -6512,34 +6879,27 @@ def test_update_service_mesh_profile(self): dec_6 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "mesh_upgrade_command": CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_COMPLETE - }, + {"mesh_upgrade_command": CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_COMPLETE}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_6 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-17", "asm-1-18"] - ) - ) + istio=self.models.IstioServiceMesh(revisions=["asm-1-17", "asm-1-18"]), + ), ) dec_6.context.attach_mc(mc_6) with patch( - "azext_aks_preview.managed_cluster_decorator.prompt_y_n", - return_value=True, + "azext_aks_preview.managed_cluster_decorator.prompt_y_n", + return_value=True, ): dec_mc_6 = dec_6.update_azure_service_mesh_profile(mc_6) ground_truth_mc_6 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( - mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-18"] - ) - ) + mode="Istio", istio=self.models.IstioServiceMesh(revisions=["asm-1-18"]) + ), ) self.assertEqual(dec_mc_6, ground_truth_mc_6) @@ -6547,34 +6907,27 @@ def test_update_service_mesh_profile(self): dec_7 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "mesh_upgrade_command": CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_ROLLBACK - }, + {"mesh_upgrade_command": CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_ROLLBACK}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_7 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-17", "asm-1-18"] - ) - ) + istio=self.models.IstioServiceMesh(revisions=["asm-1-17", "asm-1-18"]), + ), ) dec_7.context.attach_mc(mc_7) with patch( - "azext_aks_preview.managed_cluster_decorator.prompt_y_n", - return_value=True, + "azext_aks_preview.managed_cluster_decorator.prompt_y_n", + return_value=True, ): dec_mc_7 = dec_7.update_azure_service_mesh_profile(mc_7) ground_truth_mc_7 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( - mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-17"] - ) - ) + mode="Istio", istio=self.models.IstioServiceMesh(revisions=["asm-1-17"]) + ), ) self.assertEqual(dec_mc_7, ground_truth_mc_7) @@ -6582,19 +6935,14 @@ def test_update_service_mesh_profile(self): dec_8 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "mesh_upgrade_command": CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_ROLLBACK - }, + {"mesh_upgrade_command": CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_ROLLBACK}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_8 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( - mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-17"] - ) - ) + mode="Istio", istio=self.models.IstioServiceMesh(revisions=["asm-1-17"]) + ), ) dec_8.context.attach_mc(mc_8) with self.assertRaises(ArgumentUsageError): @@ -6604,19 +6952,14 @@ def test_update_service_mesh_profile(self): dec_9 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "mesh_upgrade_command": CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_COMPLETE - }, + {"mesh_upgrade_command": CONST_AZURE_SERVICE_MESH_UPGRADE_COMMAND_COMPLETE}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_9 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( - mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-17"] - ) - ) + mode="Istio", istio=self.models.IstioServiceMesh(revisions=["asm-1-17"]) + ), ) dec_9.context.attach_mc(mc_9) with self.assertRaises(ArgumentUsageError): @@ -6634,11 +6977,8 @@ def test_update_service_mesh_profile(self): mc_10 = self.models.ManagedCluster( location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( - mode="Istio", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-17"] - ) - ) + mode="Istio", istio=self.models.IstioServiceMesh(revisions=["asm-1-17"]) + ), ) dec_10.context.attach_mc(mc_10) with self.assertRaises(ArgumentUsageError): @@ -6657,10 +6997,8 @@ def test_update_service_mesh_profile(self): location="test_location", service_mesh_profile=self.models.ServiceMeshProfile( mode="Disabled", - istio=self.models.IstioServiceMesh( - revisions=["asm-1-17"] - ) - ) + istio=self.models.IstioServiceMesh(revisions=["asm-1-17"]), + ), ) dec_10.context.attach_mc(mc_10) with self.assertRaises(ArgumentUsageError): @@ -6682,7 +7020,6 @@ def test_update_service_mesh_profile(self): with self.assertRaises(ArgumentUsageError): dec_11.update_azure_service_mesh_profile(mc_11) - def test_update_upgrade_settings(self): # Should not update mc if unset dec_0 = AKSPreviewManagedClusterUpdateDecorator( @@ -6693,13 +7030,13 @@ def test_update_upgrade_settings(self): ) mc_0 = self.models.ManagedCluster( location="test_location", - upgrade_settings=self.models.ClusterUpgradeSettings() + upgrade_settings=self.models.ClusterUpgradeSettings(), ) dec_0.context.attach_mc(mc_0) dec_mc_0 = dec_0.update_upgrade_settings(mc_0) ground_truth_mc_0 = self.models.ManagedCluster( location="test_location", - upgrade_settings=self.models.ClusterUpgradeSettings() + upgrade_settings=self.models.ClusterUpgradeSettings(), ) self.assertEqual(dec_mc_0, ground_truth_mc_0) @@ -6712,22 +7049,20 @@ def test_update_upgrade_settings(self): mc_1 = self.models.ManagedCluster( location="test_location", upgrade_settings=self.models.ClusterUpgradeSettings( - override_settings = self.models.UpgradeOverrideSettings( - force_upgrade=True, - until=parse("2023-04-01T13:00:00Z") + override_settings=self.models.UpgradeOverrideSettings( + force_upgrade=True, until=parse("2023-04-01T13:00:00Z") ) - ) + ), ) dec_1.context.attach_mc(mc_1) dec_mc_1 = dec_1.update_upgrade_settings(mc_1) ground_truth_mc_1 = self.models.ManagedCluster( location="test_location", upgrade_settings=self.models.ClusterUpgradeSettings( - override_settings = self.models.UpgradeOverrideSettings( - force_upgrade=True, - until=parse("2023-04-01T13:00:00Z") + override_settings=self.models.UpgradeOverrideSettings( + force_upgrade=True, until=parse("2023-04-01T13:00:00Z") ) - ) + ), ) self.assertEqual(dec_mc_1, ground_truth_mc_1) @@ -6741,22 +7076,20 @@ def test_update_upgrade_settings(self): mc_2 = self.models.ManagedCluster( location="test_location", upgrade_settings=self.models.ClusterUpgradeSettings( - override_settings = self.models.UpgradeOverrideSettings( - force_upgrade=True, - until=parse("2099-04-01T13:00:00Z") + override_settings=self.models.UpgradeOverrideSettings( + force_upgrade=True, until=parse("2099-04-01T13:00:00Z") ) - ) + ), ) dec_2.context.attach_mc(mc_2) dec_mc_2 = dec_2.update_upgrade_settings(mc_2) ground_truth_mc_2 = self.models.ManagedCluster( location="test_location", upgrade_settings=self.models.ClusterUpgradeSettings( - override_settings = self.models.UpgradeOverrideSettings( - force_upgrade=False, - until=parse("2099-04-01T13:00:00Z") + override_settings=self.models.UpgradeOverrideSettings( + force_upgrade=False, until=parse("2099-04-01T13:00:00Z") ) - ) + ), ) self.assertEqual(dec_mc_2, ground_truth_mc_2) @@ -6772,9 +7105,17 @@ def test_update_upgrade_settings(self): ) dec_3.context.attach_mc(mc_3) dec_mc_3 = dec_3.update_upgrade_settings(mc_3) - self.assertEqual(dec_mc_3.upgrade_settings.override_settings.force_upgrade, True) - self.assertGreater(dec_mc_3.upgrade_settings.override_settings.until.timestamp(), (datetime.datetime.utcnow() + datetime.timedelta(days=2)).timestamp()) - self.assertLess(dec_mc_3.upgrade_settings.override_settings.until.timestamp(), (datetime.datetime.utcnow() + datetime.timedelta(days=4)).timestamp()) + self.assertEqual( + dec_mc_3.upgrade_settings.override_settings.force_upgrade, True + ) + self.assertGreater( + dec_mc_3.upgrade_settings.override_settings.until.timestamp(), + (datetime.datetime.utcnow() + datetime.timedelta(days=2)).timestamp(), + ) + self.assertLess( + dec_mc_3.upgrade_settings.override_settings.until.timestamp(), + (datetime.datetime.utcnow() + datetime.timedelta(days=4)).timestamp(), + ) # Set Until dec_4 = AKSPreviewManagedClusterUpdateDecorator( @@ -6786,20 +7127,20 @@ def test_update_upgrade_settings(self): mc_4 = self.models.ManagedCluster( location="test_location", upgrade_settings=self.models.ClusterUpgradeSettings( - override_settings = self.models.UpgradeOverrideSettings( + override_settings=self.models.UpgradeOverrideSettings( until=parse("2023-01-01T13:00:00Z") ) - ) + ), ) dec_4.context.attach_mc(mc_4) dec_mc_4 = dec_4.update_upgrade_settings(mc_4) ground_truth_mc_4 = self.models.ManagedCluster( location="test_location", upgrade_settings=self.models.ClusterUpgradeSettings( - override_settings = self.models.UpgradeOverrideSettings( + override_settings=self.models.UpgradeOverrideSettings( until=parse("2023-04-01T13:00:00Z") ) - ) + ), ) self.assertEqual(dec_mc_4, ground_truth_mc_4) @@ -6807,29 +7148,29 @@ def test_update_upgrade_settings(self): dec_5 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - {"enable_force_upgrade": True, - "upgrade_override_until": "2023-04-01T13:00:00Z"}, + { + "enable_force_upgrade": True, + "upgrade_override_until": "2023-04-01T13:00:00Z", + }, CUSTOM_MGMT_AKS_PREVIEW, ) mc_5 = self.models.ManagedCluster( location="test_location", upgrade_settings=self.models.ClusterUpgradeSettings( - override_settings = self.models.UpgradeOverrideSettings( - force_upgrade=True, - until=parse("2023-05-01T13:00:00Z") + override_settings=self.models.UpgradeOverrideSettings( + force_upgrade=True, until=parse("2023-05-01T13:00:00Z") ) - ) + ), ) dec_5.context.attach_mc(mc_5) dec_mc_5 = dec_5.update_upgrade_settings(mc_5) ground_truth_mc_5 = self.models.ManagedCluster( location="test_location", upgrade_settings=self.models.ClusterUpgradeSettings( - override_settings = self.models.UpgradeOverrideSettings( - force_upgrade=True, - until=parse("2023-04-01T13:00:00Z") + override_settings=self.models.UpgradeOverrideSettings( + force_upgrade=True, until=parse("2023-04-01T13:00:00Z") ) - ) + ), ) self.assertEqual(dec_mc_5, ground_truth_mc_5) @@ -6842,10 +7183,10 @@ def test_update_upgrade_settings(self): mc_6 = self.models.ManagedCluster( location="test_location", upgrade_settings=self.models.ClusterUpgradeSettings( - override_settings = self.models.UpgradeOverrideSettings( + override_settings=self.models.UpgradeOverrideSettings( until=parse("2023-05-01T13:00:00Z") ) - ) + ), ) dec_6.context.attach_mc(mc_6) with self.assertRaises(InvalidArgumentValueError): @@ -6884,15 +7225,11 @@ def test_enable_disable_cost_analysis(self): dec_6.update_metrics_profile(mc_6) def test_update_app_routing_profile(self): - # enable app routing dec_1 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "enable_app_routing": True, - "enable_kv": False - }, + {"enable_app_routing": True, "enable_kv": False}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_1 = self.models.ManagedCluster( @@ -6914,10 +7251,7 @@ def test_update_app_routing_profile(self): dec_2 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "enable_app_routing": True, - "enable_kv": True - }, + {"enable_app_routing": True, "enable_kv": True}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_2 = self.models.ManagedCluster( @@ -6932,11 +7266,15 @@ def test_update_app_routing_profile(self): enabled=True, ) ), - addon_profiles={CONST_AZURE_KEYVAULT_SECRETS_PROVIDER_ADDON_NAME: self.models.ManagedClusterAddonProfile( + addon_profiles={ + CONST_AZURE_KEYVAULT_SECRETS_PROVIDER_ADDON_NAME: self.models.ManagedClusterAddonProfile( enabled=True, - config={CONST_SECRET_ROTATION_ENABLED: "false", CONST_ROTATION_POLL_INTERVAL: "2m"} + config={ + CONST_SECRET_ROTATION_ENABLED: "false", + CONST_ROTATION_POLL_INTERVAL: "2m", + }, ) - } + }, ) self.assertEqual(dec_mc_2, ground_truth_mc_2) @@ -6958,9 +7296,9 @@ def test_update_app_routing_profile(self): location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( web_app_routing=self.models.ManagedClusterIngressProfileWebAppRouting( - enabled=False, + enabled=False, ) - ) + ), ) self.assertEqual(dec_mc_3, ground_truth_mc_3) # add dns zone resource ids @@ -6969,7 +7307,7 @@ def test_update_app_routing_profile(self): self.client, { "dns_zone_resource_ids": "test_dns_zone_resource_id_1,test_dns_zone_resource_id_2", - "add_dns_zone": True + "add_dns_zone": True, }, CUSTOM_MGMT_AKS_PREVIEW, ) @@ -6977,9 +7315,9 @@ def test_update_app_routing_profile(self): location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( web_app_routing=self.models.ManagedClusterIngressProfileWebAppRouting( - enabled=True, - ) - ) + enabled=True, + ) + ), ) dec_4.context.attach_mc(mc_4) dec_mc_4 = dec_4.update_app_routing_profile(mc_4) @@ -6987,10 +7325,13 @@ def test_update_app_routing_profile(self): location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( web_app_routing=self.models.ManagedClusterIngressProfileWebAppRouting( - enabled=True, - dns_zone_resource_ids=["test_dns_zone_resource_id_1","test_dns_zone_resource_id_2"] + enabled=True, + dns_zone_resource_ids=[ + "test_dns_zone_resource_id_1", + "test_dns_zone_resource_id_2", + ], ) - ) + ), ) self.assertEqual(dec_mc_4, ground_truth_mc_4) @@ -7001,7 +7342,7 @@ def test_update_app_routing_profile(self): self.client, { "dns_zone_resource_ids": "test_dns_zone_resource_id_1", - "delete_dns_zone": True + "delete_dns_zone": True, }, CUSTOM_MGMT_AKS_PREVIEW, ) @@ -7009,10 +7350,13 @@ def test_update_app_routing_profile(self): location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( web_app_routing=self.models.ManagedClusterIngressProfileWebAppRouting( - enabled=True, - dns_zone_resource_ids=["test_dns_zone_resource_id_1","test_dns_zone_resource_id_2"] - ) - ) + enabled=True, + dns_zone_resource_ids=[ + "test_dns_zone_resource_id_1", + "test_dns_zone_resource_id_2", + ], + ) + ), ) dec_5.context.attach_mc(mc_5) dec_mc_5 = dec_5.update_app_routing_profile(mc_5) @@ -7020,10 +7364,9 @@ def test_update_app_routing_profile(self): location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( web_app_routing=self.models.ManagedClusterIngressProfileWebAppRouting( - enabled=True, - dns_zone_resource_ids=["test_dns_zone_resource_id_2"] + enabled=True, dns_zone_resource_ids=["test_dns_zone_resource_id_2"] ) - ) + ), ) self.assertEqual(dec_mc_5, ground_truth_mc_5) @@ -7033,7 +7376,7 @@ def test_update_app_routing_profile(self): self.client, { "dns_zone_resource_ids": "test_dns_zone_resource_id_3,test_dns_zone_resource_id_4", - "update_dns_zone" :True + "update_dns_zone": True, }, CUSTOM_MGMT_AKS_PREVIEW, ) @@ -7041,10 +7384,13 @@ def test_update_app_routing_profile(self): location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( web_app_routing=self.models.ManagedClusterIngressProfileWebAppRouting( - enabled=True, - dns_zone_resource_ids=["test_dns_zone_resource_id_1","test_dns_zone_resource_id_2"] - ) - ) + enabled=True, + dns_zone_resource_ids=[ + "test_dns_zone_resource_id_1", + "test_dns_zone_resource_id_2", + ], + ) + ), ) dec_6.context.attach_mc(mc_6) dec_mc_6 = dec_6.update_app_routing_profile(mc_6) @@ -7053,10 +7399,13 @@ def test_update_app_routing_profile(self): location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( web_app_routing=self.models.ManagedClusterIngressProfileWebAppRouting( - enabled=True, - dns_zone_resource_ids=["test_dns_zone_resource_id_3","test_dns_zone_resource_id_4"] - ) - ) + enabled=True, + dns_zone_resource_ids=[ + "test_dns_zone_resource_id_3", + "test_dns_zone_resource_id_4", + ], + ) + ), ) self.assertEqual(dec_mc_6, ground_truth_mc_6) @@ -7064,19 +7413,20 @@ def test_update_app_routing_profile(self): dec_7 = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "list_dns_zones": True - }, + {"list_dns_zones": True}, CUSTOM_MGMT_AKS_PREVIEW, ) mc_7 = self.models.ManagedCluster( location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( web_app_routing=self.models.ManagedClusterIngressProfileWebAppRouting( - enabled=True, - dns_zone_resource_ids=["test_dns_zone_resource_id_1","test_dns_zone_resource_id_2"] - ) - ) + enabled=True, + dns_zone_resource_ids=[ + "test_dns_zone_resource_id_1", + "test_dns_zone_resource_id_2", + ], + ) + ), ) dec_7.context.attach_mc(mc_7) dec_mc_7 = dec_7.update_app_routing_profile(mc_7) @@ -7084,10 +7434,13 @@ def test_update_app_routing_profile(self): location="test_location", ingress_profile=self.models.ManagedClusterIngressProfile( web_app_routing=self.models.ManagedClusterIngressProfileWebAppRouting( - enabled=True, - dns_zone_resource_ids=["test_dns_zone_resource_id_1","test_dns_zone_resource_id_2"] - ) - ) + enabled=True, + dns_zone_resource_ids=[ + "test_dns_zone_resource_id_1", + "test_dns_zone_resource_id_2", + ], + ) + ), ) self.assertEqual(dec_mc_7, ground_truth_mc_7) @@ -7166,7 +7519,9 @@ def test_update_mc_profile_preview(self): ground_truth_network_profile_1 = self.models.ContainerServiceNetworkProfile( load_balancer_sku="standard", ) - ground_truth_identity_1 = self.models.ManagedClusterIdentity(type="SystemAssigned") + ground_truth_identity_1 = self.models.ManagedClusterIdentity( + type="SystemAssigned" + ) ground_truth_identity_profile_1 = { "kubeletidentity": self.models.UserAssignedIdentity( resource_id="test_resource_id", @@ -7191,21 +7546,16 @@ def test_update_mc_profile_preview(self): dec_1.context.raw_param.print_usage_statistics() - def test_setup_supportPlan(self): # default value in `aks_create` ltsDecorator = AKSPreviewManagedClusterCreateDecorator( self.cmd, self.client, - { - "k8s_support_plan": "AKSLongTermSupport" - }, + {"k8s_support_plan": "AKSLongTermSupport"}, CUSTOM_MGMT_AKS_PREVIEW, ) - premiumSKU = self.models.ManagedClusterSKU( - name="Base", - tier="Premium") + premiumSKU = self.models.ManagedClusterSKU(name="Base", tier="Premium") premiumCluster = self.models.ManagedCluster( location="test_location", support_plan=None, @@ -7228,13 +7578,13 @@ def test_setup_supportPlan(self): nonLTSDecorator = AKSPreviewManagedClusterCreateDecorator( self.cmd, self.client, - { - "k8s_support_plan": "KubernetesOfficial" - }, + {"k8s_support_plan": "KubernetesOfficial"}, CUSTOM_MGMT_AKS_PREVIEW, ) nonLTSDecorator.context.attach_mc(premiumCluster) - nonLTSClusterCalculated = nonLTSDecorator.set_up_k8s_support_plan(premiumCluster) + nonLTSClusterCalculated = nonLTSDecorator.set_up_k8s_support_plan( + premiumCluster + ) expectedNonLTSCluster = self.models.ManagedCluster( location="test_location", support_plan="KubernetesOfficial", @@ -7251,9 +7601,7 @@ def test_update_supportPlan(self): CUSTOM_MGMT_AKS_PREVIEW, ) - premiumSKU = self.models.ManagedClusterSKU( - name="Base", - tier="Premium") + premiumSKU = self.models.ManagedClusterSKU(name="Base", tier="Premium") ltsCluster = self.models.ManagedCluster( location="test_location", sku=premiumSKU, @@ -7271,13 +7619,13 @@ def test_update_supportPlan(self): disableLTSDecorator = AKSPreviewManagedClusterUpdateDecorator( self.cmd, self.client, - { - "k8s_support_plan": "KubernetesOfficial" - }, + {"k8s_support_plan": "KubernetesOfficial"}, CUSTOM_MGMT_AKS_PREVIEW, ) disableLTSDecorator.context.attach_mc(ltsCluster) - nonLTSClusterCalculated = disableLTSDecorator.update_k8s_support_plan(ltsCluster) + nonLTSClusterCalculated = disableLTSDecorator.update_k8s_support_plan( + ltsCluster + ) expectedNonLTSCluster = self.models.ManagedCluster( location="test_location", support_plan="KubernetesOfficial", @@ -7287,9 +7635,7 @@ def test_update_supportPlan(self): normalCluster = self.models.ManagedCluster( location="test_location", - sku=self.models.ManagedClusterSKU( - name="Base", - tier="Standard"), + sku=self.models.ManagedClusterSKU(name="Base", tier="Standard"), support_plan="KubernetesOfficial", ) noopDecorator3 = AKSPreviewManagedClusterUpdateDecorator( @@ -7302,5 +7648,6 @@ def test_update_supportPlan(self): normalClusterCalculated = noopDecorator3.update_k8s_support_plan(normalCluster) self.assertEqual(normalClusterCalculated, normalCluster) + if __name__ == "__main__": unittest.main() diff --git a/src/aks-preview/azext_aks_preview/tests/latest/test_validators.py b/src/aks-preview/azext_aks_preview/tests/latest/test_validators.py index b7156d30378..cfbaed0c7dd 100644 --- a/src/aks-preview/azext_aks_preview/tests/latest/test_validators.py +++ b/src/aks-preview/azext_aks_preview/tests/latest/test_validators.py @@ -5,24 +5,26 @@ import unittest from types import SimpleNamespace -from azure.cli.core.util import CLIError +import azext_aks_preview._validators as validators +import azext_aks_preview.azurecontainerstorage._consts as acstor_consts +import azext_aks_preview.azurecontainerstorage._validators as acstor_validator +from azext_aks_preview._consts import ADDONS from azure.cli.core.azclierror import ( ArgumentUsageError, InvalidArgumentValueError, MutuallyExclusiveArgumentError, ) -import azext_aks_preview._validators as validators -from azext_aks_preview._consts import ADDONS -import azext_aks_preview.azurecontainerstorage._validators as acstor_validator -import azext_aks_preview.azurecontainerstorage._consts as acstor_consts +from azure.cli.core.util import CLIError class TestValidateIPRanges(unittest.TestCase): def test_simultaneous_allow_and_disallow_with_spaces(self): api_server_authorized_ip_ranges = " 0.0.0.0/32 , 129.1.1.1.1 " namespace = Namespace(api_server_authorized_ip_ranges) - err = ("Setting --api-server-authorized-ip-ranges to 0.0.0.0/32 is not allowed with other IP ranges." - "Refer to https://aka.ms/aks/whitelist for more details") + err = ( + "Setting --api-server-authorized-ip-ranges to 0.0.0.0/32 is not allowed with other IP ranges." + "Refer to https://aka.ms/aks/whitelist for more details" + ) with self.assertRaises(CLIError) as cm: validators.validate_ip_ranges(namespace) @@ -39,7 +41,7 @@ def test_simultaneous_enable_and_disable_with_spaces(self): self.assertEqual(str(cm.exception), err) def test_disable_authorized_ip_ranges(self): - api_server_authorized_ip_ranges = '' + api_server_authorized_ip_ranges = "" namespace = Namespace(api_server_authorized_ip_ranges) validators.validate_ip_ranges(namespace) @@ -72,7 +74,12 @@ def test_IPv6(self): class Namespace: - def __init__(self, api_server_authorized_ip_ranges=None, cluster_autoscaler_profile=None, kubernetes_version=None): + def __init__( + self, + api_server_authorized_ip_ranges=None, + cluster_autoscaler_profile=None, + kubernetes_version=None, + ): self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges self.cluster_autoscaler_profile = cluster_autoscaler_profile self.kubernetes_version = kubernetes_version @@ -81,7 +88,7 @@ def __init__(self, api_server_authorized_ip_ranges=None, cluster_autoscaler_prof class TestSubnetId(unittest.TestCase): def test_invalid_subnet_id(self): invalid_vnet_subnet_id = "dummy subnet id" - err = ("--vnet-subnet-id is not a valid Azure resource ID.") + err = "--vnet-subnet-id is not a valid Azure resource ID." with self.assertRaises(CLIError) as cm: validators._validate_subnet_id(invalid_vnet_subnet_id, "--vnet-subnet-id") @@ -120,16 +127,19 @@ def __init__(self, os_type, enable_custom_ca_trust): self.os_type = os_type self.enable_custom_ca_trust = enable_custom_ca_trust + class CustomCATrustCertificatesNamespace: def __init__(self, os_type, custom_ca_trust_certificates): self.os_type = os_type self.custom_ca_trust_certificates = custom_ca_trust_certificates + class DisableWindowsOutboundNatNamespace: def __init__(self, os_type, disable_windows_outbound_nat): self.os_type = os_type self.disable_windows_outbound_nat = disable_windows_outbound_nat + class TestMaxSurge(unittest.TestCase): def test_valid_cases(self): valid = ["5", "33%", "1", "100%"] @@ -139,12 +149,12 @@ def test_valid_cases(self): def test_throws_on_string(self): with self.assertRaises(CLIError) as cm: validators.validate_max_surge(MaxSurgeNamespace("foobar")) - self.assertTrue('int or percentage' in str(cm.exception), msg=str(cm.exception)) + self.assertTrue("int or percentage" in str(cm.exception), msg=str(cm.exception)) def test_throws_on_negative(self): with self.assertRaises(CLIError) as cm: validators.validate_max_surge(MaxSurgeNamespace("-3")) - self.assertTrue('positive' in str(cm.exception), msg=str(cm.exception)) + self.assertTrue("positive" in str(cm.exception), msg=str(cm.exception)) class TestSpotMaxPrice(unittest.TestCase): @@ -156,22 +166,38 @@ def test_valid_cases(self): def test_throws_if_more_than_5(self): with self.assertRaises(CLIError) as cm: validators.validate_spot_max_price(SpotMaxPriceNamespace(5.123456)) - self.assertTrue('--spot_max_price can only include up to 5 decimal places' in str(cm.exception), msg=str(cm.exception)) + self.assertTrue( + "--spot_max_price can only include up to 5 decimal places" + in str(cm.exception), + msg=str(cm.exception), + ) def test_throws_if_non_valid_negative(self): with self.assertRaises(CLIError) as cm: validators.validate_spot_max_price(SpotMaxPriceNamespace(-2)) - self.assertTrue('--spot_max_price can only be any decimal value greater than zero, or -1 which indicates' in str(cm.exception), msg=str(cm.exception)) + self.assertTrue( + "--spot_max_price can only be any decimal value greater than zero, or -1 which indicates" + in str(cm.exception), + msg=str(cm.exception), + ) with self.assertRaises(CLIError) as cm: validators.validate_spot_max_price(SpotMaxPriceNamespace(0)) - self.assertTrue('--spot_max_price can only be any decimal value greater than zero, or -1 which indicates' in str(cm.exception), msg=str(cm.exception)) + self.assertTrue( + "--spot_max_price can only be any decimal value greater than zero, or -1 which indicates" + in str(cm.exception), + msg=str(cm.exception), + ) def test_throws_if_input_max_price_for_regular(self): ns = SpotMaxPriceNamespace(2) ns.priority = "Regular" with self.assertRaises(CLIError) as cm: validators.validate_spot_max_price(ns) - self.assertTrue('--spot_max_price can only be set when --priority is Spot' in str(cm.exception), msg=str(cm.exception)) + self.assertTrue( + "--spot_max_price can only be set when --priority is Spot" + in str(cm.exception), + msg=str(cm.exception), + ) class TestMessageOfTheday(unittest.TestCase): @@ -182,60 +208,115 @@ def test_valid_cases(self): def test_fail_if_os_type_windows(self): with self.assertRaises(CLIError) as cm: - validators.validate_message_of_the_day(MessageOfTheDayNamespace("foo", "Windows")) - self.assertTrue('--message-of-the-day can only be set for linux nodepools' in str(cm.exception), msg=str(cm.exception)) + validators.validate_message_of_the_day( + MessageOfTheDayNamespace("foo", "Windows") + ) + self.assertTrue( + "--message-of-the-day can only be set for linux nodepools" + in str(cm.exception), + msg=str(cm.exception), + ) def test_fail_if_os_type_invalid(self): with self.assertRaises(CLIError) as cm: - validators.validate_message_of_the_day(MessageOfTheDayNamespace("foo", "invalid")) - self.assertTrue('--message-of-the-day can only be set for linux nodepools' in str(cm.exception), msg=str(cm.exception)) + validators.validate_message_of_the_day( + MessageOfTheDayNamespace("foo", "invalid") + ) + self.assertTrue( + "--message-of-the-day can only be set for linux nodepools" + in str(cm.exception), + msg=str(cm.exception), + ) class TestEnableCustomCATrust(unittest.TestCase): def test_pass_if_os_type_linux(self): - validators.validate_enable_custom_ca_trust(EnableCustomCATrustNamespace("Linux", True)) + validators.validate_enable_custom_ca_trust( + EnableCustomCATrustNamespace("Linux", True) + ) def test_fail_if_os_type_windows(self): with self.assertRaises(CLIError) as cm: - validators.validate_enable_custom_ca_trust(EnableCustomCATrustNamespace("Windows", True)) - self.assertTrue('--enable_custom_ca_trust can only be set for Linux nodepools' in str(cm.exception), msg=str(cm.exception)) + validators.validate_enable_custom_ca_trust( + EnableCustomCATrustNamespace("Windows", True) + ) + self.assertTrue( + "--enable_custom_ca_trust can only be set for Linux nodepools" + in str(cm.exception), + msg=str(cm.exception), + ) def test_fail_if_os_type_invalid(self): with self.assertRaises(CLIError) as cm: - validators.validate_enable_custom_ca_trust(EnableCustomCATrustNamespace("invalid", True)) - self.assertTrue('--enable_custom_ca_trust can only be set for Linux nodepools' in str(cm.exception), msg=str(cm.exception)) + validators.validate_enable_custom_ca_trust( + EnableCustomCATrustNamespace("invalid", True) + ) + self.assertTrue( + "--enable_custom_ca_trust can only be set for Linux nodepools" + in str(cm.exception), + msg=str(cm.exception), + ) class TestCustomCATrustCertificates(unittest.TestCase): def test_valid_cases(self): valid = ["foo", ""] for v in valid: - validators.validate_custom_ca_trust_certificates(CustomCATrustCertificatesNamespace("Linux", v)) + validators.validate_custom_ca_trust_certificates( + CustomCATrustCertificatesNamespace("Linux", v) + ) def test_fail_if_os_type_windows(self): with self.assertRaises(CLIError) as cm: - validators.validate_custom_ca_trust_certificates(CustomCATrustCertificatesNamespace("Windows", "foo")) - self.assertTrue('--custom-ca-trust-certificates can only be set for linux nodepools' in str(cm.exception), msg=str(cm.exception)) + validators.validate_custom_ca_trust_certificates( + CustomCATrustCertificatesNamespace("Windows", "foo") + ) + self.assertTrue( + "--custom-ca-trust-certificates can only be set for linux nodepools" + in str(cm.exception), + msg=str(cm.exception), + ) def test_fail_if_os_type_invalid(self): with self.assertRaises(CLIError) as cm: - validators.validate_custom_ca_trust_certificates(CustomCATrustCertificatesNamespace("invalid", "foo")) - self.assertTrue('--custom-ca-trust-certificates can only be set for linux nodepools' in str(cm.exception), msg=str(cm.exception)) + validators.validate_custom_ca_trust_certificates( + CustomCATrustCertificatesNamespace("invalid", "foo") + ) + self.assertTrue( + "--custom-ca-trust-certificates can only be set for linux nodepools" + in str(cm.exception), + msg=str(cm.exception), + ) class TestDisableWindowsOutboundNAT(unittest.TestCase): def test_pass_if_os_type_windows(self): - validators.validate_disable_windows_outbound_nat(DisableWindowsOutboundNatNamespace("Windows", True)) + validators.validate_disable_windows_outbound_nat( + DisableWindowsOutboundNatNamespace("Windows", True) + ) def test_fail_if_os_type_linux(self): with self.assertRaises(CLIError) as cm: - validators.validate_disable_windows_outbound_nat(DisableWindowsOutboundNatNamespace("Linux", True)) - self.assertTrue('--disable-windows-outbound-nat can only be set for Windows nodepools' in str(cm.exception), msg=str(cm.exception)) + validators.validate_disable_windows_outbound_nat( + DisableWindowsOutboundNatNamespace("Linux", True) + ) + self.assertTrue( + "--disable-windows-outbound-nat can only be set for Windows nodepools" + in str(cm.exception), + msg=str(cm.exception), + ) def test_fail_if_os_type_invalid(self): with self.assertRaises(CLIError) as cm: - validators.validate_disable_windows_outbound_nat(DisableWindowsOutboundNatNamespace("invalid", True)) - self.assertTrue('--disable-windows-outbound-nat can only be set for Windows nodepools' in str(cm.exception), msg=str(cm.exception)) + validators.validate_disable_windows_outbound_nat( + DisableWindowsOutboundNatNamespace("invalid", True) + ) + self.assertTrue( + "--disable-windows-outbound-nat can only be set for Windows nodepools" + in str(cm.exception), + msg=str(cm.exception), + ) + class ValidateAddonsNamespace: def __init__(self, addons): @@ -261,7 +342,8 @@ def test_validate_addons(self): midlen = int(len(first_addon) / 2) namespace = ValidateAddonsNamespace( - first_addon[:midlen] + first_addon[midlen + 1:]) + first_addon[:midlen] + first_addon[midlen + 1:] + ) self.assertRaises(CLIError, validators.validate_addons, namespace) def test_no_addon_match(self): @@ -279,7 +361,7 @@ class TestAssignIdentity(unittest.TestCase): def test_invalid_identity_id(self): invalid_identity_id = "dummy identity id" namespace = AssignIdentityNamespace(invalid_identity_id) - err = ("--assign-identity is not a valid Azure resource ID.") + err = "--assign-identity is not a valid Azure resource ID." with self.assertRaises(CLIError) as cm: validators.validate_assign_identity(namespace) @@ -302,37 +384,37 @@ def test_empty_identity_id(self): class PodIdentityNamespace: - def __init__(self, identity_name): self.identity_name = identity_name class TestValidatePodIdentityResourceName(unittest.TestCase): - def test_valid_required_resource_name(self): - validator = validators.validate_pod_identity_resource_name('identity_name', required=True) - namespace = PodIdentityNamespace('test-name') + validator = validators.validate_pod_identity_resource_name( + "identity_name", required=True + ) + namespace = PodIdentityNamespace("test-name") validator(namespace) def test_missing_required_resource_name(self): - validator = validators.validate_pod_identity_resource_name('identity_name', required=True) + validator = validators.validate_pod_identity_resource_name( + "identity_name", required=True + ) namespace = PodIdentityNamespace(None) with self.assertRaises(CLIError) as cm: validator(namespace) - self.assertEqual(str(cm.exception), '--name is required') + self.assertEqual(str(cm.exception), "--name is required") class PodIdentityResourceNamespace: - def __init__(self, namespace): self.namespace = namespace class TestValidatePodIdentityResourceNamespace(unittest.TestCase): - def test_valid_required_resource_name(self): - namespace = PodIdentityResourceNamespace('test-name') + namespace = PodIdentityResourceNamespace("test-name") validators.validate_pod_identity_resource_namespace(namespace) def test_missing_required_resource_name(self): @@ -340,10 +422,10 @@ def test_missing_required_resource_name(self): with self.assertRaises(CLIError) as cm: validators.validate_pod_identity_resource_namespace(namespace) - self.assertEqual(str(cm.exception), '--namespace is required') + self.assertEqual(str(cm.exception), "--namespace is required") -class TestValidateKubernetesVersion(unittest.TestCase): +class TestValidateKubernetesVersion(unittest.TestCase): def test_valid_full_kubernetes_version(self): kubernetes_version = "1.11.8" namespace = Namespace(kubernetes_version=kubernetes_version) @@ -366,8 +448,10 @@ def test_invalid_kubernetes_version(self): kubernetes_version = "1.2.3.4" namespace = Namespace(kubernetes_version=kubernetes_version) - err = ("--kubernetes-version should be the full version number or alias minor version, " - "such as \"1.7.12\" or \"1.7\"") + err = ( + "--kubernetes-version should be the full version number or alias minor version, " + 'such as "1.7.12" or "1.7"' + ) with self.assertRaises(CLIError) as cm: validators.validate_k8s_version(namespace) @@ -381,42 +465,54 @@ def test_invalid_kubernetes_version(self): validators.validate_k8s_version(namespace) self.assertEqual(str(cm.exception), err) -class HostGroupIDNamespace: +class HostGroupIDNamespace: def __init__(self, host_group_id): self.host_group_id = host_group_id + class TestValidateHostGroupID(unittest.TestCase): def test_invalid_host_group_id(self): invalid_host_group_id = "dummy group id" namespace = HostGroupIDNamespace(host_group_id=invalid_host_group_id) - err = ("--host-group-id is not a valid Azure resource ID.") + err = "--host-group-id is not a valid Azure resource ID." with self.assertRaises(CLIError) as cm: validators.validate_host_group_id(namespace) self.assertEqual(str(cm.exception), err) -class AzureKeyVaultKmsKeyIdNamespace: +class AzureKeyVaultKmsKeyIdNamespace: def __init__(self, azure_keyvault_kms_key_id): self.azure_keyvault_kms_key_id = azure_keyvault_kms_key_id + class TestValidateAzureKeyVaultKmsKeyId(unittest.TestCase): def test_invalid_azure_keyvault_kms_key_id_without_https(self): invalid_azure_keyvault_kms_key_id = "dummy key id" - namespace = AzureKeyVaultKmsKeyIdNamespace(azure_keyvault_kms_key_id=invalid_azure_keyvault_kms_key_id) - err = '--azure-keyvault-kms-key-id is not a valid Key Vault key ID. ' \ - 'See https://docs.microsoft.com/en-us/azure/key-vault/general/about-keys-secrets-certificates#vault-name-and-object-name' + namespace = AzureKeyVaultKmsKeyIdNamespace( + azure_keyvault_kms_key_id=invalid_azure_keyvault_kms_key_id + ) + err = ( + "--azure-keyvault-kms-key-id is not a valid Key Vault key ID. " + "See https://docs.microsoft.com/en-us/azure/key-vault/general/about-keys-secrets-certificates#vault-name-and-object-name" + ) with self.assertRaises(CLIError) as cm: validators.validate_azure_keyvault_kms_key_id(namespace) self.assertEqual(str(cm.exception), err) def test_invalid_azure_keyvault_kms_key_id_without_key_version(self): - invalid_azure_keyvault_kms_key_id = "https://fakekeyvault.vault.azure.net/keys/fakekeyname" - namespace = AzureKeyVaultKmsKeyIdNamespace(azure_keyvault_kms_key_id=invalid_azure_keyvault_kms_key_id) - err = '--azure-keyvault-kms-key-id is not a valid Key Vault key ID. ' \ - 'See https://docs.microsoft.com/en-us/azure/key-vault/general/about-keys-secrets-certificates#vault-name-and-object-name' + invalid_azure_keyvault_kms_key_id = ( + "https://fakekeyvault.vault.azure.net/keys/fakekeyname" + ) + namespace = AzureKeyVaultKmsKeyIdNamespace( + azure_keyvault_kms_key_id=invalid_azure_keyvault_kms_key_id + ) + err = ( + "--azure-keyvault-kms-key-id is not a valid Key Vault key ID. " + "See https://docs.microsoft.com/en-us/azure/key-vault/general/about-keys-secrets-certificates#vault-name-and-object-name" + ) with self.assertRaises(CLIError) as cm: validators.validate_azure_keyvault_kms_key_id(namespace) @@ -424,25 +520,33 @@ def test_invalid_azure_keyvault_kms_key_id_without_key_version(self): def test_invalid_azure_keyvault_kms_key_id_with_wrong_object_type(self): invalid_azure_keyvault_kms_key_id = "https://fakekeyvault.vault.azure.net/secrets/fakesecretname/fakesecretversion" - namespace = AzureKeyVaultKmsKeyIdNamespace(azure_keyvault_kms_key_id=invalid_azure_keyvault_kms_key_id) - err = '--azure-keyvault-kms-key-id is not a valid Key Vault key ID. ' \ - 'See https://docs.microsoft.com/en-us/azure/key-vault/general/about-keys-secrets-certificates#vault-name-and-object-name' + namespace = AzureKeyVaultKmsKeyIdNamespace( + azure_keyvault_kms_key_id=invalid_azure_keyvault_kms_key_id + ) + err = ( + "--azure-keyvault-kms-key-id is not a valid Key Vault key ID. " + "See https://docs.microsoft.com/en-us/azure/key-vault/general/about-keys-secrets-certificates#vault-name-and-object-name" + ) with self.assertRaises(CLIError) as cm: validators.validate_azure_keyvault_kms_key_id(namespace) self.assertEqual(str(cm.exception), err) -class AzureKeyVaultKmsKeyVaultResourceIdNamespace: +class AzureKeyVaultKmsKeyVaultResourceIdNamespace: def __init__(self, azure_keyvault_kms_key_vault_resource_id): - self.azure_keyvault_kms_key_vault_resource_id = azure_keyvault_kms_key_vault_resource_id + self.azure_keyvault_kms_key_vault_resource_id = ( + azure_keyvault_kms_key_vault_resource_id + ) class TestValidateAzureKeyVaultKmsKeyVaultResourceId(unittest.TestCase): def test_invalid_azure_keyvault_kms_key_vault_resource_id(self): invalid_azure_keyvault_kms_key_vault_resource_id = "invalid" - namespace = AzureKeyVaultKmsKeyVaultResourceIdNamespace(azure_keyvault_kms_key_vault_resource_id=invalid_azure_keyvault_kms_key_vault_resource_id) - err = '--azure-keyvault-kms-key-vault-resource-id is not a valid Azure resource ID.' + namespace = AzureKeyVaultKmsKeyVaultResourceIdNamespace( + azure_keyvault_kms_key_vault_resource_id=invalid_azure_keyvault_kms_key_vault_resource_id + ) + err = "--azure-keyvault-kms-key-vault-resource-id is not a valid Azure resource ID." with self.assertRaises(InvalidArgumentValueError) as cm: validators.validate_azure_keyvault_kms_key_vault_resource_id(namespace) @@ -450,7 +554,9 @@ def test_invalid_azure_keyvault_kms_key_vault_resource_id(self): def test_valid_azure_keyvault_kms_key_vault_resource_id(self): valid_azure_keyvault_kms_key_vault_resource_id = "/subscriptions/8ecadfc9-d1a3-4ea4-b844-0d9f87e4d7c8/resourceGroups/foo/providers/Microsoft.KeyVault/vaults/foo" - namespace = AzureKeyVaultKmsKeyVaultResourceIdNamespace(azure_keyvault_kms_key_vault_resource_id=valid_azure_keyvault_kms_key_vault_resource_id) + namespace = AzureKeyVaultKmsKeyVaultResourceIdNamespace( + azure_keyvault_kms_key_vault_resource_id=valid_azure_keyvault_kms_key_vault_resource_id + ) validators.validate_azure_keyvault_kms_key_vault_resource_id(namespace) @@ -463,9 +569,7 @@ def test_invalid_nodepool_name_too_long(self): } ) with self.assertRaises(InvalidArgumentValueError): - validators.validate_nodepool_name( - namespace - ) + validators.validate_nodepool_name(namespace) def test_invalid_agent_pool_name_too_long(self): namespace = SimpleNamespace( @@ -474,9 +578,7 @@ def test_invalid_agent_pool_name_too_long(self): } ) with self.assertRaises(InvalidArgumentValueError): - validators.validate_agent_pool_name( - namespace - ) + validators.validate_agent_pool_name(namespace) def test_invalid_nodepool_name_not_alnum(self): namespace = SimpleNamespace( @@ -485,9 +587,7 @@ def test_invalid_nodepool_name_not_alnum(self): } ) with self.assertRaises(InvalidArgumentValueError): - validators.validate_nodepool_name( - namespace - ) + validators.validate_nodepool_name(namespace) def test_invalid_agent_pool_name_not_alnum(self): namespace = SimpleNamespace( @@ -496,9 +596,7 @@ def test_invalid_agent_pool_name_not_alnum(self): } ) with self.assertRaises(InvalidArgumentValueError): - validators.validate_agent_pool_name( - namespace - ) + validators.validate_agent_pool_name(namespace) def test_valid_nodepool_name(self): namespace = SimpleNamespace( @@ -506,9 +604,7 @@ def test_valid_nodepool_name(self): "nodepool_name": "np100", } ) - validators.validate_nodepool_name( - namespace - ) + validators.validate_nodepool_name(namespace) def test_valid_agent_pool_name(self): namespace = SimpleNamespace( @@ -516,9 +612,7 @@ def test_valid_agent_pool_name(self): "agent_pool_name": "np100", } ) - validators.validate_agent_pool_name( - namespace - ) + validators.validate_agent_pool_name(namespace) class TestValidateAllowedHostPorts(unittest.TestCase): @@ -529,9 +623,7 @@ def test_invalid_allowed_host_ports(self): } ) with self.assertRaises(InvalidArgumentValueError): - validators.validate_allowed_host_ports( - namespace - ) + validators.validate_allowed_host_ports(namespace) def test_valid_allowed_host_ports(self): namespace = SimpleNamespace( @@ -539,9 +631,7 @@ def test_valid_allowed_host_ports(self): "allowed_host_ports": "80/tcp,443/tcp,8080-8090/tcp,53/udp", } ) - validators.validate_allowed_host_ports( - namespace - ) + validators.validate_allowed_host_ports(namespace) class TestValidateApplicationSecurityGroups(unittest.TestCase): @@ -552,9 +642,7 @@ def test_invalid_application_security_groups(self): } ) with self.assertRaises(InvalidArgumentValueError): - validators.validate_application_security_groups( - namespace - ) + validators.validate_application_security_groups(namespace) def test_empty_application_security_groups(self): namespace = SimpleNamespace( @@ -562,23 +650,22 @@ def test_empty_application_security_groups(self): "asg_ids": "", } ) - validators.validate_application_security_groups( - namespace - ) + validators.validate_application_security_groups(namespace) def test_multiple_application_security_groups(self): - asg_ids = ','.join([ - "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg1/providers/Microsoft.Network/applicationSecurityGroups/asg1", - "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg2/providers/Microsoft.Network/applicationSecurityGroups/asg2", - ]) + asg_ids = ",".join( + [ + "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg1/providers/Microsoft.Network/applicationSecurityGroups/asg1", + "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg2/providers/Microsoft.Network/applicationSecurityGroups/asg2", + ] + ) namespace = SimpleNamespace( **{ "asg_ids": asg_ids, } ) - validators.validate_application_security_groups( - namespace - ) + validators.validate_application_security_groups(namespace) + class MaintenanceWindowNameSpace: def __init__(self, utc_offset=None, start_date=None, start_time=None): @@ -586,175 +673,315 @@ def __init__(self, utc_offset=None, start_date=None, start_time=None): self.start_date = start_date self.start_time = start_time + class TestValidateMaintenanceWindow(unittest.TestCase): - def test_invalid_utc_offset(self): + def test_invalid_utc_offset(self): namespace = MaintenanceWindowNameSpace(utc_offset="5:00") err = '--utc-offset must be in format: "+/-HH:mm". For example, "+05:30" and "-12:00".' with self.assertRaises(InvalidArgumentValueError) as cm: validators.validate_utc_offset(namespace) self.assertEqual(str(cm.exception), err) - - def test_valid_utc_offset(self): + + def test_valid_utc_offset(self): namespace = MaintenanceWindowNameSpace(utc_offset="+05:00") validators.validate_utc_offset(namespace) - def test_invalid_start_date(self): + def test_invalid_start_date(self): namespace = MaintenanceWindowNameSpace(start_date="2023/01/01") err = '--start-date must be in format: "yyyy-MM-dd". For example, "2023-01-01".' with self.assertRaises(InvalidArgumentValueError) as cm: validators.validate_start_date(namespace) self.assertEqual(str(cm.exception), err) - - def test_valid_start_datet(self): + + def test_valid_start_datet(self): namespace = MaintenanceWindowNameSpace(start_date="2023-01-01") validators.validate_start_date(namespace) - - def test_invalid_start_time(self): + + def test_invalid_start_time(self): namespace = MaintenanceWindowNameSpace(start_time="3am") - err = '--start-time must be in format "HH:mm". For example, "09:30" and "17:00".' + err = ( + '--start-time must be in format "HH:mm". For example, "09:30" and "17:00".' + ) with self.assertRaises(InvalidArgumentValueError) as cm: validators.validate_start_time(namespace) self.assertEqual(str(cm.exception), err) - - def test_valid_start_time(self): + + def test_valid_start_time(self): namespace = MaintenanceWindowNameSpace(start_date="00:30") validators.validate_start_time(namespace) class TestValidateAzureContainerStorage(unittest.TestCase): def test_conflicting_flags_for_enable_disable(self): - err = 'Conflicting flags. Cannot set --enable-azure-container-storage '\ - 'and --disable-azure-container-storage together.' + err = ( + "Conflicting flags. Cannot set --enable-azure-container-storage " + "and --disable-azure-container-storage together." + ) with self.assertRaises(MutuallyExclusiveArgumentError) as cm: - acstor_validator.validate_azure_container_storage_params(True, True, None, None, None, None, None, None, None, False) + acstor_validator.validate_azure_container_storage_params( + True, True, None, None, None, None, None, None, None, False + ) self.assertEqual(str(cm.exception), err) def test_disable_when_extension_not_installed(self): is_extension_installed = False - err = 'Invalid usage of --disable-azure-container-storage. '\ - 'Azure Container Storage is not enabled on the cluster. ' \ - 'Aborting disabling of Azure Container Storage.' + err = ( + "Invalid usage of --disable-azure-container-storage. " + "Azure Container Storage is not enabled on the cluster. " + "Aborting disabling of Azure Container Storage." + ) with self.assertRaises(InvalidArgumentValueError) as cm: - acstor_validator.validate_azure_container_storage_params(None, True, None, None, None, None, None, None, None, is_extension_installed) + acstor_validator.validate_azure_container_storage_params( + None, + True, + None, + None, + None, + None, + None, + None, + None, + is_extension_installed, + ) self.assertEqual(str(cm.exception), err) def test_disable_flag_with_storage_pool_name(self): storage_pool_name = "pool-name" - err = 'Conflicting flags. Cannot define --storage-pool-name value '\ - 'when --disable-azure-container-storage is set.' + err = ( + "Conflicting flags. Cannot define --storage-pool-name value " + "when --disable-azure-container-storage is set." + ) with self.assertRaises(MutuallyExclusiveArgumentError) as cm: - acstor_validator.validate_azure_container_storage_params(None, True, storage_pool_name, None, None, None, None, None, None, True) + acstor_validator.validate_azure_container_storage_params( + None, True, storage_pool_name, None, None, None, None, None, None, True + ) self.assertEqual(str(cm.exception), err) def test_disable_flag_with_storage_pool_sku(self): storage_pool_sku = acstor_consts.CONST_STORAGE_POOL_SKU_PREMIUM_LRS - err = 'Conflicting flags. Cannot define --storage-pool-sku value ' \ - 'when --disable-azure-container-storage is set.' + err = ( + "Conflicting flags. Cannot define --storage-pool-sku value " + "when --disable-azure-container-storage is set." + ) with self.assertRaises(MutuallyExclusiveArgumentError) as cm: - acstor_validator.validate_azure_container_storage_params(None, True, None, None, storage_pool_sku, None, None, None, None, True) + acstor_validator.validate_azure_container_storage_params( + None, True, None, None, storage_pool_sku, None, None, None, None, True + ) self.assertEqual(str(cm.exception), err) def test_disable_flag_with_storage_pool_size(self): storage_pool_size = "5Gi" - err = 'Conflicting flags. Cannot define --storage-pool-size value ' \ - 'when --disable-azure-container-storage is set.' + err = ( + "Conflicting flags. Cannot define --storage-pool-size value " + "when --disable-azure-container-storage is set." + ) with self.assertRaises(MutuallyExclusiveArgumentError) as cm: - acstor_validator.validate_azure_container_storage_params(None, True, None, None, None, None, storage_pool_size, None, None, True) + acstor_validator.validate_azure_container_storage_params( + None, True, None, None, None, None, storage_pool_size, None, None, True + ) self.assertEqual(str(cm.exception), err) def test_disable_flag_with_storage_pool_option(self): storage_pool_option = acstor_consts.CONST_STORAGE_POOL_OPTION_NVME - err = 'Conflicting flags. Cannot define --storage-pool-option value ' \ - 'when --disable-azure-container-storage is set.' + err = ( + "Conflicting flags. Cannot define --storage-pool-option value " + "when --disable-azure-container-storage is set." + ) with self.assertRaises(MutuallyExclusiveArgumentError) as cm: - acstor_validator.validate_azure_container_storage_params(None, True, None, None, None, storage_pool_option, None, None, None, True) + acstor_validator.validate_azure_container_storage_params( + None, + True, + None, + None, + None, + storage_pool_option, + None, + None, + None, + True, + ) self.assertEqual(str(cm.exception), err) def test_disable_flag_with_nodepool_list(self): nodepool_list = "test,test1" - err = 'Conflicting flags. Cannot define --azure-container-storage-nodepools value ' \ - 'when --disable-azure-container-storage is set.' + err = ( + "Conflicting flags. Cannot define --azure-container-storage-nodepools value " + "when --disable-azure-container-storage is set." + ) with self.assertRaises(MutuallyExclusiveArgumentError) as cm: - acstor_validator.validate_azure_container_storage_params(None, True, None, None, None, None, None, nodepool_list, None, True) + acstor_validator.validate_azure_container_storage_params( + None, True, None, None, None, None, None, nodepool_list, None, True + ) self.assertEqual(str(cm.exception), err) def test_valid_disable(self): - acstor_validator.validate_azure_container_storage_params(None, True, None, None, None, None, None, None, None, True) + acstor_validator.validate_azure_container_storage_params( + None, True, None, None, None, None, None, None, None, True + ) def test_enable_when_extension_installed(self): is_extension_installed = True - err = 'Invalid usage of --enable-azure-container-storage. '\ - 'Azure Container Storage is already enabled on the cluster. ' \ - 'Aborting installation of Azure Container Storage.' + err = ( + "Invalid usage of --enable-azure-container-storage. " + "Azure Container Storage is already enabled on the cluster. " + "Aborting installation of Azure Container Storage." + ) with self.assertRaises(InvalidArgumentValueError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, None, None, None, None, None, None, None, is_extension_installed) + acstor_validator.validate_azure_container_storage_params( + True, + None, + None, + None, + None, + None, + None, + None, + None, + is_extension_installed, + ) self.assertEqual(str(cm.exception), err) def test_enable_with_invalid_storage_pool_name(self): storage_pool_name = "my_test_pool" - err = "Invalid --storage-pool-name value. " \ - "Accepted values are lowercase alphanumeric characters, " \ - "'-' or '.', and must start and end with an alphanumeric character." + err = ( + "Invalid --storage-pool-name value. " + "Accepted values are lowercase alphanumeric characters, " + "'-' or '.', and must start and end with an alphanumeric character." + ) with self.assertRaises(InvalidArgumentValueError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, None, None, None, None, None, None, False) + acstor_validator.validate_azure_container_storage_params( + True, None, storage_pool_name, None, None, None, None, None, None, False + ) self.assertEqual(str(cm.exception), err) def test_enable_with_sku_and_ephemeral_disk_pool(self): storage_pool_name = "valid-name" storage_pool_sku = acstor_consts.CONST_STORAGE_POOL_SKU_PREMIUM_LRS storage_pool_type = acstor_consts.CONST_STORAGE_POOL_TYPE_EPHEMERAL_DISK - err = 'Cannot set --storage-pool-sku when --enable-azure-container-storage is ephemeralDisk.' + err = "Cannot set --storage-pool-sku when --enable-azure-container-storage is ephemeralDisk." with self.assertRaises(ArgumentUsageError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, storage_pool_sku, None, None, None, None, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + storage_pool_sku, + None, + None, + None, + None, + False, + ) self.assertEqual(str(cm.exception), err) def test_enable_with_sku_and_elastic_san_pool(self): storage_pool_name = "valid-name" storage_pool_sku = acstor_consts.CONST_STORAGE_POOL_SKU_PREMIUMV2_LRS storage_pool_type = acstor_consts.CONST_STORAGE_POOL_TYPE_ELASTIC_SAN - supported_skus = acstor_consts.CONST_STORAGE_POOL_SKU_PREMIUM_LRS + ", " + \ - acstor_consts.CONST_STORAGE_POOL_SKU_PREMIUM_ZRS - err = 'Invalid --storage-pool-sku value. ' \ - 'Supported value for --storage-pool-sku are {0} ' \ - 'when --enable-azure-container-storage is set to elasticSan.' \ - .format(supported_skus) + supported_skus = ( + acstor_consts.CONST_STORAGE_POOL_SKU_PREMIUM_LRS + + ", " + + acstor_consts.CONST_STORAGE_POOL_SKU_PREMIUM_ZRS + ) + err = ( + "Invalid --storage-pool-sku value. " + "Supported value for --storage-pool-sku are {0} " + "when --enable-azure-container-storage is set to elasticSan.".format( + supported_skus + ) + ) with self.assertRaises(ArgumentUsageError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, storage_pool_sku, None, None, None, None, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + storage_pool_sku, + None, + None, + None, + None, + False, + ) self.assertEqual(str(cm.exception), err) def test_enable_with_option_and_non_ephemeral_disk_pool(self): storage_pool_name = "valid-name" storage_pool_option = acstor_consts.CONST_STORAGE_POOL_OPTION_NVME storage_pool_type = acstor_consts.CONST_STORAGE_POOL_TYPE_AZURE_DISK - err = 'Cannot set --storage-pool-option when --enable-azure-container-storage is not ephemeralDisk.' + err = "Cannot set --storage-pool-option when --enable-azure-container-storage is not ephemeralDisk." with self.assertRaises(ArgumentUsageError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, None, storage_pool_option, None, None, None, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + None, + storage_pool_option, + None, + None, + None, + False, + ) self.assertEqual(str(cm.exception), err) def test_enable_with_ssd_option_and_ephemeral_disk_pool(self): storage_pool_name = "valid-name" storage_pool_option = acstor_consts.CONST_STORAGE_POOL_OPTION_SSD storage_pool_type = acstor_consts.CONST_STORAGE_POOL_TYPE_EPHEMERAL_DISK - err = '--storage-pool-option Temp storage (SSD) currently not supported.' + err = "--storage-pool-option Temp storage (SSD) currently not supported." with self.assertRaises(ArgumentUsageError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, None, storage_pool_option, None, None, None, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + None, + storage_pool_option, + None, + None, + None, + False, + ) self.assertEqual(str(cm.exception), err) def test_enable_with_invalid_storage_pool_size(self): storage_pool_name = "valid-name" storage_pool_size = "5" - err = 'Value for --storage-pool-size should be defined with size followed by Gi or Ti e.g. 512Gi or 2Ti.' + err = "Value for --storage-pool-size should be defined with size followed by Gi or Ti e.g. 512Gi or 2Ti." with self.assertRaises(ArgumentUsageError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, None, None, None, storage_pool_size, None, None, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + None, + None, + None, + storage_pool_size, + None, + None, + False, + ) self.assertEqual(str(cm.exception), err) def test_enable_with_invalid_size_for_esan_storage_pool(self): storage_pool_name = "valid-name" storage_pool_size = "512Gi" storage_pool_type = acstor_consts.CONST_STORAGE_POOL_TYPE_ELASTIC_SAN - err = 'Value for --storage-pool-size must be at least 1Ti when --enable-azure-container-storage is elasticSan.' + err = "Value for --storage-pool-size must be at least 1Ti when --enable-azure-container-storage is elasticSan." with self.assertRaises(ArgumentUsageError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, None, None, storage_pool_size, None, None, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + None, + None, + storage_pool_size, + None, + None, + False, + ) self.assertEqual(str(cm.exception), err) def test_invalid_comma_separated_nodepool_list(self): @@ -762,43 +989,79 @@ def test_invalid_comma_separated_nodepool_list(self): storage_pool_name = "valid-name" storage_pool_size = "5Ti" storage_pool_type = acstor_consts.CONST_STORAGE_POOL_TYPE_EPHEMERAL_DISK - storage_pool_option = acstor_consts.CONST_STORAGE_POOL_OPTION_NVME - err = "Invalid --azure-container-storage-nodepools value. " \ - "Accepted value is a comma separated string of valid nodepool " \ - "names without any spaces.\nA valid nodepool name may only contain lowercase " \ + err = ( + "Invalid --azure-container-storage-nodepools value. " + "Accepted value is a comma separated string of valid nodepool " + "names without any spaces.\nA valid nodepool name may only contain lowercase " "alphanumeric characters and must begin with a lowercase letter." + ) with self.assertRaises(InvalidArgumentValueError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, None, None, storage_pool_size, nodepool_list, None, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + None, + None, + storage_pool_size, + nodepool_list, + None, + False, + ) self.assertEqual(str(cm.exception), err) def test_missing_nodepool_from_cluster_nodepool_list_single(self): storage_pool_name = "valid-name" storage_pool_size = "5Ti" storage_pool_type = acstor_consts.CONST_STORAGE_POOL_TYPE_EPHEMERAL_DISK - storage_pool_option = acstor_consts.CONST_STORAGE_POOL_OPTION_NVME nodepool_list = "pool1" agentpools = ["nodepool1"] - err = 'Nodepool: pool1 not found. Please provide a comma separated ' \ - 'string of existing nodepool names in --azure-container-storage-nodepools.' \ - '\nNodepool available in the cluster is: nodepool1.' \ - '\nAborting installation of Azure Container Storage.' + err = ( + "Nodepool: pool1 not found. Please provide a comma separated " + "string of existing nodepool names in --azure-container-storage-nodepools." + "\nNodepool available in the cluster is: nodepool1." + "\nAborting installation of Azure Container Storage." + ) with self.assertRaises(InvalidArgumentValueError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, None, None, storage_pool_size, nodepool_list, agentpools, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + None, + None, + storage_pool_size, + nodepool_list, + agentpools, + False, + ) self.assertEqual(str(cm.exception), err) def test_missing_nodepool_from_cluster_nodepool_list_multiple(self): storage_pool_name = "valid-name" storage_pool_size = "5Ti" storage_pool_type = acstor_consts.CONST_STORAGE_POOL_TYPE_EPHEMERAL_DISK - storage_pool_option = acstor_consts.CONST_STORAGE_POOL_OPTION_NVME nodepool_list = "pool1,pool2" agentpools = ["nodepool1", "nodepool2"] - err = 'Nodepool: pool1 not found. Please provide a comma separated ' \ - 'string of existing nodepool names in --azure-container-storage-nodepools.' \ - '\nNodepools available in the cluster are: nodepool1, nodepool2.' \ - '\nAborting installation of Azure Container Storage.' + err = ( + "Nodepool: pool1 not found. Please provide a comma separated " + "string of existing nodepool names in --azure-container-storage-nodepools." + "\nNodepools available in the cluster are: nodepool1, nodepool2." + "\nAborting installation of Azure Container Storage." + ) with self.assertRaises(InvalidArgumentValueError) as cm: - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, None, None, storage_pool_size, nodepool_list, agentpools, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + None, + None, + storage_pool_size, + nodepool_list, + agentpools, + False, + ) self.assertEqual(str(cm.exception), err) def test_valid_enable_for_azure_disk_pool(self): @@ -808,7 +1071,18 @@ def test_valid_enable_for_azure_disk_pool(self): storage_pool_sku = acstor_consts.CONST_STORAGE_POOL_SKU_PREMIUM_LRS nodepool_list = "nodepool1,nodepool2" agentpools = ["nodepool1", "nodepool2"] - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, storage_pool_sku, None, storage_pool_size, nodepool_list, agentpools, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + storage_pool_sku, + None, + storage_pool_size, + nodepool_list, + agentpools, + False, + ) def test_valid_enable_for_ephemeral_disk_pool(self): storage_pool_name = "valid-name" @@ -817,7 +1091,18 @@ def test_valid_enable_for_ephemeral_disk_pool(self): storage_pool_option = acstor_consts.CONST_STORAGE_POOL_OPTION_NVME nodepool_list = "nodepool1" agentpools = ["nodepool1", "nodepool2"] - acstor_validator.validate_azure_container_storage_params(True, None, storage_pool_name, storage_pool_type, None, storage_pool_option, storage_pool_size, nodepool_list, agentpools, False) + acstor_validator.validate_azure_container_storage_params( + True, + None, + storage_pool_name, + storage_pool_type, + None, + storage_pool_option, + storage_pool_size, + nodepool_list, + agentpools, + False, + ) if __name__ == "__main__":