diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py index 622b3450c0e5..0319ef151af0 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster.py @@ -67,6 +67,9 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile + :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes + API server. + :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -97,6 +100,7 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, + 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -113,3 +117,4 @@ def __init__(self, **kwargs): self.enable_rbac = kwargs.get('enable_rbac', None) self.network_profile = kwargs.get('network_profile', None) self.aad_profile = kwargs.get('aad_profile', None) + self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py index 706e0f347849..5d469d9cabc2 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_03_31/models/managed_cluster_py3.py @@ -67,6 +67,9 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_03_31.models.ManagedClusterAADProfile + :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes + API server. + :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -97,9 +100,10 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, + 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } - def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None: + def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None: super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs) self.provisioning_state = None self.kubernetes_version = kubernetes_version @@ -113,3 +117,4 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn self.enable_rbac = enable_rbac self.network_profile = network_profile self.aad_profile = aad_profile + self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py index 554e00888876..8864f98b7a6d 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster.py @@ -66,6 +66,9 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile + :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes + API server. + :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -96,6 +99,7 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, + 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } def __init__(self, **kwargs): @@ -112,3 +116,4 @@ def __init__(self, **kwargs): self.enable_rbac = kwargs.get('enable_rbac', None) self.network_profile = kwargs.get('network_profile', None) self.aad_profile = kwargs.get('aad_profile', None) + self.api_server_authorized_ip_ranges = kwargs.get('api_server_authorized_ip_ranges', None) diff --git a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py index 710286bd0a9f..04d1589d1184 100644 --- a/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py +++ b/azure-mgmt-containerservice/azure/mgmt/containerservice/v2018_08_01_preview/models/managed_cluster_py3.py @@ -66,6 +66,9 @@ class ManagedCluster(Resource): :param aad_profile: Profile of Azure Active Directory configuration. :type aad_profile: ~azure.mgmt.containerservice.v2018_08_01_preview.models.ManagedClusterAADProfile + :param api_server_authorized_ip_ranges: Authorized IP Ranges to kubernetes + API server. + :type api_server_authorized_ip_ranges: list[str] """ _validation = { @@ -96,9 +99,10 @@ class ManagedCluster(Resource): 'enable_rbac': {'key': 'properties.enableRBAC', 'type': 'bool'}, 'network_profile': {'key': 'properties.networkProfile', 'type': 'ContainerServiceNetworkProfile'}, 'aad_profile': {'key': 'properties.aadProfile', 'type': 'ManagedClusterAADProfile'}, + 'api_server_authorized_ip_ranges': {'key': 'properties.apiServerAuthorizedIPRanges', 'type': '[str]'}, } - def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, **kwargs) -> None: + def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dns_prefix: str=None, agent_pool_profiles=None, linux_profile=None, service_principal_profile=None, addon_profiles=None, enable_rbac: bool=None, network_profile=None, aad_profile=None, api_server_authorized_ip_ranges=None, **kwargs) -> None: super(ManagedCluster, self).__init__(location=location, tags=tags, **kwargs) self.provisioning_state = None self.kubernetes_version = kubernetes_version @@ -112,3 +116,4 @@ def __init__(self, *, location: str, tags=None, kubernetes_version: str=None, dn self.enable_rbac = enable_rbac self.network_profile = network_profile self.aad_profile = aad_profile + self.api_server_authorized_ip_ranges = api_server_authorized_ip_ranges