Skip to content

Commit ac6d5f1

Browse files
author
SDK Automation
committed
Update from release/v3
1 parent 396e794 commit ac6d5f1

19 files changed

+141
-1890
lines changed

sdk/network/azure-mgmt-network/azure/mgmt/network/_network_management_client.py

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,7 @@ class NetworkManagementClient(NetworkManagementClientOperationsMixin, MultiApiCl
5555
'interface_endpoints': '2019-02-01',
5656
'p2s_vpn_server_configurations': '2019-07-01',
5757
'virtual_wa_ns': '2018-07-01',
58+
'web_application_firewall_policies': '2020-04-01',
5859
}},
5960
_PROFILE_TAG + " latest"
6061
)
@@ -6380,7 +6381,6 @@ def web_application_firewall_policies(self):
63806381
* 2019-12-01: :class:`WebApplicationFirewallPoliciesOperations<azure.mgmt.network.v2019_12_01.operations.WebApplicationFirewallPoliciesOperations>`
63816382
* 2020-03-01: :class:`WebApplicationFirewallPoliciesOperations<azure.mgmt.network.v2020_03_01.operations.WebApplicationFirewallPoliciesOperations>`
63826383
* 2020-04-01: :class:`WebApplicationFirewallPoliciesOperations<azure.mgmt.network.v2020_04_01.operations.WebApplicationFirewallPoliciesOperations>`
6383-
* 2020-05-01: :class:`WebApplicationFirewallPoliciesOperations<azure.mgmt.network.v2020_05_01.operations.WebApplicationFirewallPoliciesOperations>`
63846384
"""
63856385
api_version = self._get_api_version('web_application_firewall_policies')
63866386
if api_version == '2018-12-01':
@@ -6405,8 +6405,6 @@ def web_application_firewall_policies(self):
64056405
from .v2020_03_01.operations import WebApplicationFirewallPoliciesOperations as OperationClass
64066406
elif api_version == '2020-04-01':
64076407
from .v2020_04_01.operations import WebApplicationFirewallPoliciesOperations as OperationClass
6408-
elif api_version == '2020-05-01':
6409-
from .v2020_05_01.operations import WebApplicationFirewallPoliciesOperations as OperationClass
64106408
else:
64116409
raise NotImplementedError("APIVersion {} is not available".format(api_version))
64126410
return OperationClass(self._client, self.config, Serializer(self._models_dict(api_version)), Deserializer(self._models_dict(api_version)))

sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/__init__.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -936,7 +936,6 @@
936936
ExpressRouteLinkConnectorType,
937937
ExpressRouteLinkAdminState,
938938
ExpressRoutePortsEncapsulation,
939-
FirewallPolicyIntrusionSystemMode,
940939
FirewallPolicyNatRuleActionType,
941940
FirewallPolicyFilterRuleActionType,
942941
FirewallPolicyRuleConditionApplicationProtocolType,
@@ -1549,7 +1548,6 @@
15491548
'ExpressRouteLinkConnectorType',
15501549
'ExpressRouteLinkAdminState',
15511550
'ExpressRoutePortsEncapsulation',
1552-
'FirewallPolicyIntrusionSystemMode',
15531551
'FirewallPolicyNatRuleActionType',
15541552
'FirewallPolicyFilterRuleActionType',
15551553
'FirewallPolicyRuleConditionApplicationProtocolType',

sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models.py

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7716,10 +7716,6 @@ class FirewallPolicy(Resource):
77167716
Possible values include: 'Alert', 'Deny', 'Off'
77177717
:type threat_intel_mode: str or
77187718
~azure.mgmt.network.v2020_03_01.models.AzureFirewallThreatIntelMode
7719-
:param intrusion_system_mode: The operation mode for Intrusion system.
7720-
Possible values include: 'Enabled', 'Disabled'
7721-
:type intrusion_system_mode: str or
7722-
~azure.mgmt.network.v2020_03_01.models.FirewallPolicyIntrusionSystemMode
77237719
:ivar etag: A unique read-only string that changes whenever the resource
77247720
is updated.
77257721
:vartype etag: str
@@ -7747,7 +7743,6 @@ class FirewallPolicy(Resource):
77477743
'firewalls': {'key': 'properties.firewalls', 'type': '[SubResource]'},
77487744
'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'},
77497745
'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'},
7750-
'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'},
77517746
'etag': {'key': 'etag', 'type': 'str'},
77527747
}
77537748

@@ -7759,7 +7754,6 @@ def __init__(self, **kwargs):
77597754
self.firewalls = None
77607755
self.child_policies = None
77617756
self.threat_intel_mode = kwargs.get('threat_intel_mode', None)
7762-
self.intrusion_system_mode = kwargs.get('intrusion_system_mode', None)
77637757
self.etag = None
77647758

77657759

sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models_py3.py

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7716,10 +7716,6 @@ class FirewallPolicy(Resource):
77167716
Possible values include: 'Alert', 'Deny', 'Off'
77177717
:type threat_intel_mode: str or
77187718
~azure.mgmt.network.v2020_03_01.models.AzureFirewallThreatIntelMode
7719-
:param intrusion_system_mode: The operation mode for Intrusion system.
7720-
Possible values include: 'Enabled', 'Disabled'
7721-
:type intrusion_system_mode: str or
7722-
~azure.mgmt.network.v2020_03_01.models.FirewallPolicyIntrusionSystemMode
77237719
:ivar etag: A unique read-only string that changes whenever the resource
77247720
is updated.
77257721
:vartype etag: str
@@ -7747,19 +7743,17 @@ class FirewallPolicy(Resource):
77477743
'firewalls': {'key': 'properties.firewalls', 'type': '[SubResource]'},
77487744
'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'},
77497745
'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'},
7750-
'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'},
77517746
'etag': {'key': 'etag', 'type': 'str'},
77527747
}
77537748

7754-
def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=None, threat_intel_mode=None, intrusion_system_mode=None, **kwargs) -> None:
7749+
def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=None, threat_intel_mode=None, **kwargs) -> None:
77557750
super(FirewallPolicy, self).__init__(id=id, location=location, tags=tags, **kwargs)
77567751
self.rule_groups = None
77577752
self.provisioning_state = None
77587753
self.base_policy = base_policy
77597754
self.firewalls = None
77607755
self.child_policies = None
77617756
self.threat_intel_mode = threat_intel_mode
7762-
self.intrusion_system_mode = intrusion_system_mode
77637757
self.etag = None
77647758

77657759

sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_network_management_client_enums.py

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -373,12 +373,6 @@ class ExpressRoutePortsEncapsulation(str, Enum):
373373
qin_q = "QinQ"
374374

375375

376-
class FirewallPolicyIntrusionSystemMode(str, Enum):
377-
378-
enabled = "Enabled"
379-
disabled = "Disabled"
380-
381-
382376
class FirewallPolicyNatRuleActionType(str, Enum):
383377

384378
dnat = "DNAT"

sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/__init__.py

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,6 @@
188188
from ._models_py3 import ExpressRouteServiceProvider
189189
from ._models_py3 import ExpressRouteServiceProviderBandwidthsOffered
190190
from ._models_py3 import FirewallPolicy
191-
from ._models_py3 import FirewallPolicyCertificateAuthority
192191
from ._models_py3 import FirewallPolicyFilterRule
193192
from ._models_py3 import FirewallPolicyFilterRuleAction
194193
from ._models_py3 import FirewallPolicyNatRule
@@ -198,8 +197,6 @@
198197
from ._models_py3 import FirewallPolicyRuleConditionApplicationProtocol
199198
from ._models_py3 import FirewallPolicyRuleGroup
200199
from ._models_py3 import FirewallPolicyThreatIntelWhitelist
201-
from ._models_py3 import FirewallPolicyTransportSecurity
202-
from ._models_py3 import FirewallPolicyTrustedRootCertificate
203200
from ._models_py3 import FlowLog
204201
from ._models_py3 import FlowLogFormatParameters
205202
from ._models_py3 import FlowLogInformation
@@ -594,7 +591,6 @@
594591
from ._models import ExpressRouteServiceProvider
595592
from ._models import ExpressRouteServiceProviderBandwidthsOffered
596593
from ._models import FirewallPolicy
597-
from ._models import FirewallPolicyCertificateAuthority
598594
from ._models import FirewallPolicyFilterRule
599595
from ._models import FirewallPolicyFilterRuleAction
600596
from ._models import FirewallPolicyNatRule
@@ -604,8 +600,6 @@
604600
from ._models import FirewallPolicyRuleConditionApplicationProtocol
605601
from ._models import FirewallPolicyRuleGroup
606602
from ._models import FirewallPolicyThreatIntelWhitelist
607-
from ._models import FirewallPolicyTransportSecurity
608-
from ._models import FirewallPolicyTrustedRootCertificate
609603
from ._models import FlowLog
610604
from ._models import FlowLogFormatParameters
611605
from ._models import FlowLogInformation
@@ -959,7 +953,6 @@
959953
ExpressRouteLinkConnectorType,
960954
ExpressRouteLinkAdminState,
961955
ExpressRoutePortsEncapsulation,
962-
FirewallPolicyIntrusionSystemMode,
963956
FirewallPolicyNatRuleActionType,
964957
FirewallPolicyFilterRuleActionType,
965958
FirewallPolicyRuleConditionApplicationProtocolType,
@@ -1220,7 +1213,6 @@
12201213
'ExpressRouteServiceProvider',
12211214
'ExpressRouteServiceProviderBandwidthsOffered',
12221215
'FirewallPolicy',
1223-
'FirewallPolicyCertificateAuthority',
12241216
'FirewallPolicyFilterRule',
12251217
'FirewallPolicyFilterRuleAction',
12261218
'FirewallPolicyNatRule',
@@ -1230,8 +1222,6 @@
12301222
'FirewallPolicyRuleConditionApplicationProtocol',
12311223
'FirewallPolicyRuleGroup',
12321224
'FirewallPolicyThreatIntelWhitelist',
1233-
'FirewallPolicyTransportSecurity',
1234-
'FirewallPolicyTrustedRootCertificate',
12351225
'FlowLog',
12361226
'FlowLogFormatParameters',
12371227
'FlowLogInformation',
@@ -1584,7 +1574,6 @@
15841574
'ExpressRouteLinkConnectorType',
15851575
'ExpressRouteLinkAdminState',
15861576
'ExpressRoutePortsEncapsulation',
1587-
'FirewallPolicyIntrusionSystemMode',
15881577
'FirewallPolicyNatRuleActionType',
15891578
'FirewallPolicyFilterRuleActionType',
15901579
'FirewallPolicyRuleConditionApplicationProtocolType',

sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_models.py

Lines changed: 5 additions & 100 deletions
Original file line numberDiff line numberDiff line change
@@ -2316,8 +2316,6 @@ class ApplicationRuleCondition(FirewallPolicyRuleCondition):
23162316
:param protocols: Array of Application Protocols.
23172317
:type protocols:
23182318
list[~azure.mgmt.network.v2020_04_01.models.FirewallPolicyRuleConditionApplicationProtocol]
2319-
:param target_urls: List of Urls for this rule condition.
2320-
:type target_urls: list[str]
23212319
:param target_fqdns: List of FQDNs for this rule condition.
23222320
:type target_fqdns: list[str]
23232321
:param fqdn_tags: List of FQDN Tags for this rule condition.
@@ -2337,7 +2335,6 @@ class ApplicationRuleCondition(FirewallPolicyRuleCondition):
23372335
'source_addresses': {'key': 'sourceAddresses', 'type': '[str]'},
23382336
'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'},
23392337
'protocols': {'key': 'protocols', 'type': '[FirewallPolicyRuleConditionApplicationProtocol]'},
2340-
'target_urls': {'key': 'targetUrls', 'type': '[str]'},
23412338
'target_fqdns': {'key': 'targetFqdns', 'type': '[str]'},
23422339
'fqdn_tags': {'key': 'fqdnTags', 'type': '[str]'},
23432340
'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'},
@@ -2348,7 +2345,6 @@ def __init__(self, **kwargs):
23482345
self.source_addresses = kwargs.get('source_addresses', None)
23492346
self.destination_addresses = kwargs.get('destination_addresses', None)
23502347
self.protocols = kwargs.get('protocols', None)
2351-
self.target_urls = kwargs.get('target_urls', None)
23522348
self.target_fqdns = kwargs.get('target_fqdns', None)
23532349
self.fqdn_tags = kwargs.get('fqdn_tags', None)
23542350
self.source_ip_groups = kwargs.get('source_ip_groups', None)
@@ -3534,13 +3530,13 @@ class BackendAddressPool(SubResource):
35343530

35353531
:param id: Resource ID.
35363532
:type id: str
3533+
:param load_balancer_backend_addresses: An array of backend addresses.
3534+
:type load_balancer_backend_addresses:
3535+
list[~azure.mgmt.network.v2020_04_01.models.LoadBalancerBackendAddress]
35373536
:ivar backend_ip_configurations: An array of references to IP addresses
35383537
defined in network interfaces.
35393538
:vartype backend_ip_configurations:
35403539
list[~azure.mgmt.network.v2020_04_01.models.NetworkInterfaceIPConfiguration]
3541-
:param load_balancer_backend_addresses: An array of backend addresses.
3542-
:type load_balancer_backend_addresses:
3543-
list[~azure.mgmt.network.v2020_04_01.models.LoadBalancerBackendAddress]
35443540
:ivar load_balancing_rules: An array of references to load balancing rules
35453541
that use this backend address pool.
35463542
:vartype load_balancing_rules:
@@ -3580,8 +3576,8 @@ class BackendAddressPool(SubResource):
35803576

35813577
_attribute_map = {
35823578
'id': {'key': 'id', 'type': 'str'},
3583-
'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'},
35843579
'load_balancer_backend_addresses': {'key': 'properties.loadBalancerBackendAddresses', 'type': '[LoadBalancerBackendAddress]'},
3580+
'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'},
35853581
'load_balancing_rules': {'key': 'properties.loadBalancingRules', 'type': '[SubResource]'},
35863582
'outbound_rule': {'key': 'properties.outboundRule', 'type': 'SubResource'},
35873583
'outbound_rules': {'key': 'properties.outboundRules', 'type': '[SubResource]'},
@@ -3593,8 +3589,8 @@ class BackendAddressPool(SubResource):
35933589

35943590
def __init__(self, **kwargs):
35953591
super(BackendAddressPool, self).__init__(**kwargs)
3596-
self.backend_ip_configurations = None
35973592
self.load_balancer_backend_addresses = kwargs.get('load_balancer_backend_addresses', None)
3593+
self.backend_ip_configurations = None
35983594
self.load_balancing_rules = None
35993595
self.outbound_rule = None
36003596
self.outbound_rules = None
@@ -7738,19 +7734,9 @@ class FirewallPolicy(Resource):
77387734
:param threat_intel_whitelist: ThreatIntel Whitelist for Firewall Policy.
77397735
:type threat_intel_whitelist:
77407736
~azure.mgmt.network.v2020_04_01.models.FirewallPolicyThreatIntelWhitelist
7741-
:param intrusion_system_mode: The operation mode for Intrusion system.
7742-
Possible values include: 'Enabled', 'Disabled'
7743-
:type intrusion_system_mode: str or
7744-
~azure.mgmt.network.v2020_04_01.models.FirewallPolicyIntrusionSystemMode
7745-
:param transport_security: TLS Configuration definition.
7746-
:type transport_security:
7747-
~azure.mgmt.network.v2020_04_01.models.FirewallPolicyTransportSecurity
77487737
:ivar etag: A unique read-only string that changes whenever the resource
77497738
is updated.
77507739
:vartype etag: str
7751-
:param identity: The identity of the firewall policy.
7752-
:type identity:
7753-
~azure.mgmt.network.v2020_04_01.models.ManagedServiceIdentity
77547740
"""
77557741

77567742
_validation = {
@@ -7776,10 +7762,7 @@ class FirewallPolicy(Resource):
77767762
'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'},
77777763
'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'},
77787764
'threat_intel_whitelist': {'key': 'properties.threatIntelWhitelist', 'type': 'FirewallPolicyThreatIntelWhitelist'},
7779-
'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'},
7780-
'transport_security': {'key': 'properties.transportSecurity', 'type': 'FirewallPolicyTransportSecurity'},
77817765
'etag': {'key': 'etag', 'type': 'str'},
7782-
'identity': {'key': 'identity', 'type': 'ManagedServiceIdentity'},
77837766
}
77847767

77857768
def __init__(self, **kwargs):
@@ -7791,31 +7774,7 @@ def __init__(self, **kwargs):
77917774
self.child_policies = None
77927775
self.threat_intel_mode = kwargs.get('threat_intel_mode', None)
77937776
self.threat_intel_whitelist = kwargs.get('threat_intel_whitelist', None)
7794-
self.intrusion_system_mode = kwargs.get('intrusion_system_mode', None)
7795-
self.transport_security = kwargs.get('transport_security', None)
77967777
self.etag = None
7797-
self.identity = kwargs.get('identity', None)
7798-
7799-
7800-
class FirewallPolicyCertificateAuthority(Model):
7801-
"""Trusted Root certificates properties for tls.
7802-
7803-
:param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx)
7804-
'Secret' or 'Certificate' object stored in KeyVault.
7805-
:type key_vault_secret_id: str
7806-
:param name: Name of the CA certificate.
7807-
:type name: str
7808-
"""
7809-
7810-
_attribute_map = {
7811-
'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'},
7812-
'name': {'key': 'name', 'type': 'str'},
7813-
}
7814-
7815-
def __init__(self, **kwargs):
7816-
super(FirewallPolicyCertificateAuthority, self).__init__(**kwargs)
7817-
self.key_vault_secret_id = kwargs.get('key_vault_secret_id', None)
7818-
self.name = kwargs.get('name', None)
78197778

78207779

78217780
class FirewallPolicyRule(Model):
@@ -8077,56 +8036,6 @@ def __init__(self, **kwargs):
80778036
self.fqdns = kwargs.get('fqdns', None)
80788037

80798038

8080-
class FirewallPolicyTransportSecurity(Model):
8081-
"""Configuration needed to perform TLS termination & initiation.
8082-
8083-
:param certificate_authority: The CA used for intermediate CA generation.
8084-
:type certificate_authority:
8085-
~azure.mgmt.network.v2020_04_01.models.FirewallPolicyCertificateAuthority
8086-
:param excluded_domains: List of domains which are excluded from TLS
8087-
termination.
8088-
:type excluded_domains: list[str]
8089-
:param trusted_root_certificates: Certificates which are to be trusted by
8090-
the firewall.
8091-
:type trusted_root_certificates:
8092-
list[~azure.mgmt.network.v2020_04_01.models.FirewallPolicyTrustedRootCertificate]
8093-
"""
8094-
8095-
_attribute_map = {
8096-
'certificate_authority': {'key': 'certificateAuthority', 'type': 'FirewallPolicyCertificateAuthority'},
8097-
'excluded_domains': {'key': 'excludedDomains', 'type': '[str]'},
8098-
'trusted_root_certificates': {'key': 'trustedRootCertificates', 'type': '[FirewallPolicyTrustedRootCertificate]'},
8099-
}
8100-
8101-
def __init__(self, **kwargs):
8102-
super(FirewallPolicyTransportSecurity, self).__init__(**kwargs)
8103-
self.certificate_authority = kwargs.get('certificate_authority', None)
8104-
self.excluded_domains = kwargs.get('excluded_domains', None)
8105-
self.trusted_root_certificates = kwargs.get('trusted_root_certificates', None)
8106-
8107-
8108-
class FirewallPolicyTrustedRootCertificate(Model):
8109-
"""Trusted Root certificates of a firewall policy.
8110-
8111-
:param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx)
8112-
the public certificate data stored in KeyVault.
8113-
:type key_vault_secret_id: str
8114-
:param name: Name of the trusted root certificate that is unique within a
8115-
firewall policy.
8116-
:type name: str
8117-
"""
8118-
8119-
_attribute_map = {
8120-
'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'},
8121-
'name': {'key': 'name', 'type': 'str'},
8122-
}
8123-
8124-
def __init__(self, **kwargs):
8125-
super(FirewallPolicyTrustedRootCertificate, self).__init__(**kwargs)
8126-
self.key_vault_secret_id = kwargs.get('key_vault_secret_id', None)
8127-
self.name = kwargs.get('name', None)
8128-
8129-
81308039
class FlowLog(Resource):
81318040
"""A flow log resource.
81328041

@@ -10294,8 +10203,6 @@ class NatRuleCondition(FirewallPolicyRuleCondition):
1029410203
:type destination_ports: list[str]
1029510204
:param source_ip_groups: List of source IpGroups for this rule.
1029610205
:type source_ip_groups: list[str]
10297-
:param terminate_tls: Terminate TLS connections for this rule.
10298-
:type terminate_tls: bool
1029910206
"""
1030010207

1030110208
_validation = {
@@ -10311,7 +10218,6 @@ class NatRuleCondition(FirewallPolicyRuleCondition):
1031110218
'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'},
1031210219
'destination_ports': {'key': 'destinationPorts', 'type': '[str]'},
1031310220
'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'},
10314-
'terminate_tls': {'key': 'terminateTLS', 'type': 'bool'},
1031510221
}
1031610222

1031710223
def __init__(self, **kwargs):
@@ -10321,7 +10227,6 @@ def __init__(self, **kwargs):
1032110227
self.destination_addresses = kwargs.get('destination_addresses', None)
1032210228
self.destination_ports = kwargs.get('destination_ports', None)
1032310229
self.source_ip_groups = kwargs.get('source_ip_groups', None)
10324-
self.terminate_tls = kwargs.get('terminate_tls', None)
1032510230
self.rule_condition_type = 'NatRuleCondition'
1032610231

1032710232

0 commit comments

Comments
 (0)