Skip to content

Commit

Permalink
Generated from 1c9780d8db3b8fab8641f907ae07cd78ca759724
Browse files Browse the repository at this point in the history
  • Loading branch information
SDK Automation committed Oct 5, 2020
1 parent 657a918 commit 608e4c0
Show file tree
Hide file tree
Showing 14 changed files with 29 additions and 35 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,6 @@ def __init__(

client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._serialize.client_side_validation = False
self._deserialize = Deserializer(client_models)

self.vaults = VaultsOperations(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,6 @@ def __init__(

client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._serialize.client_side_validation = False
self._deserialize = Deserializer(client_models)

self.vaults = VaultsOperations(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,6 @@ def __init__(

client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._serialize.client_side_validation = False
self._deserialize = Deserializer(client_models)

self.vaults = VaultsOperations(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,6 @@ def __init__(

client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._serialize.client_side_validation = False
self._deserialize = Deserializer(client_models)

self.vaults = VaultsOperations(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,6 @@ def __init__(

client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._serialize.client_side_validation = False
self._deserialize = Deserializer(client_models)

self.vaults = VaultsOperations(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,6 @@ def __init__(

client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._serialize.client_side_validation = False
self._deserialize = Deserializer(client_models)

self.vaults = VaultsOperations(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1097,8 +1097,8 @@ class VaultProperties(msrest.serialization.Model):
``createMode`` is set to ``recover``\ , access policies are not required. Otherwise, access
policies are required.
:type access_policies: list[~azure.mgmt.keyvault.v2019_09_01.models.AccessPolicyEntry]
:param vault_uri: The URI of the vault for performing operations on keys and secrets.
:type vault_uri: str
:ivar vault_uri: The URI of the vault for performing operations on keys and secrets.
:vartype vault_uri: str
:param enabled_for_deployment: Property to specify whether Azure Virtual Machines are permitted
to retrieve certificates stored as secrets from the key vault.
:type enabled_for_deployment: bool
Expand Down Expand Up @@ -1143,6 +1143,7 @@ class VaultProperties(msrest.serialization.Model):
_validation = {
'tenant_id': {'required': True},
'sku': {'required': True},
'vault_uri': {'readonly': True},
'private_endpoint_connections': {'readonly': True},
}

Expand Down Expand Up @@ -1171,7 +1172,7 @@ def __init__(
self.tenant_id = kwargs['tenant_id']
self.sku = kwargs['sku']
self.access_policies = kwargs.get('access_policies', None)
self.vault_uri = kwargs.get('vault_uri', None)
self.vault_uri = None
self.enabled_for_deployment = kwargs.get('enabled_for_deployment', None)
self.enabled_for_disk_encryption = kwargs.get('enabled_for_disk_encryption', None)
self.enabled_for_template_deployment = kwargs.get('enabled_for_template_deployment', None)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1198,8 +1198,8 @@ class VaultProperties(msrest.serialization.Model):
``createMode`` is set to ``recover``\ , access policies are not required. Otherwise, access
policies are required.
:type access_policies: list[~azure.mgmt.keyvault.v2019_09_01.models.AccessPolicyEntry]
:param vault_uri: The URI of the vault for performing operations on keys and secrets.
:type vault_uri: str
:ivar vault_uri: The URI of the vault for performing operations on keys and secrets.
:vartype vault_uri: str
:param enabled_for_deployment: Property to specify whether Azure Virtual Machines are permitted
to retrieve certificates stored as secrets from the key vault.
:type enabled_for_deployment: bool
Expand Down Expand Up @@ -1244,6 +1244,7 @@ class VaultProperties(msrest.serialization.Model):
_validation = {
'tenant_id': {'required': True},
'sku': {'required': True},
'vault_uri': {'readonly': True},
'private_endpoint_connections': {'readonly': True},
}

Expand All @@ -1270,7 +1271,6 @@ def __init__(
tenant_id: str,
sku: "Sku",
access_policies: Optional[List["AccessPolicyEntry"]] = None,
vault_uri: Optional[str] = None,
enabled_for_deployment: Optional[bool] = None,
enabled_for_disk_encryption: Optional[bool] = None,
enabled_for_template_deployment: Optional[bool] = None,
Expand All @@ -1286,7 +1286,7 @@ def __init__(
self.tenant_id = tenant_id
self.sku = sku
self.access_policies = access_policies
self.vault_uri = vault_uri
self.vault_uri = None
self.enabled_for_deployment = enabled_for_deployment
self.enabled_for_disk_encryption = enabled_for_disk_encryption
self.enabled_for_template_deployment = enabled_for_template_deployment
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,6 @@ def __init__(

client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._serialize.client_side_validation = False
self._deserialize = Deserializer(client_models)

self.vaults = VaultsOperations(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,6 @@ def __init__(

client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)}
self._serialize = Serializer(client_models)
self._serialize.client_side_validation = False
self._deserialize = Deserializer(client_models)

self.vaults = VaultsOperations(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ async def _create_or_update_initial(
url = self._create_or_update_initial.metadata['url'] # type: ignore
path_format_arguments = {
'resourceGroupName': self._serialize.url("resource_group_name", resource_group_name, 'str'),
'name': self._serialize.url("name", name, 'str', pattern=r'^[a-zA-Z0-9]{3,24}$'),
'name': self._serialize.url("name", name, 'str'),
'subscriptionId': self._serialize.url("self._config.subscription_id", self._config.subscription_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
Expand Down Expand Up @@ -186,7 +186,7 @@ async def _update_initial(
url = self._update_initial.metadata['url'] # type: ignore
path_format_arguments = {
'resourceGroupName': self._serialize.url("resource_group_name", resource_group_name, 'str'),
'name': self._serialize.url("name", name, 'str', pattern=r'^[a-zA-Z0-9]{3,24}$'),
'name': self._serialize.url("name", name, 'str'),
'subscriptionId': self._serialize.url("self._config.subscription_id", self._config.subscription_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -461,8 +461,8 @@ class ManagedHsmProperties(msrest.serialization.Model):
:param initial_admin_object_ids: Array of initial administrators object ids for this managed
hsm pool.
:type initial_admin_object_ids: list[str]
:param hsm_pool_uri: The URI of the managed hsm pool for performing operations on keys.
:type hsm_pool_uri: str
:param hsm_uri: The URI of the managed hsm pool for performing operations on keys.
:type hsm_uri: str
:param enable_soft_delete: Property to specify whether the 'soft delete' functionality is
enabled for this managed HSM pool. If it's not set to any value(true or false) when creating
new managed HSM pool, it will be set to true by default. Once set to true, it cannot be
Expand Down Expand Up @@ -496,7 +496,7 @@ class ManagedHsmProperties(msrest.serialization.Model):
_attribute_map = {
'tenant_id': {'key': 'tenantId', 'type': 'str'},
'initial_admin_object_ids': {'key': 'initialAdminObjectIds', 'type': '[str]'},
'hsm_pool_uri': {'key': 'hsmPoolUri', 'type': 'str'},
'hsm_uri': {'key': 'hsmUri', 'type': 'str'},
'enable_soft_delete': {'key': 'enableSoftDelete', 'type': 'bool'},
'soft_delete_retention_in_days': {'key': 'softDeleteRetentionInDays', 'type': 'int'},
'enable_purge_protection': {'key': 'enablePurgeProtection', 'type': 'bool'},
Expand All @@ -512,7 +512,7 @@ def __init__(
super(ManagedHsmProperties, self).__init__(**kwargs)
self.tenant_id = kwargs.get('tenant_id', None)
self.initial_admin_object_ids = kwargs.get('initial_admin_object_ids', None)
self.hsm_pool_uri = kwargs.get('hsm_pool_uri', None)
self.hsm_uri = kwargs.get('hsm_uri', None)
self.enable_soft_delete = kwargs.get('enable_soft_delete', True)
self.soft_delete_retention_in_days = kwargs.get('soft_delete_retention_in_days', 90)
self.enable_purge_protection = kwargs.get('enable_purge_protection', None)
Expand Down Expand Up @@ -1379,8 +1379,8 @@ class VaultProperties(msrest.serialization.Model):
``createMode`` is set to ``recover``\ , access policies are not required. Otherwise, access
policies are required.
:type access_policies: list[~azure.mgmt.keyvault.v2020_04_01_preview.models.AccessPolicyEntry]
:param vault_uri: The URI of the vault for performing operations on keys and secrets.
:type vault_uri: str
:ivar vault_uri: The URI of the vault for performing operations on keys and secrets.
:vartype vault_uri: str
:param enabled_for_deployment: Property to specify whether Azure Virtual Machines are permitted
to retrieve certificates stored as secrets from the key vault.
:type enabled_for_deployment: bool
Expand Down Expand Up @@ -1425,6 +1425,7 @@ class VaultProperties(msrest.serialization.Model):
_validation = {
'tenant_id': {'required': True},
'sku': {'required': True},
'vault_uri': {'readonly': True},
'private_endpoint_connections': {'readonly': True},
}

Expand Down Expand Up @@ -1453,7 +1454,7 @@ def __init__(
self.tenant_id = kwargs['tenant_id']
self.sku = kwargs['sku']
self.access_policies = kwargs.get('access_policies', None)
self.vault_uri = kwargs.get('vault_uri', None)
self.vault_uri = None
self.enabled_for_deployment = kwargs.get('enabled_for_deployment', None)
self.enabled_for_disk_encryption = kwargs.get('enabled_for_disk_encryption', None)
self.enabled_for_template_deployment = kwargs.get('enabled_for_template_deployment', None)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -496,8 +496,8 @@ class ManagedHsmProperties(msrest.serialization.Model):
:param initial_admin_object_ids: Array of initial administrators object ids for this managed
hsm pool.
:type initial_admin_object_ids: list[str]
:param hsm_pool_uri: The URI of the managed hsm pool for performing operations on keys.
:type hsm_pool_uri: str
:param hsm_uri: The URI of the managed hsm pool for performing operations on keys.
:type hsm_uri: str
:param enable_soft_delete: Property to specify whether the 'soft delete' functionality is
enabled for this managed HSM pool. If it's not set to any value(true or false) when creating
new managed HSM pool, it will be set to true by default. Once set to true, it cannot be
Expand Down Expand Up @@ -531,7 +531,7 @@ class ManagedHsmProperties(msrest.serialization.Model):
_attribute_map = {
'tenant_id': {'key': 'tenantId', 'type': 'str'},
'initial_admin_object_ids': {'key': 'initialAdminObjectIds', 'type': '[str]'},
'hsm_pool_uri': {'key': 'hsmPoolUri', 'type': 'str'},
'hsm_uri': {'key': 'hsmUri', 'type': 'str'},
'enable_soft_delete': {'key': 'enableSoftDelete', 'type': 'bool'},
'soft_delete_retention_in_days': {'key': 'softDeleteRetentionInDays', 'type': 'int'},
'enable_purge_protection': {'key': 'enablePurgeProtection', 'type': 'bool'},
Expand All @@ -545,7 +545,7 @@ def __init__(
*,
tenant_id: Optional[str] = None,
initial_admin_object_ids: Optional[List[str]] = None,
hsm_pool_uri: Optional[str] = None,
hsm_uri: Optional[str] = None,
enable_soft_delete: Optional[bool] = True,
soft_delete_retention_in_days: Optional[int] = 90,
enable_purge_protection: Optional[bool] = None,
Expand All @@ -555,7 +555,7 @@ def __init__(
super(ManagedHsmProperties, self).__init__(**kwargs)
self.tenant_id = tenant_id
self.initial_admin_object_ids = initial_admin_object_ids
self.hsm_pool_uri = hsm_pool_uri
self.hsm_uri = hsm_uri
self.enable_soft_delete = enable_soft_delete
self.soft_delete_retention_in_days = soft_delete_retention_in_days
self.enable_purge_protection = enable_purge_protection
Expand Down Expand Up @@ -1503,8 +1503,8 @@ class VaultProperties(msrest.serialization.Model):
``createMode`` is set to ``recover``\ , access policies are not required. Otherwise, access
policies are required.
:type access_policies: list[~azure.mgmt.keyvault.v2020_04_01_preview.models.AccessPolicyEntry]
:param vault_uri: The URI of the vault for performing operations on keys and secrets.
:type vault_uri: str
:ivar vault_uri: The URI of the vault for performing operations on keys and secrets.
:vartype vault_uri: str
:param enabled_for_deployment: Property to specify whether Azure Virtual Machines are permitted
to retrieve certificates stored as secrets from the key vault.
:type enabled_for_deployment: bool
Expand Down Expand Up @@ -1549,6 +1549,7 @@ class VaultProperties(msrest.serialization.Model):
_validation = {
'tenant_id': {'required': True},
'sku': {'required': True},
'vault_uri': {'readonly': True},
'private_endpoint_connections': {'readonly': True},
}

Expand All @@ -1575,7 +1576,6 @@ def __init__(
tenant_id: str,
sku: "Sku",
access_policies: Optional[List["AccessPolicyEntry"]] = None,
vault_uri: Optional[str] = None,
enabled_for_deployment: Optional[bool] = None,
enabled_for_disk_encryption: Optional[bool] = None,
enabled_for_template_deployment: Optional[bool] = None,
Expand All @@ -1591,7 +1591,7 @@ def __init__(
self.tenant_id = tenant_id
self.sku = sku
self.access_policies = access_policies
self.vault_uri = vault_uri
self.vault_uri = None
self.enabled_for_deployment = enabled_for_deployment
self.enabled_for_disk_encryption = enabled_for_disk_encryption
self.enabled_for_template_deployment = enabled_for_template_deployment
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ def _create_or_update_initial(
url = self._create_or_update_initial.metadata['url'] # type: ignore
path_format_arguments = {
'resourceGroupName': self._serialize.url("resource_group_name", resource_group_name, 'str'),
'name': self._serialize.url("name", name, 'str', pattern=r'^[a-zA-Z0-9]{3,24}$'),
'name': self._serialize.url("name", name, 'str'),
'subscriptionId': self._serialize.url("self._config.subscription_id", self._config.subscription_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
Expand Down Expand Up @@ -193,7 +193,7 @@ def _update_initial(
url = self._update_initial.metadata['url'] # type: ignore
path_format_arguments = {
'resourceGroupName': self._serialize.url("resource_group_name", resource_group_name, 'str'),
'name': self._serialize.url("name", name, 'str', pattern=r'^[a-zA-Z0-9]{3,24}$'),
'name': self._serialize.url("name", name, 'str'),
'subscriptionId': self._serialize.url("self._config.subscription_id", self._config.subscription_id, 'str'),
}
url = self._client.format_url(url, **path_format_arguments)
Expand Down

0 comments on commit 608e4c0

Please sign in to comment.