Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[AutoPR web/resource-manager] typo: web/resource-manager/Microsoft.Web/stable/2018-02-01/WebApps.json #4208

Merged
merged 1 commit into from
Jan 26, 2019
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions azure-mgmt-web/azure/mgmt/web/models/cors_settings.py
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,19 @@ class CorsSettings(Model):
allowed to make cross-origin
calls (for example: http://example.com:12345). Use "*" to allow all.
:type allowed_origins: list[str]
:param support_credentials: Gets or sets whether CORS requests with
credentials are allowed. See
https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#Requests_with_credentials
for more details.
:type support_credentials: bool
"""

_attribute_map = {
'allowed_origins': {'key': 'allowedOrigins', 'type': '[str]'},
'support_credentials': {'key': 'supportCredentials', 'type': 'bool'},
}

def __init__(self, **kwargs):
super(CorsSettings, self).__init__(**kwargs)
self.allowed_origins = kwargs.get('allowed_origins', None)
self.support_credentials = kwargs.get('support_credentials', None)
9 changes: 8 additions & 1 deletion azure-mgmt-web/azure/mgmt/web/models/cors_settings_py3.py
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,19 @@ class CorsSettings(Model):
allowed to make cross-origin
calls (for example: http://example.com:12345). Use "*" to allow all.
:type allowed_origins: list[str]
:param support_credentials: Gets or sets whether CORS requests with
credentials are allowed. See
https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#Requests_with_credentials
for more details.
:type support_credentials: bool
"""

_attribute_map = {
'allowed_origins': {'key': 'allowedOrigins', 'type': '[str]'},
'support_credentials': {'key': 'supportCredentials', 'type': 'bool'},
}

def __init__(self, *, allowed_origins=None, **kwargs) -> None:
def __init__(self, *, allowed_origins=None, support_credentials: bool=None, **kwargs) -> None:
super(CorsSettings, self).__init__(**kwargs)
self.allowed_origins = allowed_origins
self.support_credentials = support_credentials
7 changes: 7 additions & 0 deletions azure-mgmt-web/azure/mgmt/web/models/site_auth_settings.py
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,11 @@ class SiteAuthSettings(ProxyOnlyResource):
More information on OpenID Connect:
http://openid.net/specs/openid-connect-core-1_0.html
:type client_secret: str
:param client_secret_certificate_thumbprint: An alternative to the client
secret, that is the thumbprint of a certificate used for signing purposes.
This property acts as
a replacement for the Client Secret. It is also optional.
:type client_secret_certificate_thumbprint: str
:param issuer: The OpenID Connect Issuer URI that represents the entity
which issues access tokens for this application.
When using Azure Active Directory, this value is the URI of the directory
Expand Down Expand Up @@ -190,6 +195,7 @@ class SiteAuthSettings(ProxyOnlyResource):
'token_refresh_extension_hours': {'key': 'properties.tokenRefreshExtensionHours', 'type': 'float'},
'client_id': {'key': 'properties.clientId', 'type': 'str'},
'client_secret': {'key': 'properties.clientSecret', 'type': 'str'},
'client_secret_certificate_thumbprint': {'key': 'properties.clientSecretCertificateThumbprint', 'type': 'str'},
'issuer': {'key': 'properties.issuer', 'type': 'str'},
'validate_issuer': {'key': 'properties.validateIssuer', 'type': 'bool'},
'allowed_audiences': {'key': 'properties.allowedAudiences', 'type': '[str]'},
Expand Down Expand Up @@ -218,6 +224,7 @@ def __init__(self, **kwargs):
self.token_refresh_extension_hours = kwargs.get('token_refresh_extension_hours', None)
self.client_id = kwargs.get('client_id', None)
self.client_secret = kwargs.get('client_secret', None)
self.client_secret_certificate_thumbprint = kwargs.get('client_secret_certificate_thumbprint', None)
self.issuer = kwargs.get('issuer', None)
self.validate_issuer = kwargs.get('validate_issuer', None)
self.allowed_audiences = kwargs.get('allowed_audiences', None)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,11 @@ class SiteAuthSettings(ProxyOnlyResource):
More information on OpenID Connect:
http://openid.net/specs/openid-connect-core-1_0.html
:type client_secret: str
:param client_secret_certificate_thumbprint: An alternative to the client
secret, that is the thumbprint of a certificate used for signing purposes.
This property acts as
a replacement for the Client Secret. It is also optional.
:type client_secret_certificate_thumbprint: str
:param issuer: The OpenID Connect Issuer URI that represents the entity
which issues access tokens for this application.
When using Azure Active Directory, this value is the URI of the directory
Expand Down Expand Up @@ -190,6 +195,7 @@ class SiteAuthSettings(ProxyOnlyResource):
'token_refresh_extension_hours': {'key': 'properties.tokenRefreshExtensionHours', 'type': 'float'},
'client_id': {'key': 'properties.clientId', 'type': 'str'},
'client_secret': {'key': 'properties.clientSecret', 'type': 'str'},
'client_secret_certificate_thumbprint': {'key': 'properties.clientSecretCertificateThumbprint', 'type': 'str'},
'issuer': {'key': 'properties.issuer', 'type': 'str'},
'validate_issuer': {'key': 'properties.validateIssuer', 'type': 'bool'},
'allowed_audiences': {'key': 'properties.allowedAudiences', 'type': '[str]'},
Expand All @@ -207,7 +213,7 @@ class SiteAuthSettings(ProxyOnlyResource):
'microsoft_account_oauth_scopes': {'key': 'properties.microsoftAccountOAuthScopes', 'type': '[str]'},
}

def __init__(self, *, kind: str=None, enabled: bool=None, runtime_version: str=None, unauthenticated_client_action=None, token_store_enabled: bool=None, allowed_external_redirect_urls=None, default_provider=None, token_refresh_extension_hours: float=None, client_id: str=None, client_secret: str=None, issuer: str=None, validate_issuer: bool=None, allowed_audiences=None, additional_login_params=None, google_client_id: str=None, google_client_secret: str=None, google_oauth_scopes=None, facebook_app_id: str=None, facebook_app_secret: str=None, facebook_oauth_scopes=None, twitter_consumer_key: str=None, twitter_consumer_secret: str=None, microsoft_account_client_id: str=None, microsoft_account_client_secret: str=None, microsoft_account_oauth_scopes=None, **kwargs) -> None:
def __init__(self, *, kind: str=None, enabled: bool=None, runtime_version: str=None, unauthenticated_client_action=None, token_store_enabled: bool=None, allowed_external_redirect_urls=None, default_provider=None, token_refresh_extension_hours: float=None, client_id: str=None, client_secret: str=None, client_secret_certificate_thumbprint: str=None, issuer: str=None, validate_issuer: bool=None, allowed_audiences=None, additional_login_params=None, google_client_id: str=None, google_client_secret: str=None, google_oauth_scopes=None, facebook_app_id: str=None, facebook_app_secret: str=None, facebook_oauth_scopes=None, twitter_consumer_key: str=None, twitter_consumer_secret: str=None, microsoft_account_client_id: str=None, microsoft_account_client_secret: str=None, microsoft_account_oauth_scopes=None, **kwargs) -> None:
super(SiteAuthSettings, self).__init__(kind=kind, **kwargs)
self.enabled = enabled
self.runtime_version = runtime_version
Expand All @@ -218,6 +224,7 @@ def __init__(self, *, kind: str=None, enabled: bool=None, runtime_version: str=N
self.token_refresh_extension_hours = token_refresh_extension_hours
self.client_id = client_id
self.client_secret = client_secret
self.client_secret_certificate_thumbprint = client_secret_certificate_thumbprint
self.issuer = issuer
self.validate_issuer = validate_issuer
self.allowed_audiences = allowed_audiences
Expand Down
12 changes: 11 additions & 1 deletion azure-mgmt-web/azure/mgmt/web/models/site_config.py
Original file line number Diff line number Diff line change
Expand Up @@ -129,9 +129,15 @@ class SiteConfig(Model):
:type managed_service_identity_id: int
:param x_managed_service_identity_id: Explicit Managed Service Identity Id
:type x_managed_service_identity_id: int
:param ip_security_restrictions: IP security restrictions.
:param ip_security_restrictions: IP security restrictions for main.
:type ip_security_restrictions:
list[~azure.mgmt.web.models.IpSecurityRestriction]
:param scm_ip_security_restrictions: IP security restrictions for scm.
:type scm_ip_security_restrictions:
list[~azure.mgmt.web.models.IpSecurityRestriction]
:param scm_ip_security_restrictions_use_main: IP security restrictions for
scm to use main.
:type scm_ip_security_restrictions_use_main: bool
:param http20_enabled: Http20Enabled: configures a web site to allow
clients to connect over http2.0. Default value: True .
:type http20_enabled: bool
Expand Down Expand Up @@ -200,6 +206,8 @@ class SiteConfig(Model):
'managed_service_identity_id': {'key': 'managedServiceIdentityId', 'type': 'int'},
'x_managed_service_identity_id': {'key': 'xManagedServiceIdentityId', 'type': 'int'},
'ip_security_restrictions': {'key': 'ipSecurityRestrictions', 'type': '[IpSecurityRestriction]'},
'scm_ip_security_restrictions': {'key': 'scmIpSecurityRestrictions', 'type': '[IpSecurityRestriction]'},
'scm_ip_security_restrictions_use_main': {'key': 'scmIpSecurityRestrictionsUseMain', 'type': 'bool'},
'http20_enabled': {'key': 'http20Enabled', 'type': 'bool'},
'min_tls_version': {'key': 'minTlsVersion', 'type': 'str'},
'ftps_state': {'key': 'ftpsState', 'type': 'str'},
Expand Down Expand Up @@ -255,6 +263,8 @@ def __init__(self, **kwargs):
self.managed_service_identity_id = kwargs.get('managed_service_identity_id', None)
self.x_managed_service_identity_id = kwargs.get('x_managed_service_identity_id', None)
self.ip_security_restrictions = kwargs.get('ip_security_restrictions', None)
self.scm_ip_security_restrictions = kwargs.get('scm_ip_security_restrictions', None)
self.scm_ip_security_restrictions_use_main = kwargs.get('scm_ip_security_restrictions_use_main', None)
self.http20_enabled = kwargs.get('http20_enabled', True)
self.min_tls_version = kwargs.get('min_tls_version', None)
self.ftps_state = kwargs.get('ftps_state', None)
Expand Down
14 changes: 12 additions & 2 deletions azure-mgmt-web/azure/mgmt/web/models/site_config_py3.py
Original file line number Diff line number Diff line change
Expand Up @@ -129,9 +129,15 @@ class SiteConfig(Model):
:type managed_service_identity_id: int
:param x_managed_service_identity_id: Explicit Managed Service Identity Id
:type x_managed_service_identity_id: int
:param ip_security_restrictions: IP security restrictions.
:param ip_security_restrictions: IP security restrictions for main.
:type ip_security_restrictions:
list[~azure.mgmt.web.models.IpSecurityRestriction]
:param scm_ip_security_restrictions: IP security restrictions for scm.
:type scm_ip_security_restrictions:
list[~azure.mgmt.web.models.IpSecurityRestriction]
:param scm_ip_security_restrictions_use_main: IP security restrictions for
scm to use main.
:type scm_ip_security_restrictions_use_main: bool
:param http20_enabled: Http20Enabled: configures a web site to allow
clients to connect over http2.0. Default value: True .
:type http20_enabled: bool
Expand Down Expand Up @@ -200,13 +206,15 @@ class SiteConfig(Model):
'managed_service_identity_id': {'key': 'managedServiceIdentityId', 'type': 'int'},
'x_managed_service_identity_id': {'key': 'xManagedServiceIdentityId', 'type': 'int'},
'ip_security_restrictions': {'key': 'ipSecurityRestrictions', 'type': '[IpSecurityRestriction]'},
'scm_ip_security_restrictions': {'key': 'scmIpSecurityRestrictions', 'type': '[IpSecurityRestriction]'},
'scm_ip_security_restrictions_use_main': {'key': 'scmIpSecurityRestrictionsUseMain', 'type': 'bool'},
'http20_enabled': {'key': 'http20Enabled', 'type': 'bool'},
'min_tls_version': {'key': 'minTlsVersion', 'type': 'str'},
'ftps_state': {'key': 'ftpsState', 'type': 'str'},
'reserved_instance_count': {'key': 'reservedInstanceCount', 'type': 'int'},
}

def __init__(self, *, number_of_workers: int=None, default_documents=None, net_framework_version: str="v4.6", php_version: str=None, python_version: str=None, node_version: str=None, linux_fx_version: str=None, windows_fx_version: str=None, request_tracing_enabled: bool=None, request_tracing_expiration_time=None, remote_debugging_enabled: bool=None, remote_debugging_version: str=None, http_logging_enabled: bool=None, logs_directory_size_limit: int=None, detailed_error_logging_enabled: bool=None, publishing_username: str=None, app_settings=None, azure_storage_accounts=None, connection_strings=None, handler_mappings=None, document_root: str=None, scm_type=None, use32_bit_worker_process: bool=None, web_sockets_enabled: bool=None, always_on: bool=None, java_version: str=None, java_container: str=None, java_container_version: str=None, app_command_line: str=None, managed_pipeline_mode=None, virtual_applications=None, load_balancing=None, experiments=None, limits=None, auto_heal_enabled: bool=None, auto_heal_rules=None, tracing_options: str=None, vnet_name: str=None, cors=None, push=None, api_definition=None, auto_swap_slot_name: str=None, local_my_sql_enabled: bool=False, managed_service_identity_id: int=None, x_managed_service_identity_id: int=None, ip_security_restrictions=None, http20_enabled: bool=True, min_tls_version=None, ftps_state=None, reserved_instance_count: int=None, **kwargs) -> None:
def __init__(self, *, number_of_workers: int=None, default_documents=None, net_framework_version: str="v4.6", php_version: str=None, python_version: str=None, node_version: str=None, linux_fx_version: str=None, windows_fx_version: str=None, request_tracing_enabled: bool=None, request_tracing_expiration_time=None, remote_debugging_enabled: bool=None, remote_debugging_version: str=None, http_logging_enabled: bool=None, logs_directory_size_limit: int=None, detailed_error_logging_enabled: bool=None, publishing_username: str=None, app_settings=None, azure_storage_accounts=None, connection_strings=None, handler_mappings=None, document_root: str=None, scm_type=None, use32_bit_worker_process: bool=None, web_sockets_enabled: bool=None, always_on: bool=None, java_version: str=None, java_container: str=None, java_container_version: str=None, app_command_line: str=None, managed_pipeline_mode=None, virtual_applications=None, load_balancing=None, experiments=None, limits=None, auto_heal_enabled: bool=None, auto_heal_rules=None, tracing_options: str=None, vnet_name: str=None, cors=None, push=None, api_definition=None, auto_swap_slot_name: str=None, local_my_sql_enabled: bool=False, managed_service_identity_id: int=None, x_managed_service_identity_id: int=None, ip_security_restrictions=None, scm_ip_security_restrictions=None, scm_ip_security_restrictions_use_main: bool=None, http20_enabled: bool=True, min_tls_version=None, ftps_state=None, reserved_instance_count: int=None, **kwargs) -> None:
super(SiteConfig, self).__init__(**kwargs)
self.number_of_workers = number_of_workers
self.default_documents = default_documents
Expand Down Expand Up @@ -255,6 +263,8 @@ def __init__(self, *, number_of_workers: int=None, default_documents=None, net_f
self.managed_service_identity_id = managed_service_identity_id
self.x_managed_service_identity_id = x_managed_service_identity_id
self.ip_security_restrictions = ip_security_restrictions
self.scm_ip_security_restrictions = scm_ip_security_restrictions
self.scm_ip_security_restrictions_use_main = scm_ip_security_restrictions_use_main
self.http20_enabled = http20_enabled
self.min_tls_version = min_tls_version
self.ftps_state = ftps_state
Expand Down
12 changes: 11 additions & 1 deletion azure-mgmt-web/azure/mgmt/web/models/site_config_resource.py
Original file line number Diff line number Diff line change
Expand Up @@ -137,9 +137,15 @@ class SiteConfigResource(ProxyOnlyResource):
:type managed_service_identity_id: int
:param x_managed_service_identity_id: Explicit Managed Service Identity Id
:type x_managed_service_identity_id: int
:param ip_security_restrictions: IP security restrictions.
:param ip_security_restrictions: IP security restrictions for main.
:type ip_security_restrictions:
list[~azure.mgmt.web.models.IpSecurityRestriction]
:param scm_ip_security_restrictions: IP security restrictions for scm.
:type scm_ip_security_restrictions:
list[~azure.mgmt.web.models.IpSecurityRestriction]
:param scm_ip_security_restrictions_use_main: IP security restrictions for
scm to use main.
:type scm_ip_security_restrictions_use_main: bool
:param http20_enabled: Http20Enabled: configures a web site to allow
clients to connect over http2.0. Default value: True .
:type http20_enabled: bool
Expand Down Expand Up @@ -215,6 +221,8 @@ class SiteConfigResource(ProxyOnlyResource):
'managed_service_identity_id': {'key': 'properties.managedServiceIdentityId', 'type': 'int'},
'x_managed_service_identity_id': {'key': 'properties.xManagedServiceIdentityId', 'type': 'int'},
'ip_security_restrictions': {'key': 'properties.ipSecurityRestrictions', 'type': '[IpSecurityRestriction]'},
'scm_ip_security_restrictions': {'key': 'properties.scmIpSecurityRestrictions', 'type': '[IpSecurityRestriction]'},
'scm_ip_security_restrictions_use_main': {'key': 'properties.scmIpSecurityRestrictionsUseMain', 'type': 'bool'},
'http20_enabled': {'key': 'properties.http20Enabled', 'type': 'bool'},
'min_tls_version': {'key': 'properties.minTlsVersion', 'type': 'str'},
'ftps_state': {'key': 'properties.ftpsState', 'type': 'str'},
Expand Down Expand Up @@ -270,6 +278,8 @@ def __init__(self, **kwargs):
self.managed_service_identity_id = kwargs.get('managed_service_identity_id', None)
self.x_managed_service_identity_id = kwargs.get('x_managed_service_identity_id', None)
self.ip_security_restrictions = kwargs.get('ip_security_restrictions', None)
self.scm_ip_security_restrictions = kwargs.get('scm_ip_security_restrictions', None)
self.scm_ip_security_restrictions_use_main = kwargs.get('scm_ip_security_restrictions_use_main', None)
self.http20_enabled = kwargs.get('http20_enabled', True)
self.min_tls_version = kwargs.get('min_tls_version', None)
self.ftps_state = kwargs.get('ftps_state', None)
Expand Down
Loading