diff --git a/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/__init__.py b/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/__init__.py index 105062a36711..56fe257a2c67 100644 --- a/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/__init__.py +++ b/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/__init__.py @@ -44,6 +44,7 @@ from ._models_py3 import DataDisksGroups from ._models_py3 import DiskBillingMeters from ._models_py3 import DiskEncryptionProperties + from ._models_py3 import EncryptionInTransitProperties from ._models_py3 import ErrorResponse, ErrorResponseException from ._models_py3 import Errors from ._models_py3 import ExecuteScriptActionParameters @@ -121,6 +122,7 @@ from ._models import DataDisksGroups from ._models import DiskBillingMeters from ._models import DiskEncryptionProperties + from ._models import EncryptionInTransitProperties from ._models import ErrorResponse, ErrorResponseException from ._models import Errors from ._models import ExecuteScriptActionParameters @@ -216,6 +218,7 @@ 'DataDisksGroups', 'DiskBillingMeters', 'DiskEncryptionProperties', + 'EncryptionInTransitProperties', 'ErrorResponse', 'ErrorResponseException', 'Errors', 'ExecuteScriptActionParameters', diff --git a/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/_models.py b/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/_models.py index feca36e74c5f..fc829691bf10 100644 --- a/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/_models.py +++ b/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/_models.py @@ -657,6 +657,10 @@ class ClusterCreateProperties(Model): :param disk_encryption_properties: The disk encryption properties. :type disk_encryption_properties: ~azure.mgmt.hdinsight.models.DiskEncryptionProperties + :param encryption_in_transit_properties: The encryption-in-transit + properties. + :type encryption_in_transit_properties: + ~azure.mgmt.hdinsight.models.EncryptionInTransitProperties :param min_supported_tls_version: The minimal supported tls version. :type min_supported_tls_version: str :param network_settings: The network settings. @@ -673,6 +677,7 @@ class ClusterCreateProperties(Model): 'compute_profile': {'key': 'computeProfile', 'type': 'ComputeProfile'}, 'storage_profile': {'key': 'storageProfile', 'type': 'StorageProfile'}, 'disk_encryption_properties': {'key': 'diskEncryptionProperties', 'type': 'DiskEncryptionProperties'}, + 'encryption_in_transit_properties': {'key': 'encryptionInTransitProperties', 'type': 'EncryptionInTransitProperties'}, 'min_supported_tls_version': {'key': 'minSupportedTlsVersion', 'type': 'str'}, 'network_settings': {'key': 'networkSettings', 'type': 'NetworkSettings'}, } @@ -688,6 +693,7 @@ def __init__(self, **kwargs): self.compute_profile = kwargs.get('compute_profile', None) self.storage_profile = kwargs.get('storage_profile', None) self.disk_encryption_properties = kwargs.get('disk_encryption_properties', None) + self.encryption_in_transit_properties = kwargs.get('encryption_in_transit_properties', None) self.min_supported_tls_version = kwargs.get('min_supported_tls_version', None) self.network_settings = kwargs.get('network_settings', None) @@ -788,6 +794,10 @@ class ClusterGetProperties(Model): :param disk_encryption_properties: The disk encryption properties. :type disk_encryption_properties: ~azure.mgmt.hdinsight.models.DiskEncryptionProperties + :param encryption_in_transit_properties: The encryption-in-transit + properties. + :type encryption_in_transit_properties: + ~azure.mgmt.hdinsight.models.EncryptionInTransitProperties :param min_supported_tls_version: The minimal supported tls version. :type min_supported_tls_version: str :param network_settings: The network settings. @@ -813,6 +823,7 @@ class ClusterGetProperties(Model): 'errors': {'key': 'errors', 'type': '[Errors]'}, 'connectivity_endpoints': {'key': 'connectivityEndpoints', 'type': '[ConnectivityEndpoint]'}, 'disk_encryption_properties': {'key': 'diskEncryptionProperties', 'type': 'DiskEncryptionProperties'}, + 'encryption_in_transit_properties': {'key': 'encryptionInTransitProperties', 'type': 'EncryptionInTransitProperties'}, 'min_supported_tls_version': {'key': 'minSupportedTlsVersion', 'type': 'str'}, 'network_settings': {'key': 'networkSettings', 'type': 'NetworkSettings'}, } @@ -833,6 +844,7 @@ def __init__(self, **kwargs): self.errors = kwargs.get('errors', None) self.connectivity_endpoints = kwargs.get('connectivity_endpoints', None) self.disk_encryption_properties = kwargs.get('disk_encryption_properties', None) + self.encryption_in_transit_properties = kwargs.get('encryption_in_transit_properties', None) self.min_supported_tls_version = kwargs.get('min_supported_tls_version', None) self.network_settings = kwargs.get('network_settings', None) @@ -1160,6 +1172,9 @@ class DiskEncryptionProperties(Model): :param msi_resource_id: Resource ID of Managed Identity that is used to access the key vault. :type msi_resource_id: str + :param encryption_at_host: Indicates whether or not resource disk + encryption is enabled. Default value: False . + :type encryption_at_host: bool """ _attribute_map = { @@ -1168,6 +1183,7 @@ class DiskEncryptionProperties(Model): 'key_version': {'key': 'keyVersion', 'type': 'str'}, 'encryption_algorithm': {'key': 'encryptionAlgorithm', 'type': 'str'}, 'msi_resource_id': {'key': 'msiResourceId', 'type': 'str'}, + 'encryption_at_host': {'key': 'encryptionAtHost', 'type': 'bool'}, } def __init__(self, **kwargs): @@ -1177,6 +1193,24 @@ def __init__(self, **kwargs): self.key_version = kwargs.get('key_version', None) self.encryption_algorithm = kwargs.get('encryption_algorithm', None) self.msi_resource_id = kwargs.get('msi_resource_id', None) + self.encryption_at_host = kwargs.get('encryption_at_host', False) + + +class EncryptionInTransitProperties(Model): + """The encryption-in-transit properties. + + :param is_encryption_in_transit_enabled: Indicates whether or not inter + cluster node communication is encrypted in transit. Default value: False . + :type is_encryption_in_transit_enabled: bool + """ + + _attribute_map = { + 'is_encryption_in_transit_enabled': {'key': 'isEncryptionInTransitEnabled', 'type': 'bool'}, + } + + def __init__(self, **kwargs): + super(EncryptionInTransitProperties, self).__init__(**kwargs) + self.is_encryption_in_transit_enabled = kwargs.get('is_encryption_in_transit_enabled', False) class ErrorResponse(Model): diff --git a/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/_models_py3.py b/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/_models_py3.py index 071e05022297..269c292fd4b3 100644 --- a/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/_models_py3.py +++ b/sdk/hdinsight/azure-mgmt-hdinsight/azure/mgmt/hdinsight/models/_models_py3.py @@ -657,6 +657,10 @@ class ClusterCreateProperties(Model): :param disk_encryption_properties: The disk encryption properties. :type disk_encryption_properties: ~azure.mgmt.hdinsight.models.DiskEncryptionProperties + :param encryption_in_transit_properties: The encryption-in-transit + properties. + :type encryption_in_transit_properties: + ~azure.mgmt.hdinsight.models.EncryptionInTransitProperties :param min_supported_tls_version: The minimal supported tls version. :type min_supported_tls_version: str :param network_settings: The network settings. @@ -673,11 +677,12 @@ class ClusterCreateProperties(Model): 'compute_profile': {'key': 'computeProfile', 'type': 'ComputeProfile'}, 'storage_profile': {'key': 'storageProfile', 'type': 'StorageProfile'}, 'disk_encryption_properties': {'key': 'diskEncryptionProperties', 'type': 'DiskEncryptionProperties'}, + 'encryption_in_transit_properties': {'key': 'encryptionInTransitProperties', 'type': 'EncryptionInTransitProperties'}, 'min_supported_tls_version': {'key': 'minSupportedTlsVersion', 'type': 'str'}, 'network_settings': {'key': 'networkSettings', 'type': 'NetworkSettings'}, } - def __init__(self, *, cluster_version: str=None, os_type=None, tier=None, cluster_definition=None, kafka_rest_properties=None, security_profile=None, compute_profile=None, storage_profile=None, disk_encryption_properties=None, min_supported_tls_version: str=None, network_settings=None, **kwargs) -> None: + def __init__(self, *, cluster_version: str=None, os_type=None, tier=None, cluster_definition=None, kafka_rest_properties=None, security_profile=None, compute_profile=None, storage_profile=None, disk_encryption_properties=None, encryption_in_transit_properties=None, min_supported_tls_version: str=None, network_settings=None, **kwargs) -> None: super(ClusterCreateProperties, self).__init__(**kwargs) self.cluster_version = cluster_version self.os_type = os_type @@ -688,6 +693,7 @@ def __init__(self, *, cluster_version: str=None, os_type=None, tier=None, cluste self.compute_profile = compute_profile self.storage_profile = storage_profile self.disk_encryption_properties = disk_encryption_properties + self.encryption_in_transit_properties = encryption_in_transit_properties self.min_supported_tls_version = min_supported_tls_version self.network_settings = network_settings @@ -788,6 +794,10 @@ class ClusterGetProperties(Model): :param disk_encryption_properties: The disk encryption properties. :type disk_encryption_properties: ~azure.mgmt.hdinsight.models.DiskEncryptionProperties + :param encryption_in_transit_properties: The encryption-in-transit + properties. + :type encryption_in_transit_properties: + ~azure.mgmt.hdinsight.models.EncryptionInTransitProperties :param min_supported_tls_version: The minimal supported tls version. :type min_supported_tls_version: str :param network_settings: The network settings. @@ -813,11 +823,12 @@ class ClusterGetProperties(Model): 'errors': {'key': 'errors', 'type': '[Errors]'}, 'connectivity_endpoints': {'key': 'connectivityEndpoints', 'type': '[ConnectivityEndpoint]'}, 'disk_encryption_properties': {'key': 'diskEncryptionProperties', 'type': 'DiskEncryptionProperties'}, + 'encryption_in_transit_properties': {'key': 'encryptionInTransitProperties', 'type': 'EncryptionInTransitProperties'}, 'min_supported_tls_version': {'key': 'minSupportedTlsVersion', 'type': 'str'}, 'network_settings': {'key': 'networkSettings', 'type': 'NetworkSettings'}, } - def __init__(self, *, cluster_definition, cluster_version: str=None, os_type=None, tier=None, kafka_rest_properties=None, security_profile=None, compute_profile=None, provisioning_state=None, created_date: str=None, cluster_state: str=None, quota_info=None, errors=None, connectivity_endpoints=None, disk_encryption_properties=None, min_supported_tls_version: str=None, network_settings=None, **kwargs) -> None: + def __init__(self, *, cluster_definition, cluster_version: str=None, os_type=None, tier=None, kafka_rest_properties=None, security_profile=None, compute_profile=None, provisioning_state=None, created_date: str=None, cluster_state: str=None, quota_info=None, errors=None, connectivity_endpoints=None, disk_encryption_properties=None, encryption_in_transit_properties=None, min_supported_tls_version: str=None, network_settings=None, **kwargs) -> None: super(ClusterGetProperties, self).__init__(**kwargs) self.cluster_version = cluster_version self.os_type = os_type @@ -833,6 +844,7 @@ def __init__(self, *, cluster_definition, cluster_version: str=None, os_type=Non self.errors = errors self.connectivity_endpoints = connectivity_endpoints self.disk_encryption_properties = disk_encryption_properties + self.encryption_in_transit_properties = encryption_in_transit_properties self.min_supported_tls_version = min_supported_tls_version self.network_settings = network_settings @@ -1160,6 +1172,9 @@ class DiskEncryptionProperties(Model): :param msi_resource_id: Resource ID of Managed Identity that is used to access the key vault. :type msi_resource_id: str + :param encryption_at_host: Indicates whether or not resource disk + encryption is enabled. Default value: False . + :type encryption_at_host: bool """ _attribute_map = { @@ -1168,15 +1183,34 @@ class DiskEncryptionProperties(Model): 'key_version': {'key': 'keyVersion', 'type': 'str'}, 'encryption_algorithm': {'key': 'encryptionAlgorithm', 'type': 'str'}, 'msi_resource_id': {'key': 'msiResourceId', 'type': 'str'}, + 'encryption_at_host': {'key': 'encryptionAtHost', 'type': 'bool'}, } - def __init__(self, *, vault_uri: str=None, key_name: str=None, key_version: str=None, encryption_algorithm=None, msi_resource_id: str=None, **kwargs) -> None: + def __init__(self, *, vault_uri: str=None, key_name: str=None, key_version: str=None, encryption_algorithm=None, msi_resource_id: str=None, encryption_at_host: bool=False, **kwargs) -> None: super(DiskEncryptionProperties, self).__init__(**kwargs) self.vault_uri = vault_uri self.key_name = key_name self.key_version = key_version self.encryption_algorithm = encryption_algorithm self.msi_resource_id = msi_resource_id + self.encryption_at_host = encryption_at_host + + +class EncryptionInTransitProperties(Model): + """The encryption-in-transit properties. + + :param is_encryption_in_transit_enabled: Indicates whether or not inter + cluster node communication is encrypted in transit. Default value: False . + :type is_encryption_in_transit_enabled: bool + """ + + _attribute_map = { + 'is_encryption_in_transit_enabled': {'key': 'isEncryptionInTransitEnabled', 'type': 'bool'}, + } + + def __init__(self, *, is_encryption_in_transit_enabled: bool=False, **kwargs) -> None: + super(EncryptionInTransitProperties, self).__init__(**kwargs) + self.is_encryption_in_transit_enabled = is_encryption_in_transit_enabled class ErrorResponse(Model):