forked from Azure/azure-sdk-for-python
-
Notifications
You must be signed in to change notification settings - Fork 8
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
CodeGen from PR 18900 in Azure/azure-rest-api-specs
Review request for Microsoft.ContainerService to add version 2022-04-02-preview (Azure#18900) * Adds base for updating Microsoft.ContainerService from version preview/2022-03-02-preview to version 2022-04-02-preview * Updates readme * Updates API version in new specs and examples * update readme (Azure#18714) * add NetworkPluginMode to ManagedCluster (Azure#18735) * add NetworkPluginMode to ManagedCluster * add overlay example * remove example * only keep overlap as option * Add properties for apiserver-vnet-integration (Azure#18705) * Update for AKS trusted access feature (Azure#18708) * Update for AKS trusted access feature * fixup! Update for AKS trusted access feature * fixup! fixup! Update for AKS trusted access feature * fixup! fixup! fixup! Update for AKS trusted access feature * fixup! fixup! fixup! fixup! Update for AKS trusted access feature * fixup! fixup! fixup! fixup! fixup! Update for AKS trusted access feature * fixup! fixup! fixup! fixup! fixup! fixup! Update for AKS trusted access feature * fixup! fixup! fixup! fixup! fixup! fixup! fixup! Update for AKS trusted access feature * fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! Update for AKS trusted access feature * fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! Update for AKS trusted access feature * fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! Update for AKS trusted access feature * fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! Update for AKS trusted access feature * OSSKU supports Windows options (Azure#18706) * OSSKU supports Windows options * Add example Create Agent Pool with Windows OSSKU * Improve description about the default value * Improve the description to clarify * Improve description about default Windows OSSKU * add storageProfile into managedcluster (Azure#18817) Signed-off-by: Ji An Liu <[email protected]> * capatalize NetworkPluginMode name (Azure#18884) * capatalize NetworkPluginMode name * capitalize in description * aks: add enableCustomCATrust in v20220402-preview api-version (Azure#18830) * aks: add enableCustomCATrust in v20220402-preview api-version * aks: add description of CustomCATrust * aks: fix typo, add DaemonSet to custom words list Co-authored-by: Mikolaj Umanski <[email protected]> * [AKS] Update on trustedaccess resource (Azure#18947) * Add paging for trusted access * update async state * fixup! update async state * Use enum for TrustedAccessRoleBinding's ProvisioningState (Azure#18950) Co-authored-by: Tyler Lloyd <[email protected]> Co-authored-by: gossion <[email protected]> Co-authored-by: Dong Liu <[email protected]> Co-authored-by: Shiqian Tao <[email protected]> Co-authored-by: Ji'an Liu <[email protected]> Co-authored-by: Mikołaj Umański <[email protected]> Co-authored-by: Mikolaj Umanski <[email protected]>
- Loading branch information
1 parent
353743e
commit 2a693ce
Showing
41 changed files
with
20,996 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,8 +4,8 @@ | |
"@autorest/[email protected]", | ||
"@autorest/[email protected]" | ||
], | ||
"commit": "fb31972c13cf183c43414d2b4736a5d70aa8af68", | ||
"commit": "44b6c8c84d1d20d1c02a1537e39794378cfd52e8", | ||
"repository_url": "https://github.com/Azure/azure-rest-api-specs", | ||
"autorest_command": "autorest specification/containerservice/resource-manager/readme.md --multiapi --python --python-sdks-folder=/home/vsts/work/1/azure-sdk-for-python/sdk --python3-only --use=@autorest/[email protected] --use=@autorest/[email protected] --version=3.7.2", | ||
"autorest_command": "autorest specification/containerservice/resource-manager/readme.md --multiapi --python --python-sdks-folder=/mnt/vss/_work/1/s/azure-sdk-for-python/sdk --python3-only --use=@autorest/[email protected] --use=@autorest/[email protected] --version=3.7.2", | ||
"readme": "specification/containerservice/resource-manager/readme.md" | ||
} |
57 changes: 57 additions & 0 deletions
57
...vice/azure-mgmt-containerservice/azure/mgmt/containerservice/_container_service_client.py
Large diffs are not rendered by default.
Oops, something went wrong.
57 changes: 57 additions & 0 deletions
57
.../azure-mgmt-containerservice/azure/mgmt/containerservice/aio/_container_service_client.py
Large diffs are not rendered by default.
Oops, something went wrong.
15 changes: 15 additions & 0 deletions
15
...e/azure-mgmt-containerservice/azure/mgmt/containerservice/v2022_04_02_preview/__init__.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
# coding=utf-8 | ||
# -------------------------------------------------------------------------- | ||
# Copyright (c) Microsoft Corporation. All rights reserved. | ||
# Licensed under the MIT License. See License.txt in the project root for license information. | ||
# Code generated by Microsoft (R) AutoRest Code Generator. | ||
# Changes may cause incorrect behavior and will be lost if the code is regenerated. | ||
# -------------------------------------------------------------------------- | ||
|
||
from ._container_service_client import ContainerServiceClient | ||
__all__ = ['ContainerServiceClient'] | ||
|
||
# `._patch.py` is used for handwritten extensions to the generated code | ||
# Example: https://github.com/Azure/azure-sdk-for-python/blob/main/doc/dev/customize_code/how-to-patch-sdk-code.md | ||
from ._patch import patch_sdk | ||
patch_sdk() |
72 changes: 72 additions & 0 deletions
72
...e-mgmt-containerservice/azure/mgmt/containerservice/v2022_04_02_preview/_configuration.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,72 @@ | ||
# coding=utf-8 | ||
# -------------------------------------------------------------------------- | ||
# Copyright (c) Microsoft Corporation. All rights reserved. | ||
# Licensed under the MIT License. See License.txt in the project root for license information. | ||
# Code generated by Microsoft (R) AutoRest Code Generator. | ||
# Changes may cause incorrect behavior and will be lost if the code is regenerated. | ||
# -------------------------------------------------------------------------- | ||
|
||
from typing import Any, TYPE_CHECKING | ||
|
||
from azure.core.configuration import Configuration | ||
from azure.core.pipeline import policies | ||
from azure.mgmt.core.policies import ARMChallengeAuthenticationPolicy, ARMHttpLoggingPolicy | ||
|
||
if TYPE_CHECKING: | ||
# pylint: disable=unused-import,ungrouped-imports | ||
from azure.core.credentials import TokenCredential | ||
|
||
VERSION = "unknown" | ||
|
||
class ContainerServiceClientConfiguration(Configuration): # pylint: disable=too-many-instance-attributes | ||
"""Configuration for ContainerServiceClient. | ||
Note that all parameters used to create this instance are saved as instance | ||
attributes. | ||
:param credential: Credential needed for the client to connect to Azure. | ||
:type credential: ~azure.core.credentials.TokenCredential | ||
:param subscription_id: The ID of the target subscription. | ||
:type subscription_id: str | ||
:keyword api_version: Api Version. Default value is "2022-04-02-preview". Note that overriding | ||
this default value may result in unsupported behavior. | ||
:paramtype api_version: str | ||
""" | ||
|
||
def __init__( | ||
self, | ||
credential: "TokenCredential", | ||
subscription_id: str, | ||
**kwargs: Any | ||
) -> None: | ||
super(ContainerServiceClientConfiguration, self).__init__(**kwargs) | ||
api_version = kwargs.pop('api_version', "2022-04-02-preview") # type: str | ||
|
||
if credential is None: | ||
raise ValueError("Parameter 'credential' must not be None.") | ||
if subscription_id is None: | ||
raise ValueError("Parameter 'subscription_id' must not be None.") | ||
|
||
self.credential = credential | ||
self.subscription_id = subscription_id | ||
self.api_version = api_version | ||
self.credential_scopes = kwargs.pop('credential_scopes', ['https://management.azure.com/.default']) | ||
kwargs.setdefault('sdk_moniker', 'mgmt-containerservice/{}'.format(VERSION)) | ||
self._configure(**kwargs) | ||
|
||
def _configure( | ||
self, | ||
**kwargs # type: Any | ||
): | ||
# type: (...) -> None | ||
self.user_agent_policy = kwargs.get('user_agent_policy') or policies.UserAgentPolicy(**kwargs) | ||
self.headers_policy = kwargs.get('headers_policy') or policies.HeadersPolicy(**kwargs) | ||
self.proxy_policy = kwargs.get('proxy_policy') or policies.ProxyPolicy(**kwargs) | ||
self.logging_policy = kwargs.get('logging_policy') or policies.NetworkTraceLoggingPolicy(**kwargs) | ||
self.http_logging_policy = kwargs.get('http_logging_policy') or ARMHttpLoggingPolicy(**kwargs) | ||
self.retry_policy = kwargs.get('retry_policy') or policies.RetryPolicy(**kwargs) | ||
self.custom_hook_policy = kwargs.get('custom_hook_policy') or policies.CustomHookPolicy(**kwargs) | ||
self.redirect_policy = kwargs.get('redirect_policy') or policies.RedirectPolicy(**kwargs) | ||
self.authentication_policy = kwargs.get('authentication_policy') | ||
if self.credential and not self.authentication_policy: | ||
self.authentication_policy = ARMChallengeAuthenticationPolicy(self.credential, *self.credential_scopes, **kwargs) |
137 changes: 137 additions & 0 deletions
137
...ainerservice/azure/mgmt/containerservice/v2022_04_02_preview/_container_service_client.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,137 @@ | ||
# coding=utf-8 | ||
# -------------------------------------------------------------------------- | ||
# Copyright (c) Microsoft Corporation. All rights reserved. | ||
# Licensed under the MIT License. See License.txt in the project root for license information. | ||
# Code generated by Microsoft (R) AutoRest Code Generator. | ||
# Changes may cause incorrect behavior and will be lost if the code is regenerated. | ||
# -------------------------------------------------------------------------- | ||
|
||
from copy import deepcopy | ||
from typing import Any, TYPE_CHECKING | ||
|
||
from msrest import Deserializer, Serializer | ||
|
||
from azure.core.rest import HttpRequest, HttpResponse | ||
from azure.mgmt.core import ARMPipelineClient | ||
|
||
from . import models | ||
from ._configuration import ContainerServiceClientConfiguration | ||
from .operations import AgentPoolsOperations, MaintenanceConfigurationsOperations, ManagedClusterSnapshotsOperations, ManagedClustersOperations, Operations, PrivateEndpointConnectionsOperations, PrivateLinkResourcesOperations, ResolvePrivateLinkServiceIdOperations, SnapshotsOperations, TrustedAccessRoleBindingsOperations, TrustedAccessRolesOperations | ||
|
||
if TYPE_CHECKING: | ||
# pylint: disable=unused-import,ungrouped-imports | ||
from azure.core.credentials import TokenCredential | ||
|
||
class ContainerServiceClient: # pylint: disable=too-many-instance-attributes | ||
"""The Container Service Client. | ||
:ivar operations: Operations operations | ||
:vartype operations: azure.mgmt.containerservice.v2022_04_02_preview.operations.Operations | ||
:ivar managed_clusters: ManagedClustersOperations operations | ||
:vartype managed_clusters: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.ManagedClustersOperations | ||
:ivar maintenance_configurations: MaintenanceConfigurationsOperations operations | ||
:vartype maintenance_configurations: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.MaintenanceConfigurationsOperations | ||
:ivar agent_pools: AgentPoolsOperations operations | ||
:vartype agent_pools: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.AgentPoolsOperations | ||
:ivar private_endpoint_connections: PrivateEndpointConnectionsOperations operations | ||
:vartype private_endpoint_connections: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.PrivateEndpointConnectionsOperations | ||
:ivar private_link_resources: PrivateLinkResourcesOperations operations | ||
:vartype private_link_resources: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.PrivateLinkResourcesOperations | ||
:ivar resolve_private_link_service_id: ResolvePrivateLinkServiceIdOperations operations | ||
:vartype resolve_private_link_service_id: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.ResolvePrivateLinkServiceIdOperations | ||
:ivar snapshots: SnapshotsOperations operations | ||
:vartype snapshots: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.SnapshotsOperations | ||
:ivar managed_cluster_snapshots: ManagedClusterSnapshotsOperations operations | ||
:vartype managed_cluster_snapshots: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.ManagedClusterSnapshotsOperations | ||
:ivar trusted_access_roles: TrustedAccessRolesOperations operations | ||
:vartype trusted_access_roles: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.TrustedAccessRolesOperations | ||
:ivar trusted_access_role_bindings: TrustedAccessRoleBindingsOperations operations | ||
:vartype trusted_access_role_bindings: | ||
azure.mgmt.containerservice.v2022_04_02_preview.operations.TrustedAccessRoleBindingsOperations | ||
:param credential: Credential needed for the client to connect to Azure. | ||
:type credential: ~azure.core.credentials.TokenCredential | ||
:param subscription_id: The ID of the target subscription. | ||
:type subscription_id: str | ||
:param base_url: Service URL. Default value is "https://management.azure.com". | ||
:type base_url: str | ||
:keyword api_version: Api Version. Default value is "2022-04-02-preview". Note that overriding | ||
this default value may result in unsupported behavior. | ||
:paramtype api_version: str | ||
:keyword int polling_interval: Default waiting time between two polls for LRO operations if no | ||
Retry-After header is present. | ||
""" | ||
|
||
def __init__( | ||
self, | ||
credential: "TokenCredential", | ||
subscription_id: str, | ||
base_url: str = "https://management.azure.com", | ||
**kwargs: Any | ||
) -> None: | ||
self._config = ContainerServiceClientConfiguration(credential=credential, subscription_id=subscription_id, **kwargs) | ||
self._client = ARMPipelineClient(base_url=base_url, config=self._config, **kwargs) | ||
|
||
client_models = {k: v for k, v in models.__dict__.items() if isinstance(v, type)} | ||
self._serialize = Serializer(client_models) | ||
self._deserialize = Deserializer(client_models) | ||
self._serialize.client_side_validation = False | ||
self.operations = Operations(self._client, self._config, self._serialize, self._deserialize) | ||
self.managed_clusters = ManagedClustersOperations(self._client, self._config, self._serialize, self._deserialize) | ||
self.maintenance_configurations = MaintenanceConfigurationsOperations(self._client, self._config, self._serialize, self._deserialize) | ||
self.agent_pools = AgentPoolsOperations(self._client, self._config, self._serialize, self._deserialize) | ||
self.private_endpoint_connections = PrivateEndpointConnectionsOperations(self._client, self._config, self._serialize, self._deserialize) | ||
self.private_link_resources = PrivateLinkResourcesOperations(self._client, self._config, self._serialize, self._deserialize) | ||
self.resolve_private_link_service_id = ResolvePrivateLinkServiceIdOperations(self._client, self._config, self._serialize, self._deserialize) | ||
self.snapshots = SnapshotsOperations(self._client, self._config, self._serialize, self._deserialize) | ||
self.managed_cluster_snapshots = ManagedClusterSnapshotsOperations(self._client, self._config, self._serialize, self._deserialize) | ||
self.trusted_access_roles = TrustedAccessRolesOperations(self._client, self._config, self._serialize, self._deserialize) | ||
self.trusted_access_role_bindings = TrustedAccessRoleBindingsOperations(self._client, self._config, self._serialize, self._deserialize) | ||
|
||
|
||
def _send_request( | ||
self, | ||
request: HttpRequest, | ||
**kwargs: Any | ||
) -> HttpResponse: | ||
"""Runs the network request through the client's chained policies. | ||
>>> from azure.core.rest import HttpRequest | ||
>>> request = HttpRequest("GET", "https://www.example.org/") | ||
<HttpRequest [GET], url: 'https://www.example.org/'> | ||
>>> response = client._send_request(request) | ||
<HttpResponse: 200 OK> | ||
For more information on this code flow, see https://aka.ms/azsdk/python/protocol/quickstart | ||
:param request: The network request you want to make. Required. | ||
:type request: ~azure.core.rest.HttpRequest | ||
:keyword bool stream: Whether the response payload will be streamed. Defaults to False. | ||
:return: The response of your network call. Does not do error handling on your response. | ||
:rtype: ~azure.core.rest.HttpResponse | ||
""" | ||
|
||
request_copy = deepcopy(request) | ||
request_copy.url = self._client.format_url(request_copy.url) | ||
return self._client.send_request(request_copy, **kwargs) | ||
|
||
def close(self): | ||
# type: () -> None | ||
self._client.close() | ||
|
||
def __enter__(self): | ||
# type: () -> ContainerServiceClient | ||
self._client.__enter__() | ||
return self | ||
|
||
def __exit__(self, *exc_details): | ||
# type: (Any) -> None | ||
self._client.__exit__(*exc_details) |
112 changes: 112 additions & 0 deletions
112
...zure-mgmt-containerservice/azure/mgmt/containerservice/v2022_04_02_preview/_metadata.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,112 @@ | ||
{ | ||
"chosen_version": "2022-04-02-preview", | ||
"total_api_version_list": ["2022-04-02-preview"], | ||
"client": { | ||
"name": "ContainerServiceClient", | ||
"filename": "_container_service_client", | ||
"description": "The Container Service Client.", | ||
"host_value": "\"https://management.azure.com\"", | ||
"parameterized_host_template": null, | ||
"azure_arm": true, | ||
"has_lro_operations": true, | ||
"client_side_validation": false, | ||
"sync_imports": "{\"typing\": {\"azurecore\": {\"azure.core.credentials\": [\"TokenCredential\"]}}, \"regular\": {\"azurecore\": {\"azure.profiles\": [\"KnownProfiles\", \"ProfileDefinition\"], \"azure.profiles.multiapiclient\": [\"MultiApiClientMixin\"], \"azure.mgmt.core\": [\"ARMPipelineClient\"]}, \"local\": {\"._configuration\": [\"ContainerServiceClientConfiguration\"]}, \"thirdparty\": {\"msrest\": [\"Deserializer\", \"Serializer\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\", \"Optional\"]}}}", | ||
"async_imports": "{\"typing\": {\"azurecore\": {\"azure.core.credentials_async\": [\"AsyncTokenCredential\"], \"azure.core.credentials\": [\"TokenCredential\"]}}, \"regular\": {\"azurecore\": {\"azure.profiles\": [\"KnownProfiles\", \"ProfileDefinition\"], \"azure.profiles.multiapiclient\": [\"MultiApiClientMixin\"], \"azure.mgmt.core\": [\"AsyncARMPipelineClient\"]}, \"local\": {\"._configuration\": [\"ContainerServiceClientConfiguration\"]}, \"thirdparty\": {\"msrest\": [\"Deserializer\", \"Serializer\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\", \"Optional\"]}}}" | ||
}, | ||
"global_parameters": { | ||
"sync": { | ||
"credential": { | ||
"signature": "credential, # type: \"TokenCredential\"", | ||
"description": "Credential needed for the client to connect to Azure.", | ||
"docstring_type": "~azure.core.credentials.TokenCredential", | ||
"required": true | ||
}, | ||
"subscription_id": { | ||
"signature": "subscription_id, # type: str", | ||
"description": "The ID of the target subscription.", | ||
"docstring_type": "str", | ||
"required": true | ||
} | ||
}, | ||
"async": { | ||
"credential": { | ||
"signature": "credential: \"AsyncTokenCredential\",", | ||
"description": "Credential needed for the client to connect to Azure.", | ||
"docstring_type": "~azure.core.credentials_async.AsyncTokenCredential", | ||
"required": true | ||
}, | ||
"subscription_id": { | ||
"signature": "subscription_id: str,", | ||
"description": "The ID of the target subscription.", | ||
"docstring_type": "str", | ||
"required": true | ||
} | ||
}, | ||
"constant": { | ||
}, | ||
"call": "credential, subscription_id", | ||
"service_client_specific": { | ||
"sync": { | ||
"api_version": { | ||
"signature": "api_version=None, # type: Optional[str]", | ||
"description": "API version to use if no profile is provided, or if missing in profile.", | ||
"docstring_type": "str", | ||
"required": false | ||
}, | ||
"base_url": { | ||
"signature": "base_url=\"https://management.azure.com\", # type: str", | ||
"description": "Service URL", | ||
"docstring_type": "str", | ||
"required": false | ||
}, | ||
"profile": { | ||
"signature": "profile=KnownProfiles.default, # type: KnownProfiles", | ||
"description": "A profile definition, from KnownProfiles to dict.", | ||
"docstring_type": "azure.profiles.KnownProfiles", | ||
"required": false | ||
} | ||
}, | ||
"async": { | ||
"api_version": { | ||
"signature": "api_version: Optional[str] = None,", | ||
"description": "API version to use if no profile is provided, or if missing in profile.", | ||
"docstring_type": "str", | ||
"required": false | ||
}, | ||
"base_url": { | ||
"signature": "base_url: str = \"https://management.azure.com\",", | ||
"description": "Service URL", | ||
"docstring_type": "str", | ||
"required": false | ||
}, | ||
"profile": { | ||
"signature": "profile: KnownProfiles = KnownProfiles.default,", | ||
"description": "A profile definition, from KnownProfiles to dict.", | ||
"docstring_type": "azure.profiles.KnownProfiles", | ||
"required": false | ||
} | ||
} | ||
} | ||
}, | ||
"config": { | ||
"credential": true, | ||
"credential_scopes": ["https://management.azure.com/.default"], | ||
"credential_call_sync": "ARMChallengeAuthenticationPolicy(self.credential, *self.credential_scopes, **kwargs)", | ||
"credential_call_async": "AsyncARMChallengeAuthenticationPolicy(self.credential, *self.credential_scopes, **kwargs)", | ||
"sync_imports": "{\"regular\": {\"azurecore\": {\"azure.core.configuration\": [\"Configuration\"], \"azure.core.pipeline\": [\"policies\"], \"azure.mgmt.core.policies\": [\"ARMChallengeAuthenticationPolicy\", \"ARMHttpLoggingPolicy\"]}, \"local\": {\"._version\": [\"VERSION\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\"]}}, \"typing\": {\"azurecore\": {\"azure.core.credentials\": [\"TokenCredential\"]}}}", | ||
"async_imports": "{\"regular\": {\"azurecore\": {\"azure.core.configuration\": [\"Configuration\"], \"azure.core.pipeline\": [\"policies\"], \"azure.mgmt.core.policies\": [\"ARMHttpLoggingPolicy\", \"AsyncARMChallengeAuthenticationPolicy\"]}, \"local\": {\".._version\": [\"VERSION\"]}}, \"conditional\": {\"stdlib\": {\"typing\": [\"Any\"]}}, \"typing\": {\"azurecore\": {\"azure.core.credentials_async\": [\"AsyncTokenCredential\"]}}}" | ||
}, | ||
"operation_groups": { | ||
"operations": "Operations", | ||
"managed_clusters": "ManagedClustersOperations", | ||
"maintenance_configurations": "MaintenanceConfigurationsOperations", | ||
"agent_pools": "AgentPoolsOperations", | ||
"private_endpoint_connections": "PrivateEndpointConnectionsOperations", | ||
"private_link_resources": "PrivateLinkResourcesOperations", | ||
"resolve_private_link_service_id": "ResolvePrivateLinkServiceIdOperations", | ||
"snapshots": "SnapshotsOperations", | ||
"managed_cluster_snapshots": "ManagedClusterSnapshotsOperations", | ||
"trusted_access_roles": "TrustedAccessRolesOperations", | ||
"trusted_access_role_bindings": "TrustedAccessRoleBindingsOperations" | ||
} | ||
} |
Oops, something went wrong.