diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/_network_management_client.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/_network_management_client.py index b4f2193bdf67..7d0022a5d983 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/_network_management_client.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/_network_management_client.py @@ -55,6 +55,7 @@ class NetworkManagementClient(NetworkManagementClientOperationsMixin, MultiApiCl 'interface_endpoints': '2019-02-01', 'p2s_vpn_server_configurations': '2019-07-01', 'virtual_wa_ns': '2018-07-01', + 'web_application_firewall_policies': '2020-04-01', }}, _PROFILE_TAG + " latest" ) @@ -6380,7 +6381,6 @@ def web_application_firewall_policies(self): * 2019-12-01: :class:`WebApplicationFirewallPoliciesOperations` * 2020-03-01: :class:`WebApplicationFirewallPoliciesOperations` * 2020-04-01: :class:`WebApplicationFirewallPoliciesOperations` - * 2020-05-01: :class:`WebApplicationFirewallPoliciesOperations` """ api_version = self._get_api_version('web_application_firewall_policies') if api_version == '2018-12-01': @@ -6405,8 +6405,6 @@ def web_application_firewall_policies(self): from .v2020_03_01.operations import WebApplicationFirewallPoliciesOperations as OperationClass elif api_version == '2020-04-01': from .v2020_04_01.operations import WebApplicationFirewallPoliciesOperations as OperationClass - elif api_version == '2020-05-01': - from .v2020_05_01.operations import WebApplicationFirewallPoliciesOperations as OperationClass else: raise NotImplementedError("APIVersion {} is not available".format(api_version)) return OperationClass(self._client, self.config, Serializer(self._models_dict(api_version)), Deserializer(self._models_dict(api_version))) diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/__init__.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/__init__.py index 38ff0c695675..920a8b23ba0f 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/__init__.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/__init__.py @@ -936,7 +936,6 @@ ExpressRouteLinkConnectorType, ExpressRouteLinkAdminState, ExpressRoutePortsEncapsulation, - FirewallPolicyIntrusionSystemMode, FirewallPolicyNatRuleActionType, FirewallPolicyFilterRuleActionType, FirewallPolicyRuleConditionApplicationProtocolType, @@ -1549,7 +1548,6 @@ 'ExpressRouteLinkConnectorType', 'ExpressRouteLinkAdminState', 'ExpressRoutePortsEncapsulation', - 'FirewallPolicyIntrusionSystemMode', 'FirewallPolicyNatRuleActionType', 'FirewallPolicyFilterRuleActionType', 'FirewallPolicyRuleConditionApplicationProtocolType', diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models.py index 57a2ffa5bbba..74f9ebe8fc5b 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models.py @@ -7716,10 +7716,6 @@ class FirewallPolicy(Resource): Possible values include: 'Alert', 'Deny', 'Off' :type threat_intel_mode: str or ~azure.mgmt.network.v2020_03_01.models.AzureFirewallThreatIntelMode - :param intrusion_system_mode: The operation mode for Intrusion system. - Possible values include: 'Enabled', 'Disabled' - :type intrusion_system_mode: str or - ~azure.mgmt.network.v2020_03_01.models.FirewallPolicyIntrusionSystemMode :ivar etag: A unique read-only string that changes whenever the resource is updated. :vartype etag: str @@ -7747,7 +7743,6 @@ class FirewallPolicy(Resource): 'firewalls': {'key': 'properties.firewalls', 'type': '[SubResource]'}, 'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'}, 'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'}, - 'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'}, 'etag': {'key': 'etag', 'type': 'str'}, } @@ -7759,7 +7754,6 @@ def __init__(self, **kwargs): self.firewalls = None self.child_policies = None self.threat_intel_mode = kwargs.get('threat_intel_mode', None) - self.intrusion_system_mode = kwargs.get('intrusion_system_mode', None) self.etag = None diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models_py3.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models_py3.py index f9453cae98e6..af454af5ad1a 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models_py3.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_models_py3.py @@ -7716,10 +7716,6 @@ class FirewallPolicy(Resource): Possible values include: 'Alert', 'Deny', 'Off' :type threat_intel_mode: str or ~azure.mgmt.network.v2020_03_01.models.AzureFirewallThreatIntelMode - :param intrusion_system_mode: The operation mode for Intrusion system. - Possible values include: 'Enabled', 'Disabled' - :type intrusion_system_mode: str or - ~azure.mgmt.network.v2020_03_01.models.FirewallPolicyIntrusionSystemMode :ivar etag: A unique read-only string that changes whenever the resource is updated. :vartype etag: str @@ -7747,11 +7743,10 @@ class FirewallPolicy(Resource): 'firewalls': {'key': 'properties.firewalls', 'type': '[SubResource]'}, 'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'}, 'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'}, - 'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'}, 'etag': {'key': 'etag', 'type': 'str'}, } - def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=None, threat_intel_mode=None, intrusion_system_mode=None, **kwargs) -> None: + def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=None, threat_intel_mode=None, **kwargs) -> None: super(FirewallPolicy, self).__init__(id=id, location=location, tags=tags, **kwargs) self.rule_groups = None self.provisioning_state = None @@ -7759,7 +7754,6 @@ def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=N self.firewalls = None self.child_policies = None self.threat_intel_mode = threat_intel_mode - self.intrusion_system_mode = intrusion_system_mode self.etag = None diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_network_management_client_enums.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_network_management_client_enums.py index f4c8828932d8..30fe85c60328 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_network_management_client_enums.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_03_01/models/_network_management_client_enums.py @@ -373,12 +373,6 @@ class ExpressRoutePortsEncapsulation(str, Enum): qin_q = "QinQ" -class FirewallPolicyIntrusionSystemMode(str, Enum): - - enabled = "Enabled" - disabled = "Disabled" - - class FirewallPolicyNatRuleActionType(str, Enum): dnat = "DNAT" diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/__init__.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/__init__.py index ead0b1a5d901..7f32c3545168 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/__init__.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/__init__.py @@ -188,7 +188,6 @@ from ._models_py3 import ExpressRouteServiceProvider from ._models_py3 import ExpressRouteServiceProviderBandwidthsOffered from ._models_py3 import FirewallPolicy - from ._models_py3 import FirewallPolicyCertificateAuthority from ._models_py3 import FirewallPolicyFilterRule from ._models_py3 import FirewallPolicyFilterRuleAction from ._models_py3 import FirewallPolicyNatRule @@ -198,8 +197,6 @@ from ._models_py3 import FirewallPolicyRuleConditionApplicationProtocol from ._models_py3 import FirewallPolicyRuleGroup from ._models_py3 import FirewallPolicyThreatIntelWhitelist - from ._models_py3 import FirewallPolicyTransportSecurity - from ._models_py3 import FirewallPolicyTrustedRootCertificate from ._models_py3 import FlowLog from ._models_py3 import FlowLogFormatParameters from ._models_py3 import FlowLogInformation @@ -594,7 +591,6 @@ from ._models import ExpressRouteServiceProvider from ._models import ExpressRouteServiceProviderBandwidthsOffered from ._models import FirewallPolicy - from ._models import FirewallPolicyCertificateAuthority from ._models import FirewallPolicyFilterRule from ._models import FirewallPolicyFilterRuleAction from ._models import FirewallPolicyNatRule @@ -604,8 +600,6 @@ from ._models import FirewallPolicyRuleConditionApplicationProtocol from ._models import FirewallPolicyRuleGroup from ._models import FirewallPolicyThreatIntelWhitelist - from ._models import FirewallPolicyTransportSecurity - from ._models import FirewallPolicyTrustedRootCertificate from ._models import FlowLog from ._models import FlowLogFormatParameters from ._models import FlowLogInformation @@ -959,7 +953,6 @@ ExpressRouteLinkConnectorType, ExpressRouteLinkAdminState, ExpressRoutePortsEncapsulation, - FirewallPolicyIntrusionSystemMode, FirewallPolicyNatRuleActionType, FirewallPolicyFilterRuleActionType, FirewallPolicyRuleConditionApplicationProtocolType, @@ -1220,7 +1213,6 @@ 'ExpressRouteServiceProvider', 'ExpressRouteServiceProviderBandwidthsOffered', 'FirewallPolicy', - 'FirewallPolicyCertificateAuthority', 'FirewallPolicyFilterRule', 'FirewallPolicyFilterRuleAction', 'FirewallPolicyNatRule', @@ -1230,8 +1222,6 @@ 'FirewallPolicyRuleConditionApplicationProtocol', 'FirewallPolicyRuleGroup', 'FirewallPolicyThreatIntelWhitelist', - 'FirewallPolicyTransportSecurity', - 'FirewallPolicyTrustedRootCertificate', 'FlowLog', 'FlowLogFormatParameters', 'FlowLogInformation', @@ -1584,7 +1574,6 @@ 'ExpressRouteLinkConnectorType', 'ExpressRouteLinkAdminState', 'ExpressRoutePortsEncapsulation', - 'FirewallPolicyIntrusionSystemMode', 'FirewallPolicyNatRuleActionType', 'FirewallPolicyFilterRuleActionType', 'FirewallPolicyRuleConditionApplicationProtocolType', diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_models.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_models.py index 1dec186ea436..b3003f30815d 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_models.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_models.py @@ -2316,8 +2316,6 @@ class ApplicationRuleCondition(FirewallPolicyRuleCondition): :param protocols: Array of Application Protocols. :type protocols: list[~azure.mgmt.network.v2020_04_01.models.FirewallPolicyRuleConditionApplicationProtocol] - :param target_urls: List of Urls for this rule condition. - :type target_urls: list[str] :param target_fqdns: List of FQDNs for this rule condition. :type target_fqdns: list[str] :param fqdn_tags: List of FQDN Tags for this rule condition. @@ -2337,7 +2335,6 @@ class ApplicationRuleCondition(FirewallPolicyRuleCondition): 'source_addresses': {'key': 'sourceAddresses', 'type': '[str]'}, 'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'}, 'protocols': {'key': 'protocols', 'type': '[FirewallPolicyRuleConditionApplicationProtocol]'}, - 'target_urls': {'key': 'targetUrls', 'type': '[str]'}, 'target_fqdns': {'key': 'targetFqdns', 'type': '[str]'}, 'fqdn_tags': {'key': 'fqdnTags', 'type': '[str]'}, 'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'}, @@ -2348,7 +2345,6 @@ def __init__(self, **kwargs): self.source_addresses = kwargs.get('source_addresses', None) self.destination_addresses = kwargs.get('destination_addresses', None) self.protocols = kwargs.get('protocols', None) - self.target_urls = kwargs.get('target_urls', None) self.target_fqdns = kwargs.get('target_fqdns', None) self.fqdn_tags = kwargs.get('fqdn_tags', None) self.source_ip_groups = kwargs.get('source_ip_groups', None) @@ -3534,13 +3530,13 @@ class BackendAddressPool(SubResource): :param id: Resource ID. :type id: str + :param load_balancer_backend_addresses: An array of backend addresses. + :type load_balancer_backend_addresses: + list[~azure.mgmt.network.v2020_04_01.models.LoadBalancerBackendAddress] :ivar backend_ip_configurations: An array of references to IP addresses defined in network interfaces. :vartype backend_ip_configurations: list[~azure.mgmt.network.v2020_04_01.models.NetworkInterfaceIPConfiguration] - :param load_balancer_backend_addresses: An array of backend addresses. - :type load_balancer_backend_addresses: - list[~azure.mgmt.network.v2020_04_01.models.LoadBalancerBackendAddress] :ivar load_balancing_rules: An array of references to load balancing rules that use this backend address pool. :vartype load_balancing_rules: @@ -3580,8 +3576,8 @@ class BackendAddressPool(SubResource): _attribute_map = { 'id': {'key': 'id', 'type': 'str'}, - 'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'}, 'load_balancer_backend_addresses': {'key': 'properties.loadBalancerBackendAddresses', 'type': '[LoadBalancerBackendAddress]'}, + 'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'}, 'load_balancing_rules': {'key': 'properties.loadBalancingRules', 'type': '[SubResource]'}, 'outbound_rule': {'key': 'properties.outboundRule', 'type': 'SubResource'}, 'outbound_rules': {'key': 'properties.outboundRules', 'type': '[SubResource]'}, @@ -3593,8 +3589,8 @@ class BackendAddressPool(SubResource): def __init__(self, **kwargs): super(BackendAddressPool, self).__init__(**kwargs) - self.backend_ip_configurations = None self.load_balancer_backend_addresses = kwargs.get('load_balancer_backend_addresses', None) + self.backend_ip_configurations = None self.load_balancing_rules = None self.outbound_rule = None self.outbound_rules = None @@ -7738,19 +7734,9 @@ class FirewallPolicy(Resource): :param threat_intel_whitelist: ThreatIntel Whitelist for Firewall Policy. :type threat_intel_whitelist: ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyThreatIntelWhitelist - :param intrusion_system_mode: The operation mode for Intrusion system. - Possible values include: 'Enabled', 'Disabled' - :type intrusion_system_mode: str or - ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyIntrusionSystemMode - :param transport_security: TLS Configuration definition. - :type transport_security: - ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyTransportSecurity :ivar etag: A unique read-only string that changes whenever the resource is updated. :vartype etag: str - :param identity: The identity of the firewall policy. - :type identity: - ~azure.mgmt.network.v2020_04_01.models.ManagedServiceIdentity """ _validation = { @@ -7776,10 +7762,7 @@ class FirewallPolicy(Resource): 'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'}, 'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'}, 'threat_intel_whitelist': {'key': 'properties.threatIntelWhitelist', 'type': 'FirewallPolicyThreatIntelWhitelist'}, - 'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'}, - 'transport_security': {'key': 'properties.transportSecurity', 'type': 'FirewallPolicyTransportSecurity'}, 'etag': {'key': 'etag', 'type': 'str'}, - 'identity': {'key': 'identity', 'type': 'ManagedServiceIdentity'}, } def __init__(self, **kwargs): @@ -7791,31 +7774,7 @@ def __init__(self, **kwargs): self.child_policies = None self.threat_intel_mode = kwargs.get('threat_intel_mode', None) self.threat_intel_whitelist = kwargs.get('threat_intel_whitelist', None) - self.intrusion_system_mode = kwargs.get('intrusion_system_mode', None) - self.transport_security = kwargs.get('transport_security', None) self.etag = None - self.identity = kwargs.get('identity', None) - - -class FirewallPolicyCertificateAuthority(Model): - """Trusted Root certificates properties for tls. - - :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx) - 'Secret' or 'Certificate' object stored in KeyVault. - :type key_vault_secret_id: str - :param name: Name of the CA certificate. - :type name: str - """ - - _attribute_map = { - 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - } - - def __init__(self, **kwargs): - super(FirewallPolicyCertificateAuthority, self).__init__(**kwargs) - self.key_vault_secret_id = kwargs.get('key_vault_secret_id', None) - self.name = kwargs.get('name', None) class FirewallPolicyRule(Model): @@ -8077,56 +8036,6 @@ def __init__(self, **kwargs): self.fqdns = kwargs.get('fqdns', None) -class FirewallPolicyTransportSecurity(Model): - """Configuration needed to perform TLS termination & initiation. - - :param certificate_authority: The CA used for intermediate CA generation. - :type certificate_authority: - ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyCertificateAuthority - :param excluded_domains: List of domains which are excluded from TLS - termination. - :type excluded_domains: list[str] - :param trusted_root_certificates: Certificates which are to be trusted by - the firewall. - :type trusted_root_certificates: - list[~azure.mgmt.network.v2020_04_01.models.FirewallPolicyTrustedRootCertificate] - """ - - _attribute_map = { - 'certificate_authority': {'key': 'certificateAuthority', 'type': 'FirewallPolicyCertificateAuthority'}, - 'excluded_domains': {'key': 'excludedDomains', 'type': '[str]'}, - 'trusted_root_certificates': {'key': 'trustedRootCertificates', 'type': '[FirewallPolicyTrustedRootCertificate]'}, - } - - def __init__(self, **kwargs): - super(FirewallPolicyTransportSecurity, self).__init__(**kwargs) - self.certificate_authority = kwargs.get('certificate_authority', None) - self.excluded_domains = kwargs.get('excluded_domains', None) - self.trusted_root_certificates = kwargs.get('trusted_root_certificates', None) - - -class FirewallPolicyTrustedRootCertificate(Model): - """Trusted Root certificates of a firewall policy. - - :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx) - the public certificate data stored in KeyVault. - :type key_vault_secret_id: str - :param name: Name of the trusted root certificate that is unique within a - firewall policy. - :type name: str - """ - - _attribute_map = { - 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - } - - def __init__(self, **kwargs): - super(FirewallPolicyTrustedRootCertificate, self).__init__(**kwargs) - self.key_vault_secret_id = kwargs.get('key_vault_secret_id', None) - self.name = kwargs.get('name', None) - - class FlowLog(Resource): """A flow log resource. @@ -10294,8 +10203,6 @@ class NatRuleCondition(FirewallPolicyRuleCondition): :type destination_ports: list[str] :param source_ip_groups: List of source IpGroups for this rule. :type source_ip_groups: list[str] - :param terminate_tls: Terminate TLS connections for this rule. - :type terminate_tls: bool """ _validation = { @@ -10311,7 +10218,6 @@ class NatRuleCondition(FirewallPolicyRuleCondition): 'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'}, 'destination_ports': {'key': 'destinationPorts', 'type': '[str]'}, 'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'}, - 'terminate_tls': {'key': 'terminateTLS', 'type': 'bool'}, } def __init__(self, **kwargs): @@ -10321,7 +10227,6 @@ def __init__(self, **kwargs): self.destination_addresses = kwargs.get('destination_addresses', None) self.destination_ports = kwargs.get('destination_ports', None) self.source_ip_groups = kwargs.get('source_ip_groups', None) - self.terminate_tls = kwargs.get('terminate_tls', None) self.rule_condition_type = 'NatRuleCondition' diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_models_py3.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_models_py3.py index 170fc24ea585..f3348086b179 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_models_py3.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_models_py3.py @@ -2316,8 +2316,6 @@ class ApplicationRuleCondition(FirewallPolicyRuleCondition): :param protocols: Array of Application Protocols. :type protocols: list[~azure.mgmt.network.v2020_04_01.models.FirewallPolicyRuleConditionApplicationProtocol] - :param target_urls: List of Urls for this rule condition. - :type target_urls: list[str] :param target_fqdns: List of FQDNs for this rule condition. :type target_fqdns: list[str] :param fqdn_tags: List of FQDN Tags for this rule condition. @@ -2337,18 +2335,16 @@ class ApplicationRuleCondition(FirewallPolicyRuleCondition): 'source_addresses': {'key': 'sourceAddresses', 'type': '[str]'}, 'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'}, 'protocols': {'key': 'protocols', 'type': '[FirewallPolicyRuleConditionApplicationProtocol]'}, - 'target_urls': {'key': 'targetUrls', 'type': '[str]'}, 'target_fqdns': {'key': 'targetFqdns', 'type': '[str]'}, 'fqdn_tags': {'key': 'fqdnTags', 'type': '[str]'}, 'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'}, } - def __init__(self, *, name: str=None, description: str=None, source_addresses=None, destination_addresses=None, protocols=None, target_urls=None, target_fqdns=None, fqdn_tags=None, source_ip_groups=None, **kwargs) -> None: + def __init__(self, *, name: str=None, description: str=None, source_addresses=None, destination_addresses=None, protocols=None, target_fqdns=None, fqdn_tags=None, source_ip_groups=None, **kwargs) -> None: super(ApplicationRuleCondition, self).__init__(name=name, description=description, **kwargs) self.source_addresses = source_addresses self.destination_addresses = destination_addresses self.protocols = protocols - self.target_urls = target_urls self.target_fqdns = target_fqdns self.fqdn_tags = fqdn_tags self.source_ip_groups = source_ip_groups @@ -3534,13 +3530,13 @@ class BackendAddressPool(SubResource): :param id: Resource ID. :type id: str + :param load_balancer_backend_addresses: An array of backend addresses. + :type load_balancer_backend_addresses: + list[~azure.mgmt.network.v2020_04_01.models.LoadBalancerBackendAddress] :ivar backend_ip_configurations: An array of references to IP addresses defined in network interfaces. :vartype backend_ip_configurations: list[~azure.mgmt.network.v2020_04_01.models.NetworkInterfaceIPConfiguration] - :param load_balancer_backend_addresses: An array of backend addresses. - :type load_balancer_backend_addresses: - list[~azure.mgmt.network.v2020_04_01.models.LoadBalancerBackendAddress] :ivar load_balancing_rules: An array of references to load balancing rules that use this backend address pool. :vartype load_balancing_rules: @@ -3580,8 +3576,8 @@ class BackendAddressPool(SubResource): _attribute_map = { 'id': {'key': 'id', 'type': 'str'}, - 'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'}, 'load_balancer_backend_addresses': {'key': 'properties.loadBalancerBackendAddresses', 'type': '[LoadBalancerBackendAddress]'}, + 'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'}, 'load_balancing_rules': {'key': 'properties.loadBalancingRules', 'type': '[SubResource]'}, 'outbound_rule': {'key': 'properties.outboundRule', 'type': 'SubResource'}, 'outbound_rules': {'key': 'properties.outboundRules', 'type': '[SubResource]'}, @@ -3593,8 +3589,8 @@ class BackendAddressPool(SubResource): def __init__(self, *, id: str=None, load_balancer_backend_addresses=None, name: str=None, **kwargs) -> None: super(BackendAddressPool, self).__init__(id=id, **kwargs) - self.backend_ip_configurations = None self.load_balancer_backend_addresses = load_balancer_backend_addresses + self.backend_ip_configurations = None self.load_balancing_rules = None self.outbound_rule = None self.outbound_rules = None @@ -7738,19 +7734,9 @@ class FirewallPolicy(Resource): :param threat_intel_whitelist: ThreatIntel Whitelist for Firewall Policy. :type threat_intel_whitelist: ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyThreatIntelWhitelist - :param intrusion_system_mode: The operation mode for Intrusion system. - Possible values include: 'Enabled', 'Disabled' - :type intrusion_system_mode: str or - ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyIntrusionSystemMode - :param transport_security: TLS Configuration definition. - :type transport_security: - ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyTransportSecurity :ivar etag: A unique read-only string that changes whenever the resource is updated. :vartype etag: str - :param identity: The identity of the firewall policy. - :type identity: - ~azure.mgmt.network.v2020_04_01.models.ManagedServiceIdentity """ _validation = { @@ -7776,13 +7762,10 @@ class FirewallPolicy(Resource): 'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'}, 'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'}, 'threat_intel_whitelist': {'key': 'properties.threatIntelWhitelist', 'type': 'FirewallPolicyThreatIntelWhitelist'}, - 'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'}, - 'transport_security': {'key': 'properties.transportSecurity', 'type': 'FirewallPolicyTransportSecurity'}, 'etag': {'key': 'etag', 'type': 'str'}, - 'identity': {'key': 'identity', 'type': 'ManagedServiceIdentity'}, } - def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=None, threat_intel_mode=None, threat_intel_whitelist=None, intrusion_system_mode=None, transport_security=None, identity=None, **kwargs) -> None: + def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=None, threat_intel_mode=None, threat_intel_whitelist=None, **kwargs) -> None: super(FirewallPolicy, self).__init__(id=id, location=location, tags=tags, **kwargs) self.rule_groups = None self.provisioning_state = None @@ -7791,31 +7774,7 @@ def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=N self.child_policies = None self.threat_intel_mode = threat_intel_mode self.threat_intel_whitelist = threat_intel_whitelist - self.intrusion_system_mode = intrusion_system_mode - self.transport_security = transport_security self.etag = None - self.identity = identity - - -class FirewallPolicyCertificateAuthority(Model): - """Trusted Root certificates properties for tls. - - :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx) - 'Secret' or 'Certificate' object stored in KeyVault. - :type key_vault_secret_id: str - :param name: Name of the CA certificate. - :type name: str - """ - - _attribute_map = { - 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - } - - def __init__(self, *, key_vault_secret_id: str=None, name: str=None, **kwargs) -> None: - super(FirewallPolicyCertificateAuthority, self).__init__(**kwargs) - self.key_vault_secret_id = key_vault_secret_id - self.name = name class FirewallPolicyRule(Model): @@ -8077,56 +8036,6 @@ def __init__(self, *, ip_addresses=None, fqdns=None, **kwargs) -> None: self.fqdns = fqdns -class FirewallPolicyTransportSecurity(Model): - """Configuration needed to perform TLS termination & initiation. - - :param certificate_authority: The CA used for intermediate CA generation. - :type certificate_authority: - ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyCertificateAuthority - :param excluded_domains: List of domains which are excluded from TLS - termination. - :type excluded_domains: list[str] - :param trusted_root_certificates: Certificates which are to be trusted by - the firewall. - :type trusted_root_certificates: - list[~azure.mgmt.network.v2020_04_01.models.FirewallPolicyTrustedRootCertificate] - """ - - _attribute_map = { - 'certificate_authority': {'key': 'certificateAuthority', 'type': 'FirewallPolicyCertificateAuthority'}, - 'excluded_domains': {'key': 'excludedDomains', 'type': '[str]'}, - 'trusted_root_certificates': {'key': 'trustedRootCertificates', 'type': '[FirewallPolicyTrustedRootCertificate]'}, - } - - def __init__(self, *, certificate_authority=None, excluded_domains=None, trusted_root_certificates=None, **kwargs) -> None: - super(FirewallPolicyTransportSecurity, self).__init__(**kwargs) - self.certificate_authority = certificate_authority - self.excluded_domains = excluded_domains - self.trusted_root_certificates = trusted_root_certificates - - -class FirewallPolicyTrustedRootCertificate(Model): - """Trusted Root certificates of a firewall policy. - - :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx) - the public certificate data stored in KeyVault. - :type key_vault_secret_id: str - :param name: Name of the trusted root certificate that is unique within a - firewall policy. - :type name: str - """ - - _attribute_map = { - 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - } - - def __init__(self, *, key_vault_secret_id: str=None, name: str=None, **kwargs) -> None: - super(FirewallPolicyTrustedRootCertificate, self).__init__(**kwargs) - self.key_vault_secret_id = key_vault_secret_id - self.name = name - - class FlowLog(Resource): """A flow log resource. @@ -10294,8 +10203,6 @@ class NatRuleCondition(FirewallPolicyRuleCondition): :type destination_ports: list[str] :param source_ip_groups: List of source IpGroups for this rule. :type source_ip_groups: list[str] - :param terminate_tls: Terminate TLS connections for this rule. - :type terminate_tls: bool """ _validation = { @@ -10311,17 +10218,15 @@ class NatRuleCondition(FirewallPolicyRuleCondition): 'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'}, 'destination_ports': {'key': 'destinationPorts', 'type': '[str]'}, 'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'}, - 'terminate_tls': {'key': 'terminateTLS', 'type': 'bool'}, } - def __init__(self, *, name: str=None, description: str=None, ip_protocols=None, source_addresses=None, destination_addresses=None, destination_ports=None, source_ip_groups=None, terminate_tls: bool=None, **kwargs) -> None: + def __init__(self, *, name: str=None, description: str=None, ip_protocols=None, source_addresses=None, destination_addresses=None, destination_ports=None, source_ip_groups=None, **kwargs) -> None: super(NatRuleCondition, self).__init__(name=name, description=description, **kwargs) self.ip_protocols = ip_protocols self.source_addresses = source_addresses self.destination_addresses = destination_addresses self.destination_ports = destination_ports self.source_ip_groups = source_ip_groups - self.terminate_tls = terminate_tls self.rule_condition_type = 'NatRuleCondition' diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_network_management_client_enums.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_network_management_client_enums.py index cde947fd2069..cf7de19279fa 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_network_management_client_enums.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_04_01/models/_network_management_client_enums.py @@ -374,12 +374,6 @@ class ExpressRoutePortsEncapsulation(str, Enum): qin_q = "QinQ" -class FirewallPolicyIntrusionSystemMode(str, Enum): - - enabled = "Enabled" - disabled = "Disabled" - - class FirewallPolicyNatRuleActionType(str, Enum): dnat = "DNAT" diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/_network_management_client.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/_network_management_client.py index 66cce4377fbc..44957e37f795 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/_network_management_client.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/_network_management_client.py @@ -114,7 +114,6 @@ from .operations import VirtualHubBgpConnectionsOperations from .operations import VirtualHubIpConfigurationOperations from .operations import HubRouteTablesOperations -from .operations import WebApplicationFirewallPoliciesOperations from . import models @@ -324,8 +323,6 @@ class NetworkManagementClient(NetworkManagementClientOperationsMixin, SDKClient) :vartype virtual_hub_ip_configuration: azure.mgmt.network.v2020_05_01.operations.VirtualHubIpConfigurationOperations :ivar hub_route_tables: HubRouteTables operations :vartype hub_route_tables: azure.mgmt.network.v2020_05_01.operations.HubRouteTablesOperations - :ivar web_application_firewall_policies: WebApplicationFirewallPolicies operations - :vartype web_application_firewall_policies: azure.mgmt.network.v2020_05_01.operations.WebApplicationFirewallPoliciesOperations :param credentials: Credentials needed for the client to connect to Azure. :type credentials: :mod:`A msrestazure Credentials @@ -547,5 +544,3 @@ def __init__( self._client, self.config, self._serialize, self._deserialize) self.hub_route_tables = HubRouteTablesOperations( self._client, self.config, self._serialize, self._deserialize) - self.web_application_firewall_policies = WebApplicationFirewallPoliciesOperations( - self._client, self.config, self._serialize, self._deserialize) diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/__init__.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/__init__.py index e7f99315f9ba..4e9332d78813 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/__init__.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/__init__.py @@ -196,7 +196,6 @@ from ._models_py3 import ExpressRouteServiceProvider from ._models_py3 import ExpressRouteServiceProviderBandwidthsOffered from ._models_py3 import FirewallPolicy - from ._models_py3 import FirewallPolicyCertificateAuthority from ._models_py3 import FirewallPolicyFilterRuleCollection from ._models_py3 import FirewallPolicyFilterRuleCollectionAction from ._models_py3 import FirewallPolicyNatRuleCollection @@ -206,8 +205,6 @@ from ._models_py3 import FirewallPolicyRuleCollection from ._models_py3 import FirewallPolicyRuleCollectionGroup from ._models_py3 import FirewallPolicyThreatIntelWhitelist - from ._models_py3 import FirewallPolicyTransportSecurity - from ._models_py3 import FirewallPolicyTrustedRootCertificate from ._models_py3 import FlowLog from ._models_py3 import FlowLogFormatParameters from ._models_py3 import FlowLogInformation @@ -243,15 +240,9 @@ from ._models_py3 import LoadBalancingRule from ._models_py3 import LocalNetworkGateway from ._models_py3 import LogSpecification - from ._models_py3 import ManagedRuleGroupOverride - from ._models_py3 import ManagedRuleOverride - from ._models_py3 import ManagedRulesDefinition - from ._models_py3 import ManagedRuleSet from ._models_py3 import ManagedServiceIdentity from ._models_py3 import ManagedServiceIdentityUserAssignedIdentitiesValue - from ._models_py3 import MatchCondition from ._models_py3 import MatchedRule - from ._models_py3 import MatchVariable from ._models_py3 import MetricSpecification from ._models_py3 import NatGateway from ._models_py3 import NatGatewaySku @@ -284,7 +275,6 @@ from ._models_py3 import OperationDisplay from ._models_py3 import OperationPropertiesFormatServiceSpecification from ._models_py3 import OutboundRule - from ._models_py3 import OwaspCrsExclusionEntry from ._models_py3 import P2SConnectionConfiguration from ._models_py3 import P2SVpnConnectionHealth from ._models_py3 import P2SVpnConnectionHealthRequest @@ -300,7 +290,6 @@ from ._models_py3 import PatchRouteFilter from ._models_py3 import PatchRouteFilterRule from ._models_py3 import PeerExpressRouteCircuitConnection - from ._models_py3 import PolicySettings from ._models_py3 import PrepareNetworkPoliciesRequest from ._models_py3 import PrivateDnsZoneConfig from ._models_py3 import PrivateDnsZoneGroup @@ -430,8 +419,6 @@ from ._models_py3 import VpnSiteId from ._models_py3 import VpnSiteLink from ._models_py3 import VpnSiteLinkConnection - from ._models_py3 import WebApplicationFirewallCustomRule - from ._models_py3 import WebApplicationFirewallPolicy except (SyntaxError, ImportError): from ._models import AadAuthenticationParameters from ._models import AddressSpace @@ -619,7 +606,6 @@ from ._models import ExpressRouteServiceProvider from ._models import ExpressRouteServiceProviderBandwidthsOffered from ._models import FirewallPolicy - from ._models import FirewallPolicyCertificateAuthority from ._models import FirewallPolicyFilterRuleCollection from ._models import FirewallPolicyFilterRuleCollectionAction from ._models import FirewallPolicyNatRuleCollection @@ -629,8 +615,6 @@ from ._models import FirewallPolicyRuleCollection from ._models import FirewallPolicyRuleCollectionGroup from ._models import FirewallPolicyThreatIntelWhitelist - from ._models import FirewallPolicyTransportSecurity - from ._models import FirewallPolicyTrustedRootCertificate from ._models import FlowLog from ._models import FlowLogFormatParameters from ._models import FlowLogInformation @@ -666,15 +650,9 @@ from ._models import LoadBalancingRule from ._models import LocalNetworkGateway from ._models import LogSpecification - from ._models import ManagedRuleGroupOverride - from ._models import ManagedRuleOverride - from ._models import ManagedRulesDefinition - from ._models import ManagedRuleSet from ._models import ManagedServiceIdentity from ._models import ManagedServiceIdentityUserAssignedIdentitiesValue - from ._models import MatchCondition from ._models import MatchedRule - from ._models import MatchVariable from ._models import MetricSpecification from ._models import NatGateway from ._models import NatGatewaySku @@ -707,7 +685,6 @@ from ._models import OperationDisplay from ._models import OperationPropertiesFormatServiceSpecification from ._models import OutboundRule - from ._models import OwaspCrsExclusionEntry from ._models import P2SConnectionConfiguration from ._models import P2SVpnConnectionHealth from ._models import P2SVpnConnectionHealthRequest @@ -723,7 +700,6 @@ from ._models import PatchRouteFilter from ._models import PatchRouteFilterRule from ._models import PeerExpressRouteCircuitConnection - from ._models import PolicySettings from ._models import PrepareNetworkPoliciesRequest from ._models import PrivateDnsZoneConfig from ._models import PrivateDnsZoneGroup @@ -853,8 +829,6 @@ from ._models import VpnSiteId from ._models import VpnSiteLink from ._models import VpnSiteLinkConnection - from ._models import WebApplicationFirewallCustomRule - from ._models import WebApplicationFirewallPolicy from ._paged_models import ApplicationGatewayPaged from ._paged_models import ApplicationGatewayPrivateEndpointConnectionPaged from ._paged_models import ApplicationGatewayPrivateLinkResourcePaged @@ -948,7 +922,6 @@ from ._paged_models import VpnSiteLinkConnectionPaged from ._paged_models import VpnSiteLinkPaged from ._paged_models import VpnSitePaged -from ._paged_models import WebApplicationFirewallPolicyPaged from ._network_management_client_enums import ( ApplicationGatewayProtocol, ProvisioningState, @@ -999,7 +972,6 @@ ExpressRouteLinkConnectorType, ExpressRouteLinkAdminState, ExpressRoutePortsEncapsulation, - FirewallPolicyIntrusionSystemMode, FirewallPolicyNatRuleCollectionActionType, FirewallPolicyFilterRuleCollectionActionType, FirewallPolicyRuleApplicationProtocolType, @@ -1070,17 +1042,6 @@ HubVirtualNetworkConnectionStatus, VpnGatewayTunnelingProtocol, VpnAuthenticationType, - WebApplicationFirewallEnabledState, - WebApplicationFirewallMode, - WebApplicationFirewallRuleType, - WebApplicationFirewallMatchVariable, - WebApplicationFirewallOperator, - WebApplicationFirewallTransform, - WebApplicationFirewallAction, - WebApplicationFirewallPolicyResourceState, - OwaspCrsExclusionEntryMatchVariable, - OwaspCrsExclusionEntrySelectorMatchOperator, - ManagedRuleEnabledState, ) __all__ = [ @@ -1270,7 +1231,6 @@ 'ExpressRouteServiceProvider', 'ExpressRouteServiceProviderBandwidthsOffered', 'FirewallPolicy', - 'FirewallPolicyCertificateAuthority', 'FirewallPolicyFilterRuleCollection', 'FirewallPolicyFilterRuleCollectionAction', 'FirewallPolicyNatRuleCollection', @@ -1280,8 +1240,6 @@ 'FirewallPolicyRuleCollection', 'FirewallPolicyRuleCollectionGroup', 'FirewallPolicyThreatIntelWhitelist', - 'FirewallPolicyTransportSecurity', - 'FirewallPolicyTrustedRootCertificate', 'FlowLog', 'FlowLogFormatParameters', 'FlowLogInformation', @@ -1317,15 +1275,9 @@ 'LoadBalancingRule', 'LocalNetworkGateway', 'LogSpecification', - 'ManagedRuleGroupOverride', - 'ManagedRuleOverride', - 'ManagedRulesDefinition', - 'ManagedRuleSet', 'ManagedServiceIdentity', 'ManagedServiceIdentityUserAssignedIdentitiesValue', - 'MatchCondition', 'MatchedRule', - 'MatchVariable', 'MetricSpecification', 'NatGateway', 'NatGatewaySku', @@ -1358,7 +1310,6 @@ 'OperationDisplay', 'OperationPropertiesFormatServiceSpecification', 'OutboundRule', - 'OwaspCrsExclusionEntry', 'P2SConnectionConfiguration', 'P2SVpnConnectionHealth', 'P2SVpnConnectionHealthRequest', @@ -1374,7 +1325,6 @@ 'PatchRouteFilter', 'PatchRouteFilterRule', 'PeerExpressRouteCircuitConnection', - 'PolicySettings', 'PrepareNetworkPoliciesRequest', 'PrivateDnsZoneConfig', 'PrivateDnsZoneGroup', @@ -1504,8 +1454,6 @@ 'VpnSiteId', 'VpnSiteLink', 'VpnSiteLinkConnection', - 'WebApplicationFirewallCustomRule', - 'WebApplicationFirewallPolicy', 'ApplicationGatewayPaged', 'ApplicationGatewaySslPredefinedPolicyPaged', 'ApplicationGatewayPrivateLinkResourcePaged', @@ -1599,7 +1547,6 @@ 'BgpConnectionPaged', 'HubIpConfigurationPaged', 'HubRouteTablePaged', - 'WebApplicationFirewallPolicyPaged', 'ApplicationGatewayProtocol', 'ProvisioningState', 'IPAllocationMethod', @@ -1649,7 +1596,6 @@ 'ExpressRouteLinkConnectorType', 'ExpressRouteLinkAdminState', 'ExpressRoutePortsEncapsulation', - 'FirewallPolicyIntrusionSystemMode', 'FirewallPolicyNatRuleCollectionActionType', 'FirewallPolicyFilterRuleCollectionActionType', 'FirewallPolicyRuleApplicationProtocolType', @@ -1720,15 +1666,4 @@ 'HubVirtualNetworkConnectionStatus', 'VpnGatewayTunnelingProtocol', 'VpnAuthenticationType', - 'WebApplicationFirewallEnabledState', - 'WebApplicationFirewallMode', - 'WebApplicationFirewallRuleType', - 'WebApplicationFirewallMatchVariable', - 'WebApplicationFirewallOperator', - 'WebApplicationFirewallTransform', - 'WebApplicationFirewallAction', - 'WebApplicationFirewallPolicyResourceState', - 'OwaspCrsExclusionEntryMatchVariable', - 'OwaspCrsExclusionEntrySelectorMatchOperator', - 'ManagedRuleEnabledState', ] diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_models.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_models.py index 766d083d7963..39768f88fcb3 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_models.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_models.py @@ -2562,16 +2562,12 @@ class ApplicationRule(FirewallPolicyRule): :param protocols: Array of Application Protocols. :type protocols: list[~azure.mgmt.network.v2020_05_01.models.FirewallPolicyRuleApplicationProtocol] - :param target_urls: List of Urls for this rule condition. - :type target_urls: list[str] :param target_fqdns: List of FQDNs for this rule. :type target_fqdns: list[str] :param fqdn_tags: List of FQDN Tags for this rule. :type fqdn_tags: list[str] :param source_ip_groups: List of source IpGroups for this rule. :type source_ip_groups: list[str] - :param terminate_tls: Terminate TLS connections for this rule. - :type terminate_tls: bool """ _validation = { @@ -2585,11 +2581,9 @@ class ApplicationRule(FirewallPolicyRule): 'source_addresses': {'key': 'sourceAddresses', 'type': '[str]'}, 'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'}, 'protocols': {'key': 'protocols', 'type': '[FirewallPolicyRuleApplicationProtocol]'}, - 'target_urls': {'key': 'targetUrls', 'type': '[str]'}, 'target_fqdns': {'key': 'targetFqdns', 'type': '[str]'}, 'fqdn_tags': {'key': 'fqdnTags', 'type': '[str]'}, 'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'}, - 'terminate_tls': {'key': 'terminateTLS', 'type': 'bool'}, } def __init__(self, **kwargs): @@ -2597,11 +2591,9 @@ def __init__(self, **kwargs): self.source_addresses = kwargs.get('source_addresses', None) self.destination_addresses = kwargs.get('destination_addresses', None) self.protocols = kwargs.get('protocols', None) - self.target_urls = kwargs.get('target_urls', None) self.target_fqdns = kwargs.get('target_fqdns', None) self.fqdn_tags = kwargs.get('fqdn_tags', None) self.source_ip_groups = kwargs.get('source_ip_groups', None) - self.terminate_tls = kwargs.get('terminate_tls', None) self.rule_type = 'ApplicationRule' @@ -3783,13 +3775,13 @@ class BackendAddressPool(SubResource): :param id: Resource ID. :type id: str + :param load_balancer_backend_addresses: An array of backend addresses. + :type load_balancer_backend_addresses: + list[~azure.mgmt.network.v2020_05_01.models.LoadBalancerBackendAddress] :ivar backend_ip_configurations: An array of references to IP addresses defined in network interfaces. :vartype backend_ip_configurations: list[~azure.mgmt.network.v2020_05_01.models.NetworkInterfaceIPConfiguration] - :param load_balancer_backend_addresses: An array of backend addresses. - :type load_balancer_backend_addresses: - list[~azure.mgmt.network.v2020_05_01.models.LoadBalancerBackendAddress] :ivar load_balancing_rules: An array of references to load balancing rules that use this backend address pool. :vartype load_balancing_rules: @@ -3829,8 +3821,8 @@ class BackendAddressPool(SubResource): _attribute_map = { 'id': {'key': 'id', 'type': 'str'}, - 'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'}, 'load_balancer_backend_addresses': {'key': 'properties.loadBalancerBackendAddresses', 'type': '[LoadBalancerBackendAddress]'}, + 'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'}, 'load_balancing_rules': {'key': 'properties.loadBalancingRules', 'type': '[SubResource]'}, 'outbound_rule': {'key': 'properties.outboundRule', 'type': 'SubResource'}, 'outbound_rules': {'key': 'properties.outboundRules', 'type': '[SubResource]'}, @@ -3842,8 +3834,8 @@ class BackendAddressPool(SubResource): def __init__(self, **kwargs): super(BackendAddressPool, self).__init__(**kwargs) - self.backend_ip_configurations = None self.load_balancer_backend_addresses = kwargs.get('load_balancer_backend_addresses', None) + self.backend_ip_configurations = None self.load_balancing_rules = None self.outbound_rule = None self.outbound_rules = None @@ -8138,21 +8130,11 @@ class FirewallPolicy(Resource): :param threat_intel_whitelist: ThreatIntel Whitelist for Firewall Policy. :type threat_intel_whitelist: ~azure.mgmt.network.v2020_05_01.models.FirewallPolicyThreatIntelWhitelist - :param intrusion_system_mode: The operation mode for Intrusion system. - Possible values include: 'Enabled', 'Disabled' - :type intrusion_system_mode: str or - ~azure.mgmt.network.v2020_05_01.models.FirewallPolicyIntrusionSystemMode - :param transport_security: TLS Configuration definition. - :type transport_security: - ~azure.mgmt.network.v2020_05_01.models.FirewallPolicyTransportSecurity :param dns_settings: DNS Proxy Settings definition. :type dns_settings: ~azure.mgmt.network.v2020_05_01.models.DnsSettings :ivar etag: A unique read-only string that changes whenever the resource is updated. :vartype etag: str - :param identity: The identity of the firewall policy. - :type identity: - ~azure.mgmt.network.v2020_05_01.models.ManagedServiceIdentity """ _validation = { @@ -8178,11 +8160,8 @@ class FirewallPolicy(Resource): 'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'}, 'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'}, 'threat_intel_whitelist': {'key': 'properties.threatIntelWhitelist', 'type': 'FirewallPolicyThreatIntelWhitelist'}, - 'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'}, - 'transport_security': {'key': 'properties.transportSecurity', 'type': 'FirewallPolicyTransportSecurity'}, 'dns_settings': {'key': 'properties.dnsSettings', 'type': 'DnsSettings'}, 'etag': {'key': 'etag', 'type': 'str'}, - 'identity': {'key': 'identity', 'type': 'ManagedServiceIdentity'}, } def __init__(self, **kwargs): @@ -8194,32 +8173,8 @@ def __init__(self, **kwargs): self.child_policies = None self.threat_intel_mode = kwargs.get('threat_intel_mode', None) self.threat_intel_whitelist = kwargs.get('threat_intel_whitelist', None) - self.intrusion_system_mode = kwargs.get('intrusion_system_mode', None) - self.transport_security = kwargs.get('transport_security', None) self.dns_settings = kwargs.get('dns_settings', None) self.etag = None - self.identity = kwargs.get('identity', None) - - -class FirewallPolicyCertificateAuthority(Model): - """Trusted Root certificates properties for tls. - - :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx) - 'Secret' or 'Certificate' object stored in KeyVault. - :type key_vault_secret_id: str - :param name: Name of the CA certificate. - :type name: str - """ - - _attribute_map = { - 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - } - - def __init__(self, **kwargs): - super(FirewallPolicyCertificateAuthority, self).__init__(**kwargs) - self.key_vault_secret_id = kwargs.get('key_vault_secret_id', None) - self.name = kwargs.get('name', None) class FirewallPolicyRuleCollection(Model): @@ -8475,56 +8430,6 @@ def __init__(self, **kwargs): self.fqdns = kwargs.get('fqdns', None) -class FirewallPolicyTransportSecurity(Model): - """Configuration needed to perform TLS termination & initiation. - - :param certificate_authority: The CA used for intermediate CA generation. - :type certificate_authority: - ~azure.mgmt.network.v2020_05_01.models.FirewallPolicyCertificateAuthority - :param excluded_domains: List of domains which are excluded from TLS - termination. - :type excluded_domains: list[str] - :param trusted_root_certificates: Certificates which are to be trusted by - the firewall. - :type trusted_root_certificates: - list[~azure.mgmt.network.v2020_05_01.models.FirewallPolicyTrustedRootCertificate] - """ - - _attribute_map = { - 'certificate_authority': {'key': 'certificateAuthority', 'type': 'FirewallPolicyCertificateAuthority'}, - 'excluded_domains': {'key': 'excludedDomains', 'type': '[str]'}, - 'trusted_root_certificates': {'key': 'trustedRootCertificates', 'type': '[FirewallPolicyTrustedRootCertificate]'}, - } - - def __init__(self, **kwargs): - super(FirewallPolicyTransportSecurity, self).__init__(**kwargs) - self.certificate_authority = kwargs.get('certificate_authority', None) - self.excluded_domains = kwargs.get('excluded_domains', None) - self.trusted_root_certificates = kwargs.get('trusted_root_certificates', None) - - -class FirewallPolicyTrustedRootCertificate(Model): - """Trusted Root certificates of a firewall policy. - - :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx) - the public certificate data stored in KeyVault. - :type key_vault_secret_id: str - :param name: Name of the trusted root certificate that is unique within a - firewall policy. - :type name: str - """ - - _attribute_map = { - 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - } - - def __init__(self, **kwargs): - super(FirewallPolicyTrustedRootCertificate, self).__init__(**kwargs) - self.key_vault_secret_id = kwargs.get('key_vault_secret_id', None) - self.name = kwargs.get('name', None) - - class FlowLog(Resource): """A flow log resource. @@ -10349,125 +10254,6 @@ def __init__(self, **kwargs): self.blob_duration = kwargs.get('blob_duration', None) -class ManagedRuleGroupOverride(Model): - """Defines a managed rule group override setting. - - All required parameters must be populated in order to send to Azure. - - :param rule_group_name: Required. The managed rule group to override. - :type rule_group_name: str - :param rules: List of rules that will be disabled. If none specified, all - rules in the group will be disabled. - :type rules: - list[~azure.mgmt.network.v2020_05_01.models.ManagedRuleOverride] - """ - - _validation = { - 'rule_group_name': {'required': True}, - } - - _attribute_map = { - 'rule_group_name': {'key': 'ruleGroupName', 'type': 'str'}, - 'rules': {'key': 'rules', 'type': '[ManagedRuleOverride]'}, - } - - def __init__(self, **kwargs): - super(ManagedRuleGroupOverride, self).__init__(**kwargs) - self.rule_group_name = kwargs.get('rule_group_name', None) - self.rules = kwargs.get('rules', None) - - -class ManagedRuleOverride(Model): - """Defines a managed rule group override setting. - - All required parameters must be populated in order to send to Azure. - - :param rule_id: Required. Identifier for the managed rule. - :type rule_id: str - :param state: The state of the managed rule. Defaults to Disabled if not - specified. Possible values include: 'Disabled' - :type state: str or - ~azure.mgmt.network.v2020_05_01.models.ManagedRuleEnabledState - """ - - _validation = { - 'rule_id': {'required': True}, - } - - _attribute_map = { - 'rule_id': {'key': 'ruleId', 'type': 'str'}, - 'state': {'key': 'state', 'type': 'str'}, - } - - def __init__(self, **kwargs): - super(ManagedRuleOverride, self).__init__(**kwargs) - self.rule_id = kwargs.get('rule_id', None) - self.state = kwargs.get('state', None) - - -class ManagedRulesDefinition(Model): - """Allow to exclude some variable satisfy the condition for the WAF check. - - All required parameters must be populated in order to send to Azure. - - :param exclusions: The Exclusions that are applied on the policy. - :type exclusions: - list[~azure.mgmt.network.v2020_05_01.models.OwaspCrsExclusionEntry] - :param managed_rule_sets: Required. The managed rule sets that are - associated with the policy. - :type managed_rule_sets: - list[~azure.mgmt.network.v2020_05_01.models.ManagedRuleSet] - """ - - _validation = { - 'managed_rule_sets': {'required': True}, - } - - _attribute_map = { - 'exclusions': {'key': 'exclusions', 'type': '[OwaspCrsExclusionEntry]'}, - 'managed_rule_sets': {'key': 'managedRuleSets', 'type': '[ManagedRuleSet]'}, - } - - def __init__(self, **kwargs): - super(ManagedRulesDefinition, self).__init__(**kwargs) - self.exclusions = kwargs.get('exclusions', None) - self.managed_rule_sets = kwargs.get('managed_rule_sets', None) - - -class ManagedRuleSet(Model): - """Defines a managed rule set. - - All required parameters must be populated in order to send to Azure. - - :param rule_set_type: Required. Defines the rule set type to use. - :type rule_set_type: str - :param rule_set_version: Required. Defines the version of the rule set to - use. - :type rule_set_version: str - :param rule_group_overrides: Defines the rule group overrides to apply to - the rule set. - :type rule_group_overrides: - list[~azure.mgmt.network.v2020_05_01.models.ManagedRuleGroupOverride] - """ - - _validation = { - 'rule_set_type': {'required': True}, - 'rule_set_version': {'required': True}, - } - - _attribute_map = { - 'rule_set_type': {'key': 'ruleSetType', 'type': 'str'}, - 'rule_set_version': {'key': 'ruleSetVersion', 'type': 'str'}, - 'rule_group_overrides': {'key': 'ruleGroupOverrides', 'type': '[ManagedRuleGroupOverride]'}, - } - - def __init__(self, **kwargs): - super(ManagedRuleSet, self).__init__(**kwargs) - self.rule_set_type = kwargs.get('rule_set_type', None) - self.rule_set_version = kwargs.get('rule_set_version', None) - self.rule_group_overrides = kwargs.get('rule_group_overrides', None) - - class ManagedServiceIdentity(Model): """Identity for the resource. @@ -10543,52 +10329,6 @@ def __init__(self, **kwargs): self.client_id = None -class MatchCondition(Model): - """Define match conditions. - - All required parameters must be populated in order to send to Azure. - - :param match_variables: Required. List of match variables. - :type match_variables: - list[~azure.mgmt.network.v2020_05_01.models.MatchVariable] - :param operator: Required. The operator to be matched. Possible values - include: 'IPMatch', 'Equal', 'Contains', 'LessThan', 'GreaterThan', - 'LessThanOrEqual', 'GreaterThanOrEqual', 'BeginsWith', 'EndsWith', - 'Regex', 'GeoMatch' - :type operator: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallOperator - :param negation_conditon: Whether this is negate condition or not. - :type negation_conditon: bool - :param match_values: Required. Match value. - :type match_values: list[str] - :param transforms: List of transforms. - :type transforms: list[str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallTransform] - """ - - _validation = { - 'match_variables': {'required': True}, - 'operator': {'required': True}, - 'match_values': {'required': True}, - } - - _attribute_map = { - 'match_variables': {'key': 'matchVariables', 'type': '[MatchVariable]'}, - 'operator': {'key': 'operator', 'type': 'str'}, - 'negation_conditon': {'key': 'negationConditon', 'type': 'bool'}, - 'match_values': {'key': 'matchValues', 'type': '[str]'}, - 'transforms': {'key': 'transforms', 'type': '[str]'}, - } - - def __init__(self, **kwargs): - super(MatchCondition, self).__init__(**kwargs) - self.match_variables = kwargs.get('match_variables', None) - self.operator = kwargs.get('operator', None) - self.negation_conditon = kwargs.get('negation_conditon', None) - self.match_values = kwargs.get('match_values', None) - self.transforms = kwargs.get('transforms', None) - - class MatchedRule(Model): """Matched rule. @@ -10610,35 +10350,6 @@ def __init__(self, **kwargs): self.action = kwargs.get('action', None) -class MatchVariable(Model): - """Define match variables. - - All required parameters must be populated in order to send to Azure. - - :param variable_name: Required. Match Variable. Possible values include: - 'RemoteAddr', 'RequestMethod', 'QueryString', 'PostArgs', 'RequestUri', - 'RequestHeaders', 'RequestBody', 'RequestCookies' - :type variable_name: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallMatchVariable - :param selector: The selector of match variable. - :type selector: str - """ - - _validation = { - 'variable_name': {'required': True}, - } - - _attribute_map = { - 'variable_name': {'key': 'variableName', 'type': 'str'}, - 'selector': {'key': 'selector', 'type': 'str'}, - } - - def __init__(self, **kwargs): - super(MatchVariable, self).__init__(**kwargs) - self.variable_name = kwargs.get('variable_name', None) - self.selector = kwargs.get('selector', None) - - class MetricSpecification(Model): """Description of metrics specification. @@ -12220,47 +11931,6 @@ def __init__(self, **kwargs): self.type = None -class OwaspCrsExclusionEntry(Model): - """Allow to exclude some variable satisfy the condition for the WAF check. - - All required parameters must be populated in order to send to Azure. - - :param match_variable: Required. The variable to be excluded. Possible - values include: 'RequestHeaderNames', 'RequestCookieNames', - 'RequestArgNames' - :type match_variable: str or - ~azure.mgmt.network.v2020_05_01.models.OwaspCrsExclusionEntryMatchVariable - :param selector_match_operator: Required. When matchVariable is a - collection, operate on the selector to specify which elements in the - collection this exclusion applies to. Possible values include: 'Equals', - 'Contains', 'StartsWith', 'EndsWith', 'EqualsAny' - :type selector_match_operator: str or - ~azure.mgmt.network.v2020_05_01.models.OwaspCrsExclusionEntrySelectorMatchOperator - :param selector: Required. When matchVariable is a collection, operator - used to specify which elements in the collection this exclusion applies - to. - :type selector: str - """ - - _validation = { - 'match_variable': {'required': True}, - 'selector_match_operator': {'required': True}, - 'selector': {'required': True}, - } - - _attribute_map = { - 'match_variable': {'key': 'matchVariable', 'type': 'str'}, - 'selector_match_operator': {'key': 'selectorMatchOperator', 'type': 'str'}, - 'selector': {'key': 'selector', 'type': 'str'}, - } - - def __init__(self, **kwargs): - super(OwaspCrsExclusionEntry, self).__init__(**kwargs) - self.match_variable = kwargs.get('match_variable', None) - self.selector_match_operator = kwargs.get('selector_match_operator', None) - self.selector = kwargs.get('selector', None) - - class P2SConnectionConfiguration(SubResource): """P2SConnectionConfiguration Resource. @@ -12973,48 +12643,6 @@ def __init__(self, **kwargs): self.type = None -class PolicySettings(Model): - """Defines contents of a web application firewall global configuration. - - :param state: The state of the policy. Possible values include: - 'Disabled', 'Enabled' - :type state: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallEnabledState - :param mode: The mode of the policy. Possible values include: - 'Prevention', 'Detection' - :type mode: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallMode - :param request_body_check: Whether to allow WAF to check request Body. - :type request_body_check: bool - :param max_request_body_size_in_kb: Maximum request body size in Kb for - WAF. - :type max_request_body_size_in_kb: int - :param file_upload_limit_in_mb: Maximum file upload size in Mb for WAF. - :type file_upload_limit_in_mb: int - """ - - _validation = { - 'max_request_body_size_in_kb': {'maximum': 128, 'minimum': 8}, - 'file_upload_limit_in_mb': {'minimum': 0}, - } - - _attribute_map = { - 'state': {'key': 'state', 'type': 'str'}, - 'mode': {'key': 'mode', 'type': 'str'}, - 'request_body_check': {'key': 'requestBodyCheck', 'type': 'bool'}, - 'max_request_body_size_in_kb': {'key': 'maxRequestBodySizeInKb', 'type': 'int'}, - 'file_upload_limit_in_mb': {'key': 'fileUploadLimitInMb', 'type': 'int'}, - } - - def __init__(self, **kwargs): - super(PolicySettings, self).__init__(**kwargs) - self.state = kwargs.get('state', None) - self.mode = kwargs.get('mode', None) - self.request_body_check = kwargs.get('request_body_check', None) - self.max_request_body_size_in_kb = kwargs.get('max_request_body_size_in_kb', None) - self.file_upload_limit_in_mb = kwargs.get('file_upload_limit_in_mb', None) - - class PrepareNetworkPoliciesRequest(Model): """Details of PrepareNetworkPolicies for Subnet. @@ -18858,157 +18486,3 @@ def __init__(self, **kwargs): self.name = kwargs.get('name', None) self.etag = None self.type = None - - -class WebApplicationFirewallCustomRule(Model): - """Defines contents of a web application rule. - - Variables are only populated by the server, and will be ignored when - sending a request. - - All required parameters must be populated in order to send to Azure. - - :param name: The name of the resource that is unique within a policy. This - name can be used to access the resource. - :type name: str - :ivar etag: A unique read-only string that changes whenever the resource - is updated. - :vartype etag: str - :param priority: Required. Priority of the rule. Rules with a lower value - will be evaluated before rules with a higher value. - :type priority: int - :param rule_type: Required. The rule type. Possible values include: - 'MatchRule', 'Invalid' - :type rule_type: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallRuleType - :param match_conditions: Required. List of match conditions. - :type match_conditions: - list[~azure.mgmt.network.v2020_05_01.models.MatchCondition] - :param action: Required. Type of Actions. Possible values include: - 'Allow', 'Block', 'Log' - :type action: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallAction - """ - - _validation = { - 'name': {'max_length': 128}, - 'etag': {'readonly': True}, - 'priority': {'required': True}, - 'rule_type': {'required': True}, - 'match_conditions': {'required': True}, - 'action': {'required': True}, - } - - _attribute_map = { - 'name': {'key': 'name', 'type': 'str'}, - 'etag': {'key': 'etag', 'type': 'str'}, - 'priority': {'key': 'priority', 'type': 'int'}, - 'rule_type': {'key': 'ruleType', 'type': 'str'}, - 'match_conditions': {'key': 'matchConditions', 'type': '[MatchCondition]'}, - 'action': {'key': 'action', 'type': 'str'}, - } - - def __init__(self, **kwargs): - super(WebApplicationFirewallCustomRule, self).__init__(**kwargs) - self.name = kwargs.get('name', None) - self.etag = None - self.priority = kwargs.get('priority', None) - self.rule_type = kwargs.get('rule_type', None) - self.match_conditions = kwargs.get('match_conditions', None) - self.action = kwargs.get('action', None) - - -class WebApplicationFirewallPolicy(Resource): - """Defines web application firewall policy. - - Variables are only populated by the server, and will be ignored when - sending a request. - - All required parameters must be populated in order to send to Azure. - - :param id: Resource ID. - :type id: str - :ivar name: Resource name. - :vartype name: str - :ivar type: Resource type. - :vartype type: str - :param location: Resource location. - :type location: str - :param tags: Resource tags. - :type tags: dict[str, str] - :param policy_settings: The PolicySettings for policy. - :type policy_settings: - ~azure.mgmt.network.v2020_05_01.models.PolicySettings - :param custom_rules: The custom rules inside the policy. - :type custom_rules: - list[~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallCustomRule] - :ivar application_gateways: A collection of references to application - gateways. - :vartype application_gateways: - list[~azure.mgmt.network.v2020_05_01.models.ApplicationGateway] - :ivar provisioning_state: The provisioning state of the web application - firewall policy resource. Possible values include: 'Succeeded', - 'Updating', 'Deleting', 'Failed' - :vartype provisioning_state: str or - ~azure.mgmt.network.v2020_05_01.models.ProvisioningState - :ivar resource_state: Resource status of the policy. Resource status of - the policy. Possible values include: 'Creating', 'Enabling', 'Enabled', - 'Disabling', 'Disabled', 'Deleting' - :vartype resource_state: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallPolicyResourceState - :param managed_rules: Required. Describes the managedRules structure. - :type managed_rules: - ~azure.mgmt.network.v2020_05_01.models.ManagedRulesDefinition - :ivar http_listeners: A collection of references to application gateway - http listeners. - :vartype http_listeners: - list[~azure.mgmt.network.v2020_05_01.models.SubResource] - :ivar path_based_rules: A collection of references to application gateway - path rules. - :vartype path_based_rules: - list[~azure.mgmt.network.v2020_05_01.models.SubResource] - :ivar etag: A unique read-only string that changes whenever the resource - is updated. - :vartype etag: str - """ - - _validation = { - 'name': {'readonly': True}, - 'type': {'readonly': True}, - 'application_gateways': {'readonly': True}, - 'provisioning_state': {'readonly': True}, - 'resource_state': {'readonly': True}, - 'managed_rules': {'required': True}, - 'http_listeners': {'readonly': True}, - 'path_based_rules': {'readonly': True}, - 'etag': {'readonly': True}, - } - - _attribute_map = { - 'id': {'key': 'id', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - 'type': {'key': 'type', 'type': 'str'}, - 'location': {'key': 'location', 'type': 'str'}, - 'tags': {'key': 'tags', 'type': '{str}'}, - 'policy_settings': {'key': 'properties.policySettings', 'type': 'PolicySettings'}, - 'custom_rules': {'key': 'properties.customRules', 'type': '[WebApplicationFirewallCustomRule]'}, - 'application_gateways': {'key': 'properties.applicationGateways', 'type': '[ApplicationGateway]'}, - 'provisioning_state': {'key': 'properties.provisioningState', 'type': 'str'}, - 'resource_state': {'key': 'properties.resourceState', 'type': 'str'}, - 'managed_rules': {'key': 'properties.managedRules', 'type': 'ManagedRulesDefinition'}, - 'http_listeners': {'key': 'properties.httpListeners', 'type': '[SubResource]'}, - 'path_based_rules': {'key': 'properties.pathBasedRules', 'type': '[SubResource]'}, - 'etag': {'key': 'etag', 'type': 'str'}, - } - - def __init__(self, **kwargs): - super(WebApplicationFirewallPolicy, self).__init__(**kwargs) - self.policy_settings = kwargs.get('policy_settings', None) - self.custom_rules = kwargs.get('custom_rules', None) - self.application_gateways = None - self.provisioning_state = None - self.resource_state = None - self.managed_rules = kwargs.get('managed_rules', None) - self.http_listeners = None - self.path_based_rules = None - self.etag = None diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_models_py3.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_models_py3.py index e2f83fcf2671..21ff50a6b6c3 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_models_py3.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_models_py3.py @@ -2562,16 +2562,12 @@ class ApplicationRule(FirewallPolicyRule): :param protocols: Array of Application Protocols. :type protocols: list[~azure.mgmt.network.v2020_05_01.models.FirewallPolicyRuleApplicationProtocol] - :param target_urls: List of Urls for this rule condition. - :type target_urls: list[str] :param target_fqdns: List of FQDNs for this rule. :type target_fqdns: list[str] :param fqdn_tags: List of FQDN Tags for this rule. :type fqdn_tags: list[str] :param source_ip_groups: List of source IpGroups for this rule. :type source_ip_groups: list[str] - :param terminate_tls: Terminate TLS connections for this rule. - :type terminate_tls: bool """ _validation = { @@ -2585,23 +2581,19 @@ class ApplicationRule(FirewallPolicyRule): 'source_addresses': {'key': 'sourceAddresses', 'type': '[str]'}, 'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'}, 'protocols': {'key': 'protocols', 'type': '[FirewallPolicyRuleApplicationProtocol]'}, - 'target_urls': {'key': 'targetUrls', 'type': '[str]'}, 'target_fqdns': {'key': 'targetFqdns', 'type': '[str]'}, 'fqdn_tags': {'key': 'fqdnTags', 'type': '[str]'}, 'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'}, - 'terminate_tls': {'key': 'terminateTLS', 'type': 'bool'}, } - def __init__(self, *, name: str=None, description: str=None, source_addresses=None, destination_addresses=None, protocols=None, target_urls=None, target_fqdns=None, fqdn_tags=None, source_ip_groups=None, terminate_tls: bool=None, **kwargs) -> None: + def __init__(self, *, name: str=None, description: str=None, source_addresses=None, destination_addresses=None, protocols=None, target_fqdns=None, fqdn_tags=None, source_ip_groups=None, **kwargs) -> None: super(ApplicationRule, self).__init__(name=name, description=description, **kwargs) self.source_addresses = source_addresses self.destination_addresses = destination_addresses self.protocols = protocols - self.target_urls = target_urls self.target_fqdns = target_fqdns self.fqdn_tags = fqdn_tags self.source_ip_groups = source_ip_groups - self.terminate_tls = terminate_tls self.rule_type = 'ApplicationRule' @@ -3783,13 +3775,13 @@ class BackendAddressPool(SubResource): :param id: Resource ID. :type id: str + :param load_balancer_backend_addresses: An array of backend addresses. + :type load_balancer_backend_addresses: + list[~azure.mgmt.network.v2020_05_01.models.LoadBalancerBackendAddress] :ivar backend_ip_configurations: An array of references to IP addresses defined in network interfaces. :vartype backend_ip_configurations: list[~azure.mgmt.network.v2020_05_01.models.NetworkInterfaceIPConfiguration] - :param load_balancer_backend_addresses: An array of backend addresses. - :type load_balancer_backend_addresses: - list[~azure.mgmt.network.v2020_05_01.models.LoadBalancerBackendAddress] :ivar load_balancing_rules: An array of references to load balancing rules that use this backend address pool. :vartype load_balancing_rules: @@ -3829,8 +3821,8 @@ class BackendAddressPool(SubResource): _attribute_map = { 'id': {'key': 'id', 'type': 'str'}, - 'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'}, 'load_balancer_backend_addresses': {'key': 'properties.loadBalancerBackendAddresses', 'type': '[LoadBalancerBackendAddress]'}, + 'backend_ip_configurations': {'key': 'properties.backendIPConfigurations', 'type': '[NetworkInterfaceIPConfiguration]'}, 'load_balancing_rules': {'key': 'properties.loadBalancingRules', 'type': '[SubResource]'}, 'outbound_rule': {'key': 'properties.outboundRule', 'type': 'SubResource'}, 'outbound_rules': {'key': 'properties.outboundRules', 'type': '[SubResource]'}, @@ -3842,8 +3834,8 @@ class BackendAddressPool(SubResource): def __init__(self, *, id: str=None, load_balancer_backend_addresses=None, name: str=None, **kwargs) -> None: super(BackendAddressPool, self).__init__(id=id, **kwargs) - self.backend_ip_configurations = None self.load_balancer_backend_addresses = load_balancer_backend_addresses + self.backend_ip_configurations = None self.load_balancing_rules = None self.outbound_rule = None self.outbound_rules = None @@ -8138,21 +8130,11 @@ class FirewallPolicy(Resource): :param threat_intel_whitelist: ThreatIntel Whitelist for Firewall Policy. :type threat_intel_whitelist: ~azure.mgmt.network.v2020_05_01.models.FirewallPolicyThreatIntelWhitelist - :param intrusion_system_mode: The operation mode for Intrusion system. - Possible values include: 'Enabled', 'Disabled' - :type intrusion_system_mode: str or - ~azure.mgmt.network.v2020_05_01.models.FirewallPolicyIntrusionSystemMode - :param transport_security: TLS Configuration definition. - :type transport_security: - ~azure.mgmt.network.v2020_05_01.models.FirewallPolicyTransportSecurity :param dns_settings: DNS Proxy Settings definition. :type dns_settings: ~azure.mgmt.network.v2020_05_01.models.DnsSettings :ivar etag: A unique read-only string that changes whenever the resource is updated. :vartype etag: str - :param identity: The identity of the firewall policy. - :type identity: - ~azure.mgmt.network.v2020_05_01.models.ManagedServiceIdentity """ _validation = { @@ -8178,14 +8160,11 @@ class FirewallPolicy(Resource): 'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'}, 'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'}, 'threat_intel_whitelist': {'key': 'properties.threatIntelWhitelist', 'type': 'FirewallPolicyThreatIntelWhitelist'}, - 'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'}, - 'transport_security': {'key': 'properties.transportSecurity', 'type': 'FirewallPolicyTransportSecurity'}, 'dns_settings': {'key': 'properties.dnsSettings', 'type': 'DnsSettings'}, 'etag': {'key': 'etag', 'type': 'str'}, - 'identity': {'key': 'identity', 'type': 'ManagedServiceIdentity'}, } - def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=None, threat_intel_mode=None, threat_intel_whitelist=None, intrusion_system_mode=None, transport_security=None, dns_settings=None, identity=None, **kwargs) -> None: + def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=None, threat_intel_mode=None, threat_intel_whitelist=None, dns_settings=None, **kwargs) -> None: super(FirewallPolicy, self).__init__(id=id, location=location, tags=tags, **kwargs) self.rule_collection_groups = None self.provisioning_state = None @@ -8194,32 +8173,8 @@ def __init__(self, *, id: str=None, location: str=None, tags=None, base_policy=N self.child_policies = None self.threat_intel_mode = threat_intel_mode self.threat_intel_whitelist = threat_intel_whitelist - self.intrusion_system_mode = intrusion_system_mode - self.transport_security = transport_security self.dns_settings = dns_settings self.etag = None - self.identity = identity - - -class FirewallPolicyCertificateAuthority(Model): - """Trusted Root certificates properties for tls. - - :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx) - 'Secret' or 'Certificate' object stored in KeyVault. - :type key_vault_secret_id: str - :param name: Name of the CA certificate. - :type name: str - """ - - _attribute_map = { - 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - } - - def __init__(self, *, key_vault_secret_id: str=None, name: str=None, **kwargs) -> None: - super(FirewallPolicyCertificateAuthority, self).__init__(**kwargs) - self.key_vault_secret_id = key_vault_secret_id - self.name = name class FirewallPolicyRuleCollection(Model): @@ -8475,56 +8430,6 @@ def __init__(self, *, ip_addresses=None, fqdns=None, **kwargs) -> None: self.fqdns = fqdns -class FirewallPolicyTransportSecurity(Model): - """Configuration needed to perform TLS termination & initiation. - - :param certificate_authority: The CA used for intermediate CA generation. - :type certificate_authority: - ~azure.mgmt.network.v2020_05_01.models.FirewallPolicyCertificateAuthority - :param excluded_domains: List of domains which are excluded from TLS - termination. - :type excluded_domains: list[str] - :param trusted_root_certificates: Certificates which are to be trusted by - the firewall. - :type trusted_root_certificates: - list[~azure.mgmt.network.v2020_05_01.models.FirewallPolicyTrustedRootCertificate] - """ - - _attribute_map = { - 'certificate_authority': {'key': 'certificateAuthority', 'type': 'FirewallPolicyCertificateAuthority'}, - 'excluded_domains': {'key': 'excludedDomains', 'type': '[str]'}, - 'trusted_root_certificates': {'key': 'trustedRootCertificates', 'type': '[FirewallPolicyTrustedRootCertificate]'}, - } - - def __init__(self, *, certificate_authority=None, excluded_domains=None, trusted_root_certificates=None, **kwargs) -> None: - super(FirewallPolicyTransportSecurity, self).__init__(**kwargs) - self.certificate_authority = certificate_authority - self.excluded_domains = excluded_domains - self.trusted_root_certificates = trusted_root_certificates - - -class FirewallPolicyTrustedRootCertificate(Model): - """Trusted Root certificates of a firewall policy. - - :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx) - the public certificate data stored in KeyVault. - :type key_vault_secret_id: str - :param name: Name of the trusted root certificate that is unique within a - firewall policy. - :type name: str - """ - - _attribute_map = { - 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - } - - def __init__(self, *, key_vault_secret_id: str=None, name: str=None, **kwargs) -> None: - super(FirewallPolicyTrustedRootCertificate, self).__init__(**kwargs) - self.key_vault_secret_id = key_vault_secret_id - self.name = name - - class FlowLog(Resource): """A flow log resource. @@ -10349,125 +10254,6 @@ def __init__(self, *, name: str=None, display_name: str=None, blob_duration: str self.blob_duration = blob_duration -class ManagedRuleGroupOverride(Model): - """Defines a managed rule group override setting. - - All required parameters must be populated in order to send to Azure. - - :param rule_group_name: Required. The managed rule group to override. - :type rule_group_name: str - :param rules: List of rules that will be disabled. If none specified, all - rules in the group will be disabled. - :type rules: - list[~azure.mgmt.network.v2020_05_01.models.ManagedRuleOverride] - """ - - _validation = { - 'rule_group_name': {'required': True}, - } - - _attribute_map = { - 'rule_group_name': {'key': 'ruleGroupName', 'type': 'str'}, - 'rules': {'key': 'rules', 'type': '[ManagedRuleOverride]'}, - } - - def __init__(self, *, rule_group_name: str, rules=None, **kwargs) -> None: - super(ManagedRuleGroupOverride, self).__init__(**kwargs) - self.rule_group_name = rule_group_name - self.rules = rules - - -class ManagedRuleOverride(Model): - """Defines a managed rule group override setting. - - All required parameters must be populated in order to send to Azure. - - :param rule_id: Required. Identifier for the managed rule. - :type rule_id: str - :param state: The state of the managed rule. Defaults to Disabled if not - specified. Possible values include: 'Disabled' - :type state: str or - ~azure.mgmt.network.v2020_05_01.models.ManagedRuleEnabledState - """ - - _validation = { - 'rule_id': {'required': True}, - } - - _attribute_map = { - 'rule_id': {'key': 'ruleId', 'type': 'str'}, - 'state': {'key': 'state', 'type': 'str'}, - } - - def __init__(self, *, rule_id: str, state=None, **kwargs) -> None: - super(ManagedRuleOverride, self).__init__(**kwargs) - self.rule_id = rule_id - self.state = state - - -class ManagedRulesDefinition(Model): - """Allow to exclude some variable satisfy the condition for the WAF check. - - All required parameters must be populated in order to send to Azure. - - :param exclusions: The Exclusions that are applied on the policy. - :type exclusions: - list[~azure.mgmt.network.v2020_05_01.models.OwaspCrsExclusionEntry] - :param managed_rule_sets: Required. The managed rule sets that are - associated with the policy. - :type managed_rule_sets: - list[~azure.mgmt.network.v2020_05_01.models.ManagedRuleSet] - """ - - _validation = { - 'managed_rule_sets': {'required': True}, - } - - _attribute_map = { - 'exclusions': {'key': 'exclusions', 'type': '[OwaspCrsExclusionEntry]'}, - 'managed_rule_sets': {'key': 'managedRuleSets', 'type': '[ManagedRuleSet]'}, - } - - def __init__(self, *, managed_rule_sets, exclusions=None, **kwargs) -> None: - super(ManagedRulesDefinition, self).__init__(**kwargs) - self.exclusions = exclusions - self.managed_rule_sets = managed_rule_sets - - -class ManagedRuleSet(Model): - """Defines a managed rule set. - - All required parameters must be populated in order to send to Azure. - - :param rule_set_type: Required. Defines the rule set type to use. - :type rule_set_type: str - :param rule_set_version: Required. Defines the version of the rule set to - use. - :type rule_set_version: str - :param rule_group_overrides: Defines the rule group overrides to apply to - the rule set. - :type rule_group_overrides: - list[~azure.mgmt.network.v2020_05_01.models.ManagedRuleGroupOverride] - """ - - _validation = { - 'rule_set_type': {'required': True}, - 'rule_set_version': {'required': True}, - } - - _attribute_map = { - 'rule_set_type': {'key': 'ruleSetType', 'type': 'str'}, - 'rule_set_version': {'key': 'ruleSetVersion', 'type': 'str'}, - 'rule_group_overrides': {'key': 'ruleGroupOverrides', 'type': '[ManagedRuleGroupOverride]'}, - } - - def __init__(self, *, rule_set_type: str, rule_set_version: str, rule_group_overrides=None, **kwargs) -> None: - super(ManagedRuleSet, self).__init__(**kwargs) - self.rule_set_type = rule_set_type - self.rule_set_version = rule_set_version - self.rule_group_overrides = rule_group_overrides - - class ManagedServiceIdentity(Model): """Identity for the resource. @@ -10543,52 +10329,6 @@ def __init__(self, **kwargs) -> None: self.client_id = None -class MatchCondition(Model): - """Define match conditions. - - All required parameters must be populated in order to send to Azure. - - :param match_variables: Required. List of match variables. - :type match_variables: - list[~azure.mgmt.network.v2020_05_01.models.MatchVariable] - :param operator: Required. The operator to be matched. Possible values - include: 'IPMatch', 'Equal', 'Contains', 'LessThan', 'GreaterThan', - 'LessThanOrEqual', 'GreaterThanOrEqual', 'BeginsWith', 'EndsWith', - 'Regex', 'GeoMatch' - :type operator: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallOperator - :param negation_conditon: Whether this is negate condition or not. - :type negation_conditon: bool - :param match_values: Required. Match value. - :type match_values: list[str] - :param transforms: List of transforms. - :type transforms: list[str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallTransform] - """ - - _validation = { - 'match_variables': {'required': True}, - 'operator': {'required': True}, - 'match_values': {'required': True}, - } - - _attribute_map = { - 'match_variables': {'key': 'matchVariables', 'type': '[MatchVariable]'}, - 'operator': {'key': 'operator', 'type': 'str'}, - 'negation_conditon': {'key': 'negationConditon', 'type': 'bool'}, - 'match_values': {'key': 'matchValues', 'type': '[str]'}, - 'transforms': {'key': 'transforms', 'type': '[str]'}, - } - - def __init__(self, *, match_variables, operator, match_values, negation_conditon: bool=None, transforms=None, **kwargs) -> None: - super(MatchCondition, self).__init__(**kwargs) - self.match_variables = match_variables - self.operator = operator - self.negation_conditon = negation_conditon - self.match_values = match_values - self.transforms = transforms - - class MatchedRule(Model): """Matched rule. @@ -10610,35 +10350,6 @@ def __init__(self, *, rule_name: str=None, action: str=None, **kwargs) -> None: self.action = action -class MatchVariable(Model): - """Define match variables. - - All required parameters must be populated in order to send to Azure. - - :param variable_name: Required. Match Variable. Possible values include: - 'RemoteAddr', 'RequestMethod', 'QueryString', 'PostArgs', 'RequestUri', - 'RequestHeaders', 'RequestBody', 'RequestCookies' - :type variable_name: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallMatchVariable - :param selector: The selector of match variable. - :type selector: str - """ - - _validation = { - 'variable_name': {'required': True}, - } - - _attribute_map = { - 'variable_name': {'key': 'variableName', 'type': 'str'}, - 'selector': {'key': 'selector', 'type': 'str'}, - } - - def __init__(self, *, variable_name, selector: str=None, **kwargs) -> None: - super(MatchVariable, self).__init__(**kwargs) - self.variable_name = variable_name - self.selector = selector - - class MetricSpecification(Model): """Description of metrics specification. @@ -12220,47 +11931,6 @@ def __init__(self, *, frontend_ip_configurations, backend_address_pool, protocol self.type = None -class OwaspCrsExclusionEntry(Model): - """Allow to exclude some variable satisfy the condition for the WAF check. - - All required parameters must be populated in order to send to Azure. - - :param match_variable: Required. The variable to be excluded. Possible - values include: 'RequestHeaderNames', 'RequestCookieNames', - 'RequestArgNames' - :type match_variable: str or - ~azure.mgmt.network.v2020_05_01.models.OwaspCrsExclusionEntryMatchVariable - :param selector_match_operator: Required. When matchVariable is a - collection, operate on the selector to specify which elements in the - collection this exclusion applies to. Possible values include: 'Equals', - 'Contains', 'StartsWith', 'EndsWith', 'EqualsAny' - :type selector_match_operator: str or - ~azure.mgmt.network.v2020_05_01.models.OwaspCrsExclusionEntrySelectorMatchOperator - :param selector: Required. When matchVariable is a collection, operator - used to specify which elements in the collection this exclusion applies - to. - :type selector: str - """ - - _validation = { - 'match_variable': {'required': True}, - 'selector_match_operator': {'required': True}, - 'selector': {'required': True}, - } - - _attribute_map = { - 'match_variable': {'key': 'matchVariable', 'type': 'str'}, - 'selector_match_operator': {'key': 'selectorMatchOperator', 'type': 'str'}, - 'selector': {'key': 'selector', 'type': 'str'}, - } - - def __init__(self, *, match_variable, selector_match_operator, selector: str, **kwargs) -> None: - super(OwaspCrsExclusionEntry, self).__init__(**kwargs) - self.match_variable = match_variable - self.selector_match_operator = selector_match_operator - self.selector = selector - - class P2SConnectionConfiguration(SubResource): """P2SConnectionConfiguration Resource. @@ -12973,48 +12643,6 @@ def __init__(self, *, id: str=None, express_route_circuit_peering=None, peer_exp self.type = None -class PolicySettings(Model): - """Defines contents of a web application firewall global configuration. - - :param state: The state of the policy. Possible values include: - 'Disabled', 'Enabled' - :type state: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallEnabledState - :param mode: The mode of the policy. Possible values include: - 'Prevention', 'Detection' - :type mode: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallMode - :param request_body_check: Whether to allow WAF to check request Body. - :type request_body_check: bool - :param max_request_body_size_in_kb: Maximum request body size in Kb for - WAF. - :type max_request_body_size_in_kb: int - :param file_upload_limit_in_mb: Maximum file upload size in Mb for WAF. - :type file_upload_limit_in_mb: int - """ - - _validation = { - 'max_request_body_size_in_kb': {'maximum': 128, 'minimum': 8}, - 'file_upload_limit_in_mb': {'minimum': 0}, - } - - _attribute_map = { - 'state': {'key': 'state', 'type': 'str'}, - 'mode': {'key': 'mode', 'type': 'str'}, - 'request_body_check': {'key': 'requestBodyCheck', 'type': 'bool'}, - 'max_request_body_size_in_kb': {'key': 'maxRequestBodySizeInKb', 'type': 'int'}, - 'file_upload_limit_in_mb': {'key': 'fileUploadLimitInMb', 'type': 'int'}, - } - - def __init__(self, *, state=None, mode=None, request_body_check: bool=None, max_request_body_size_in_kb: int=None, file_upload_limit_in_mb: int=None, **kwargs) -> None: - super(PolicySettings, self).__init__(**kwargs) - self.state = state - self.mode = mode - self.request_body_check = request_body_check - self.max_request_body_size_in_kb = max_request_body_size_in_kb - self.file_upload_limit_in_mb = file_upload_limit_in_mb - - class PrepareNetworkPoliciesRequest(Model): """Details of PrepareNetworkPolicies for Subnet. @@ -18858,157 +18486,3 @@ def __init__(self, *, id: str=None, vpn_site_link=None, routing_weight: int=None self.name = name self.etag = None self.type = None - - -class WebApplicationFirewallCustomRule(Model): - """Defines contents of a web application rule. - - Variables are only populated by the server, and will be ignored when - sending a request. - - All required parameters must be populated in order to send to Azure. - - :param name: The name of the resource that is unique within a policy. This - name can be used to access the resource. - :type name: str - :ivar etag: A unique read-only string that changes whenever the resource - is updated. - :vartype etag: str - :param priority: Required. Priority of the rule. Rules with a lower value - will be evaluated before rules with a higher value. - :type priority: int - :param rule_type: Required. The rule type. Possible values include: - 'MatchRule', 'Invalid' - :type rule_type: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallRuleType - :param match_conditions: Required. List of match conditions. - :type match_conditions: - list[~azure.mgmt.network.v2020_05_01.models.MatchCondition] - :param action: Required. Type of Actions. Possible values include: - 'Allow', 'Block', 'Log' - :type action: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallAction - """ - - _validation = { - 'name': {'max_length': 128}, - 'etag': {'readonly': True}, - 'priority': {'required': True}, - 'rule_type': {'required': True}, - 'match_conditions': {'required': True}, - 'action': {'required': True}, - } - - _attribute_map = { - 'name': {'key': 'name', 'type': 'str'}, - 'etag': {'key': 'etag', 'type': 'str'}, - 'priority': {'key': 'priority', 'type': 'int'}, - 'rule_type': {'key': 'ruleType', 'type': 'str'}, - 'match_conditions': {'key': 'matchConditions', 'type': '[MatchCondition]'}, - 'action': {'key': 'action', 'type': 'str'}, - } - - def __init__(self, *, priority: int, rule_type, match_conditions, action, name: str=None, **kwargs) -> None: - super(WebApplicationFirewallCustomRule, self).__init__(**kwargs) - self.name = name - self.etag = None - self.priority = priority - self.rule_type = rule_type - self.match_conditions = match_conditions - self.action = action - - -class WebApplicationFirewallPolicy(Resource): - """Defines web application firewall policy. - - Variables are only populated by the server, and will be ignored when - sending a request. - - All required parameters must be populated in order to send to Azure. - - :param id: Resource ID. - :type id: str - :ivar name: Resource name. - :vartype name: str - :ivar type: Resource type. - :vartype type: str - :param location: Resource location. - :type location: str - :param tags: Resource tags. - :type tags: dict[str, str] - :param policy_settings: The PolicySettings for policy. - :type policy_settings: - ~azure.mgmt.network.v2020_05_01.models.PolicySettings - :param custom_rules: The custom rules inside the policy. - :type custom_rules: - list[~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallCustomRule] - :ivar application_gateways: A collection of references to application - gateways. - :vartype application_gateways: - list[~azure.mgmt.network.v2020_05_01.models.ApplicationGateway] - :ivar provisioning_state: The provisioning state of the web application - firewall policy resource. Possible values include: 'Succeeded', - 'Updating', 'Deleting', 'Failed' - :vartype provisioning_state: str or - ~azure.mgmt.network.v2020_05_01.models.ProvisioningState - :ivar resource_state: Resource status of the policy. Resource status of - the policy. Possible values include: 'Creating', 'Enabling', 'Enabled', - 'Disabling', 'Disabled', 'Deleting' - :vartype resource_state: str or - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallPolicyResourceState - :param managed_rules: Required. Describes the managedRules structure. - :type managed_rules: - ~azure.mgmt.network.v2020_05_01.models.ManagedRulesDefinition - :ivar http_listeners: A collection of references to application gateway - http listeners. - :vartype http_listeners: - list[~azure.mgmt.network.v2020_05_01.models.SubResource] - :ivar path_based_rules: A collection of references to application gateway - path rules. - :vartype path_based_rules: - list[~azure.mgmt.network.v2020_05_01.models.SubResource] - :ivar etag: A unique read-only string that changes whenever the resource - is updated. - :vartype etag: str - """ - - _validation = { - 'name': {'readonly': True}, - 'type': {'readonly': True}, - 'application_gateways': {'readonly': True}, - 'provisioning_state': {'readonly': True}, - 'resource_state': {'readonly': True}, - 'managed_rules': {'required': True}, - 'http_listeners': {'readonly': True}, - 'path_based_rules': {'readonly': True}, - 'etag': {'readonly': True}, - } - - _attribute_map = { - 'id': {'key': 'id', 'type': 'str'}, - 'name': {'key': 'name', 'type': 'str'}, - 'type': {'key': 'type', 'type': 'str'}, - 'location': {'key': 'location', 'type': 'str'}, - 'tags': {'key': 'tags', 'type': '{str}'}, - 'policy_settings': {'key': 'properties.policySettings', 'type': 'PolicySettings'}, - 'custom_rules': {'key': 'properties.customRules', 'type': '[WebApplicationFirewallCustomRule]'}, - 'application_gateways': {'key': 'properties.applicationGateways', 'type': '[ApplicationGateway]'}, - 'provisioning_state': {'key': 'properties.provisioningState', 'type': 'str'}, - 'resource_state': {'key': 'properties.resourceState', 'type': 'str'}, - 'managed_rules': {'key': 'properties.managedRules', 'type': 'ManagedRulesDefinition'}, - 'http_listeners': {'key': 'properties.httpListeners', 'type': '[SubResource]'}, - 'path_based_rules': {'key': 'properties.pathBasedRules', 'type': '[SubResource]'}, - 'etag': {'key': 'etag', 'type': 'str'}, - } - - def __init__(self, *, managed_rules, id: str=None, location: str=None, tags=None, policy_settings=None, custom_rules=None, **kwargs) -> None: - super(WebApplicationFirewallPolicy, self).__init__(id=id, location=location, tags=tags, **kwargs) - self.policy_settings = policy_settings - self.custom_rules = custom_rules - self.application_gateways = None - self.provisioning_state = None - self.resource_state = None - self.managed_rules = managed_rules - self.http_listeners = None - self.path_based_rules = None - self.etag = None diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_network_management_client_enums.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_network_management_client_enums.py index 72a0f1492b24..06d320891c96 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_network_management_client_enums.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_network_management_client_enums.py @@ -374,12 +374,6 @@ class ExpressRoutePortsEncapsulation(str, Enum): qin_q = "QinQ" -class FirewallPolicyIntrusionSystemMode(str, Enum): - - enabled = "Enabled" - disabled = "Disabled" - - class FirewallPolicyNatRuleCollectionActionType(str, Enum): dnat = "DNAT" @@ -917,96 +911,3 @@ class VpnAuthenticationType(str, Enum): certificate = "Certificate" radius = "Radius" aad = "AAD" - - -class WebApplicationFirewallEnabledState(str, Enum): - - disabled = "Disabled" - enabled = "Enabled" - - -class WebApplicationFirewallMode(str, Enum): - - prevention = "Prevention" - detection = "Detection" - - -class WebApplicationFirewallRuleType(str, Enum): - - match_rule = "MatchRule" - invalid = "Invalid" - - -class WebApplicationFirewallMatchVariable(str, Enum): - - remote_addr = "RemoteAddr" - request_method = "RequestMethod" - query_string = "QueryString" - post_args = "PostArgs" - request_uri = "RequestUri" - request_headers = "RequestHeaders" - request_body = "RequestBody" - request_cookies = "RequestCookies" - - -class WebApplicationFirewallOperator(str, Enum): - - ip_match = "IPMatch" - equal = "Equal" - contains = "Contains" - less_than = "LessThan" - greater_than = "GreaterThan" - less_than_or_equal = "LessThanOrEqual" - greater_than_or_equal = "GreaterThanOrEqual" - begins_with = "BeginsWith" - ends_with = "EndsWith" - regex = "Regex" - geo_match = "GeoMatch" - - -class WebApplicationFirewallTransform(str, Enum): - - lowercase = "Lowercase" - trim = "Trim" - url_decode = "UrlDecode" - url_encode = "UrlEncode" - remove_nulls = "RemoveNulls" - html_entity_decode = "HtmlEntityDecode" - - -class WebApplicationFirewallAction(str, Enum): - - allow = "Allow" - block = "Block" - log = "Log" - - -class WebApplicationFirewallPolicyResourceState(str, Enum): - - creating = "Creating" - enabling = "Enabling" - enabled = "Enabled" - disabling = "Disabling" - disabled = "Disabled" - deleting = "Deleting" - - -class OwaspCrsExclusionEntryMatchVariable(str, Enum): - - request_header_names = "RequestHeaderNames" - request_cookie_names = "RequestCookieNames" - request_arg_names = "RequestArgNames" - - -class OwaspCrsExclusionEntrySelectorMatchOperator(str, Enum): - - equals = "Equals" - contains = "Contains" - starts_with = "StartsWith" - ends_with = "EndsWith" - equals_any = "EqualsAny" - - -class ManagedRuleEnabledState(str, Enum): - - disabled = "Disabled" diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_paged_models.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_paged_models.py index 24a2bb5817fd..f4083ccd5fd0 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_paged_models.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/models/_paged_models.py @@ -1221,16 +1221,3 @@ class HubRouteTablePaged(Paged): def __init__(self, *args, **kwargs): super(HubRouteTablePaged, self).__init__(*args, **kwargs) -class WebApplicationFirewallPolicyPaged(Paged): - """ - A paging container for iterating over a list of :class:`WebApplicationFirewallPolicy ` object - """ - - _attribute_map = { - 'next_link': {'key': 'nextLink', 'type': 'str'}, - 'current_page': {'key': 'value', 'type': '[WebApplicationFirewallPolicy]'} - } - - def __init__(self, *args, **kwargs): - - super(WebApplicationFirewallPolicyPaged, self).__init__(*args, **kwargs) diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/__init__.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/__init__.py index 93a017328686..2ef4ef8ff9e5 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/__init__.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/__init__.py @@ -109,7 +109,6 @@ from ._virtual_hub_bgp_connections_operations import VirtualHubBgpConnectionsOperations from ._virtual_hub_ip_configuration_operations import VirtualHubIpConfigurationOperations from ._hub_route_tables_operations import HubRouteTablesOperations -from ._web_application_firewall_policies_operations import WebApplicationFirewallPoliciesOperations from ._network_management_client_operations import NetworkManagementClientOperationsMixin __all__ = [ @@ -213,6 +212,5 @@ 'VirtualHubBgpConnectionsOperations', 'VirtualHubIpConfigurationOperations', 'HubRouteTablesOperations', - 'WebApplicationFirewallPoliciesOperations', 'NetworkManagementClientOperationsMixin', ] diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/_public_ip_addresses_operations.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/_public_ip_addresses_operations.py index 764b91d70eac..888b1d4f47fe 100644 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/_public_ip_addresses_operations.py +++ b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/_public_ip_addresses_operations.py @@ -85,7 +85,7 @@ def delete( :param resource_group_name: The name of the resource group. :type resource_group_name: str - :param public_ip_address_name: The name of the subnet. + :param public_ip_address_name: The name of the public IP address. :type public_ip_address_name: str :param dict custom_headers: headers that will be added to the request :param bool raw: The poller return type is ClientRawResponse, the @@ -126,7 +126,7 @@ def get( :param resource_group_name: The name of the resource group. :type resource_group_name: str - :param public_ip_address_name: The name of the subnet. + :param public_ip_address_name: The name of the public IP address. :type public_ip_address_name: str :param expand: Expands referenced resources. :type expand: str diff --git a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/_web_application_firewall_policies_operations.py b/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/_web_application_firewall_policies_operations.py deleted file mode 100644 index 84499987293a..000000000000 --- a/sdk/network/azure-mgmt-network/azure/mgmt/network/v2020_05_01/operations/_web_application_firewall_policies_operations.py +++ /dev/null @@ -1,390 +0,0 @@ -# coding=utf-8 -# -------------------------------------------------------------------------- -# Copyright (c) Microsoft Corporation. All rights reserved. -# Licensed under the MIT License. See License.txt in the project root for -# license information. -# -# Code generated by Microsoft (R) AutoRest Code Generator. -# Changes may cause incorrect behavior and will be lost if the code is -# regenerated. -# -------------------------------------------------------------------------- - -import uuid -from msrest.pipeline import ClientRawResponse -from msrestazure.azure_exceptions import CloudError -from msrest.polling import LROPoller, NoPolling -from msrestazure.polling.arm_polling import ARMPolling - -from .. import models - - -class WebApplicationFirewallPoliciesOperations(object): - """WebApplicationFirewallPoliciesOperations operations. - - You should not instantiate directly this class, but create a Client instance that will create it for you and attach it as attribute. - - :param client: Client for service requests. - :param config: Configuration of service client. - :param serializer: An object model serializer. - :param deserializer: An object model deserializer. - :ivar api_version: Client API version. Constant value: "2020-05-01". - """ - - models = models - - def __init__(self, client, config, serializer, deserializer): - - self._client = client - self._serialize = serializer - self._deserialize = deserializer - self.api_version = "2020-05-01" - - self.config = config - - def list( - self, resource_group_name, custom_headers=None, raw=False, **operation_config): - """Lists all of the protection policies within a resource group. - - :param resource_group_name: The name of the resource group. - :type resource_group_name: str - :param dict custom_headers: headers that will be added to the request - :param bool raw: returns the direct response alongside the - deserialized response - :param operation_config: :ref:`Operation configuration - overrides`. - :return: An iterator like instance of WebApplicationFirewallPolicy - :rtype: - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallPolicyPaged[~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallPolicy] - :raises: :class:`CloudError` - """ - def prepare_request(next_link=None): - if not next_link: - # Construct URL - url = self.list.metadata['url'] - path_format_arguments = { - 'resourceGroupName': self._serialize.url("resource_group_name", resource_group_name, 'str'), - 'subscriptionId': self._serialize.url("self.config.subscription_id", self.config.subscription_id, 'str') - } - url = self._client.format_url(url, **path_format_arguments) - - # Construct parameters - query_parameters = {} - query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') - - else: - url = next_link - query_parameters = {} - - # Construct headers - header_parameters = {} - header_parameters['Accept'] = 'application/json' - if self.config.generate_client_request_id: - header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) - if custom_headers: - header_parameters.update(custom_headers) - if self.config.accept_language is not None: - header_parameters['accept-language'] = self._serialize.header("self.config.accept_language", self.config.accept_language, 'str') - - # Construct and send request - request = self._client.get(url, query_parameters, header_parameters) - return request - - def internal_paging(next_link=None): - request = prepare_request(next_link) - - response = self._client.send(request, stream=False, **operation_config) - - if response.status_code not in [200]: - exp = CloudError(response) - exp.request_id = response.headers.get('x-ms-request-id') - raise exp - - return response - - # Deserialize response - header_dict = None - if raw: - header_dict = {} - deserialized = models.WebApplicationFirewallPolicyPaged(internal_paging, self._deserialize.dependencies, header_dict) - - return deserialized - list.metadata = {'url': '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies'} - - def list_all( - self, custom_headers=None, raw=False, **operation_config): - """Gets all the WAF policies in a subscription. - - :param dict custom_headers: headers that will be added to the request - :param bool raw: returns the direct response alongside the - deserialized response - :param operation_config: :ref:`Operation configuration - overrides`. - :return: An iterator like instance of WebApplicationFirewallPolicy - :rtype: - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallPolicyPaged[~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallPolicy] - :raises: :class:`CloudError` - """ - def prepare_request(next_link=None): - if not next_link: - # Construct URL - url = self.list_all.metadata['url'] - path_format_arguments = { - 'subscriptionId': self._serialize.url("self.config.subscription_id", self.config.subscription_id, 'str') - } - url = self._client.format_url(url, **path_format_arguments) - - # Construct parameters - query_parameters = {} - query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') - - else: - url = next_link - query_parameters = {} - - # Construct headers - header_parameters = {} - header_parameters['Accept'] = 'application/json' - if self.config.generate_client_request_id: - header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) - if custom_headers: - header_parameters.update(custom_headers) - if self.config.accept_language is not None: - header_parameters['accept-language'] = self._serialize.header("self.config.accept_language", self.config.accept_language, 'str') - - # Construct and send request - request = self._client.get(url, query_parameters, header_parameters) - return request - - def internal_paging(next_link=None): - request = prepare_request(next_link) - - response = self._client.send(request, stream=False, **operation_config) - - if response.status_code not in [200]: - exp = CloudError(response) - exp.request_id = response.headers.get('x-ms-request-id') - raise exp - - return response - - # Deserialize response - header_dict = None - if raw: - header_dict = {} - deserialized = models.WebApplicationFirewallPolicyPaged(internal_paging, self._deserialize.dependencies, header_dict) - - return deserialized - list_all.metadata = {'url': '/subscriptions/{subscriptionId}/providers/Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies'} - - def get( - self, resource_group_name, policy_name, custom_headers=None, raw=False, **operation_config): - """Retrieve protection policy with specified name within a resource group. - - :param resource_group_name: The name of the resource group. - :type resource_group_name: str - :param policy_name: The name of the policy. - :type policy_name: str - :param dict custom_headers: headers that will be added to the request - :param bool raw: returns the direct response alongside the - deserialized response - :param operation_config: :ref:`Operation configuration - overrides`. - :return: WebApplicationFirewallPolicy or ClientRawResponse if raw=true - :rtype: - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallPolicy or - ~msrest.pipeline.ClientRawResponse - :raises: :class:`CloudError` - """ - # Construct URL - url = self.get.metadata['url'] - path_format_arguments = { - 'resourceGroupName': self._serialize.url("resource_group_name", resource_group_name, 'str'), - 'policyName': self._serialize.url("policy_name", policy_name, 'str', max_length=128), - 'subscriptionId': self._serialize.url("self.config.subscription_id", self.config.subscription_id, 'str') - } - url = self._client.format_url(url, **path_format_arguments) - - # Construct parameters - query_parameters = {} - query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') - - # Construct headers - header_parameters = {} - header_parameters['Accept'] = 'application/json' - if self.config.generate_client_request_id: - header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) - if custom_headers: - header_parameters.update(custom_headers) - if self.config.accept_language is not None: - header_parameters['accept-language'] = self._serialize.header("self.config.accept_language", self.config.accept_language, 'str') - - # Construct and send request - request = self._client.get(url, query_parameters, header_parameters) - response = self._client.send(request, stream=False, **operation_config) - - if response.status_code not in [200]: - exp = CloudError(response) - exp.request_id = response.headers.get('x-ms-request-id') - raise exp - - deserialized = None - if response.status_code == 200: - deserialized = self._deserialize('WebApplicationFirewallPolicy', response) - - if raw: - client_raw_response = ClientRawResponse(deserialized, response) - return client_raw_response - - return deserialized - get.metadata = {'url': '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies/{policyName}'} - - def create_or_update( - self, resource_group_name, policy_name, parameters, custom_headers=None, raw=False, **operation_config): - """Creates or update policy with specified rule set name within a resource - group. - - :param resource_group_name: The name of the resource group. - :type resource_group_name: str - :param policy_name: The name of the policy. - :type policy_name: str - :param parameters: Policy to be created. - :type parameters: - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallPolicy - :param dict custom_headers: headers that will be added to the request - :param bool raw: returns the direct response alongside the - deserialized response - :param operation_config: :ref:`Operation configuration - overrides`. - :return: WebApplicationFirewallPolicy or ClientRawResponse if raw=true - :rtype: - ~azure.mgmt.network.v2020_05_01.models.WebApplicationFirewallPolicy or - ~msrest.pipeline.ClientRawResponse - :raises: :class:`CloudError` - """ - # Construct URL - url = self.create_or_update.metadata['url'] - path_format_arguments = { - 'resourceGroupName': self._serialize.url("resource_group_name", resource_group_name, 'str'), - 'policyName': self._serialize.url("policy_name", policy_name, 'str', max_length=128), - 'subscriptionId': self._serialize.url("self.config.subscription_id", self.config.subscription_id, 'str') - } - url = self._client.format_url(url, **path_format_arguments) - - # Construct parameters - query_parameters = {} - query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') - - # Construct headers - header_parameters = {} - header_parameters['Accept'] = 'application/json' - header_parameters['Content-Type'] = 'application/json; charset=utf-8' - if self.config.generate_client_request_id: - header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) - if custom_headers: - header_parameters.update(custom_headers) - if self.config.accept_language is not None: - header_parameters['accept-language'] = self._serialize.header("self.config.accept_language", self.config.accept_language, 'str') - - # Construct body - body_content = self._serialize.body(parameters, 'WebApplicationFirewallPolicy') - - # Construct and send request - request = self._client.put(url, query_parameters, header_parameters, body_content) - response = self._client.send(request, stream=False, **operation_config) - - if response.status_code not in [200, 201]: - exp = CloudError(response) - exp.request_id = response.headers.get('x-ms-request-id') - raise exp - - deserialized = None - if response.status_code == 200: - deserialized = self._deserialize('WebApplicationFirewallPolicy', response) - if response.status_code == 201: - deserialized = self._deserialize('WebApplicationFirewallPolicy', response) - - if raw: - client_raw_response = ClientRawResponse(deserialized, response) - return client_raw_response - - return deserialized - create_or_update.metadata = {'url': '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies/{policyName}'} - - - def _delete_initial( - self, resource_group_name, policy_name, custom_headers=None, raw=False, **operation_config): - # Construct URL - url = self.delete.metadata['url'] - path_format_arguments = { - 'resourceGroupName': self._serialize.url("resource_group_name", resource_group_name, 'str'), - 'policyName': self._serialize.url("policy_name", policy_name, 'str', max_length=128), - 'subscriptionId': self._serialize.url("self.config.subscription_id", self.config.subscription_id, 'str') - } - url = self._client.format_url(url, **path_format_arguments) - - # Construct parameters - query_parameters = {} - query_parameters['api-version'] = self._serialize.query("self.api_version", self.api_version, 'str') - - # Construct headers - header_parameters = {} - if self.config.generate_client_request_id: - header_parameters['x-ms-client-request-id'] = str(uuid.uuid1()) - if custom_headers: - header_parameters.update(custom_headers) - if self.config.accept_language is not None: - header_parameters['accept-language'] = self._serialize.header("self.config.accept_language", self.config.accept_language, 'str') - - # Construct and send request - request = self._client.delete(url, query_parameters, header_parameters) - response = self._client.send(request, stream=False, **operation_config) - - if response.status_code not in [200, 202, 204]: - exp = CloudError(response) - exp.request_id = response.headers.get('x-ms-request-id') - raise exp - - if raw: - client_raw_response = ClientRawResponse(None, response) - return client_raw_response - - def delete( - self, resource_group_name, policy_name, custom_headers=None, raw=False, polling=True, **operation_config): - """Deletes Policy. - - :param resource_group_name: The name of the resource group. - :type resource_group_name: str - :param policy_name: The name of the policy. - :type policy_name: str - :param dict custom_headers: headers that will be added to the request - :param bool raw: The poller return type is ClientRawResponse, the - direct response alongside the deserialized response - :param polling: True for ARMPolling, False for no polling, or a - polling object for personal polling strategy - :return: An instance of LROPoller that returns None or - ClientRawResponse if raw==True - :rtype: ~msrestazure.azure_operation.AzureOperationPoller[None] or - ~msrestazure.azure_operation.AzureOperationPoller[~msrest.pipeline.ClientRawResponse[None]] - :raises: :class:`CloudError` - """ - raw_result = self._delete_initial( - resource_group_name=resource_group_name, - policy_name=policy_name, - custom_headers=custom_headers, - raw=True, - **operation_config - ) - - def get_long_running_output(response): - if raw: - client_raw_response = ClientRawResponse(None, response) - return client_raw_response - - lro_delay = operation_config.get( - 'long_running_operation_timeout', - self.config.long_running_operation_timeout) - if polling is True: polling_method = ARMPolling(lro_delay, **operation_config) - elif polling is False: polling_method = NoPolling() - else: polling_method = polling - return LROPoller(self._client, raw_result, get_long_running_output, polling_method) - delete.metadata = {'url': '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/ApplicationGatewayWebApplicationFirewallPolicies/{policyName}'}