@pulumi/azure-native 1.78.0 → 1.79.0-alpha.1663226586
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/compute/disk.js +2 -2
- package/compute/diskAccess.js +2 -2
- package/compute/diskAccessAPrivateEndpointConnection.js +2 -2
- package/compute/diskEncryptionSet.js +2 -2
- package/compute/index.d.ts +2 -1
- package/compute/index.js +4 -2
- package/compute/snapshot.js +2 -2
- package/compute/v20160430preview/disk.js +2 -2
- package/compute/v20160430preview/snapshot.js +2 -2
- package/compute/v20170330/disk.js +2 -2
- package/compute/v20170330/snapshot.js +2 -2
- package/compute/v20180401/disk.js +2 -2
- package/compute/v20180401/snapshot.js +2 -2
- package/compute/v20180601/disk.js +2 -2
- package/compute/v20180601/snapshot.js +2 -2
- package/compute/v20180930/disk.js +2 -2
- package/compute/v20180930/snapshot.js +2 -2
- package/compute/v20190301/disk.js +2 -2
- package/compute/v20190301/snapshot.js +2 -2
- package/compute/v20190701/disk.js +2 -2
- package/compute/v20190701/diskEncryptionSet.js +2 -2
- package/compute/v20190701/snapshot.js +2 -2
- package/compute/v20191101/disk.js +2 -2
- package/compute/v20191101/diskEncryptionSet.js +2 -2
- package/compute/v20191101/snapshot.js +2 -2
- package/compute/v20200501/disk.js +2 -2
- package/compute/v20200501/diskAccess.js +2 -2
- package/compute/v20200501/diskEncryptionSet.js +2 -2
- package/compute/v20200501/snapshot.js +2 -2
- package/compute/v20200630/disk.js +2 -2
- package/compute/v20200630/diskAccess.js +2 -2
- package/compute/v20200630/diskEncryptionSet.js +2 -2
- package/compute/v20200630/snapshot.js +2 -2
- package/compute/v20200930/disk.js +2 -2
- package/compute/v20200930/diskAccess.js +2 -2
- package/compute/v20200930/diskAccessAPrivateEndpointConnection.js +2 -2
- package/compute/v20200930/diskEncryptionSet.js +2 -2
- package/compute/v20200930/snapshot.js +2 -2
- package/compute/v20201201/disk.js +2 -2
- package/compute/v20201201/diskAccess.js +2 -2
- package/compute/v20201201/diskAccessAPrivateEndpointConnection.js +2 -2
- package/compute/v20201201/diskEncryptionSet.js +2 -2
- package/compute/v20201201/snapshot.js +2 -2
- package/compute/v20210401/disk.js +2 -2
- package/compute/v20210401/diskAccess.js +2 -2
- package/compute/v20210401/diskAccessAPrivateEndpointConnection.js +2 -2
- package/compute/v20210401/diskEncryptionSet.js +2 -2
- package/compute/v20210401/snapshot.js +2 -2
- package/compute/v20210801/disk.js +2 -2
- package/compute/v20210801/diskAccess.js +2 -2
- package/compute/v20210801/diskAccessAPrivateEndpointConnection.js +2 -2
- package/compute/v20210801/diskEncryptionSet.js +2 -2
- package/compute/v20210801/snapshot.js +2 -2
- package/compute/v20211201/disk.js +2 -2
- package/compute/v20211201/diskAccess.js +2 -2
- package/compute/v20211201/diskAccessAPrivateEndpointConnection.js +2 -2
- package/compute/v20211201/diskEncryptionSet.js +2 -2
- package/compute/v20211201/snapshot.js +2 -2
- package/compute/v20220302/disk.js +2 -2
- package/compute/v20220302/diskAccess.js +2 -2
- package/compute/v20220302/diskAccessAPrivateEndpointConnection.js +2 -2
- package/compute/v20220302/diskEncryptionSet.js +2 -2
- package/compute/v20220302/snapshot.js +2 -2
- package/compute/v20220702/disk.d.ts +320 -0
- package/compute/v20220702/disk.js +144 -0
- package/compute/v20220702/diskAccess.d.ts +91 -0
- package/compute/v20220702/diskAccess.js +77 -0
- package/compute/v20220702/diskAccessAPrivateEndpointConnection.d.ts +71 -0
- package/compute/v20220702/diskAccessAPrivateEndpointConnection.js +78 -0
- package/compute/v20220702/diskEncryptionSet.d.ts +128 -0
- package/compute/v20220702/diskEncryptionSet.js +87 -0
- package/compute/v20220702/getDisk.d.ts +198 -0
- package/compute/v20220702/getDisk.js +26 -0
- package/compute/v20220702/getDiskAccess.d.ts +70 -0
- package/compute/v20220702/getDiskAccess.js +26 -0
- package/compute/v20220702/getDiskAccessAPrivateEndpointConnection.d.ts +64 -0
- package/compute/v20220702/getDiskAccessAPrivateEndpointConnection.js +27 -0
- package/compute/v20220702/getDiskEncryptionSet.d.ts +90 -0
- package/compute/v20220702/getDiskEncryptionSet.js +26 -0
- package/compute/v20220702/getSnapshot.d.ts +158 -0
- package/compute/v20220702/getSnapshot.js +26 -0
- package/compute/v20220702/index.d.ts +31 -0
- package/compute/v20220702/index.js +69 -0
- package/compute/v20220702/snapshot.d.ts +252 -0
- package/compute/v20220702/snapshot.js +124 -0
- package/costmanagement/index.d.ts +2 -1
- package/costmanagement/index.js +4 -2
- package/costmanagement/v20190401preview/view.js +2 -2
- package/costmanagement/v20190401preview/viewByScope.js +2 -2
- package/costmanagement/v20191101/view.js +2 -2
- package/costmanagement/v20191101/viewByScope.js +2 -2
- package/costmanagement/v20200601/view.js +2 -2
- package/costmanagement/v20200601/viewByScope.js +2 -2
- package/costmanagement/v20211001/view.js +2 -2
- package/costmanagement/v20211001/viewByScope.js +2 -2
- package/costmanagement/v20220801preview/view.js +2 -2
- package/costmanagement/v20220801preview/viewByScope.js +2 -2
- package/costmanagement/v20221001preview/getSettingByScope.d.ts +52 -0
- package/costmanagement/v20221001preview/getSettingByScope.js +28 -0
- package/costmanagement/v20221001preview/getTagInheritanceSetting.d.ts +57 -0
- package/costmanagement/v20221001preview/getTagInheritanceSetting.js +26 -0
- package/costmanagement/v20221001preview/getView.d.ts +100 -0
- package/costmanagement/v20221001preview/getView.js +25 -0
- package/costmanagement/v20221001preview/getViewByScope.d.ts +108 -0
- package/costmanagement/v20221001preview/getViewByScope.js +26 -0
- package/costmanagement/v20221001preview/index.d.ts +25 -0
- package/costmanagement/v20221001preview/index.js +62 -0
- package/costmanagement/v20221001preview/settingByScope.d.ts +69 -0
- package/costmanagement/v20221001preview/settingByScope.js +74 -0
- package/costmanagement/v20221001preview/tagInheritanceSetting.d.ts +77 -0
- package/costmanagement/v20221001preview/tagInheritanceSetting.js +71 -0
- package/costmanagement/v20221001preview/view.d.ts +164 -0
- package/costmanagement/v20221001preview/view.js +99 -0
- package/costmanagement/v20221001preview/viewByScope.d.ts +164 -0
- package/costmanagement/v20221001preview/viewByScope.js +102 -0
- package/costmanagement/view.js +2 -2
- package/costmanagement/viewByScope.js +2 -2
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/types/enums/compute/index.d.ts +2 -1
- package/types/enums/compute/index.js +5 -3
- package/types/enums/compute/v20220702/index.d.ts +262 -0
- package/types/enums/compute/v20220702/index.js +204 -0
- package/types/enums/costmanagement/index.d.ts +2 -1
- package/types/enums/costmanagement/index.js +4 -2
- package/types/enums/costmanagement/v20221001preview/index.d.ts +107 -0
- package/types/enums/costmanagement/v20221001preview/index.js +61 -0
- package/types/input.d.ts +457 -0
- package/types/input.js +1 -1
- package/types/output.d.ts +595 -0
- package/types/output.js +1 -1
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/azure-native",
|
|
3
|
-
"version": "v1.
|
|
3
|
+
"version": "v1.79.0-alpha.1663226586+d64c5f4c",
|
|
4
4
|
"keywords": [
|
|
5
5
|
"pulumi",
|
|
6
6
|
"azure",
|
|
@@ -13,7 +13,7 @@
|
|
|
13
13
|
"license": "Apache-2.0",
|
|
14
14
|
"scripts": {
|
|
15
15
|
"build": "tsc",
|
|
16
|
-
"install": "node scripts/install-pulumi-plugin.js resource azure-native v1.
|
|
16
|
+
"install": "node scripts/install-pulumi-plugin.js resource azure-native v1.79.0-alpha.1663226586+d64c5f4c"
|
|
17
17
|
},
|
|
18
18
|
"dependencies": {
|
|
19
19
|
"@pulumi/pulumi": "^3.0.0"
|
package/package.json.dev
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/azure-native",
|
|
3
|
-
"version": "v1.
|
|
3
|
+
"version": "v1.79.0-alpha.1663226586+d64c5f4c",
|
|
4
4
|
"keywords": [
|
|
5
5
|
"pulumi",
|
|
6
6
|
"azure",
|
|
@@ -13,7 +13,7 @@
|
|
|
13
13
|
"license": "Apache-2.0",
|
|
14
14
|
"scripts": {
|
|
15
15
|
"build": "tsc",
|
|
16
|
-
"install": "node scripts/install-pulumi-plugin.js resource azure-native v1.
|
|
16
|
+
"install": "node scripts/install-pulumi-plugin.js resource azure-native v1.79.0-alpha.1663226586+d64c5f4c"
|
|
17
17
|
},
|
|
18
18
|
"dependencies": {
|
|
19
19
|
"@pulumi/pulumi": "^3.0.0"
|
|
@@ -28,7 +28,8 @@ import * as v20220103 from "./v20220103";
|
|
|
28
28
|
import * as v20220301 from "./v20220301";
|
|
29
29
|
import * as v20220302 from "./v20220302";
|
|
30
30
|
import * as v20220404 from "./v20220404";
|
|
31
|
-
|
|
31
|
+
import * as v20220702 from "./v20220702";
|
|
32
|
+
export { v20150615, v20160330, v20160430preview, v20170330, v20171201, v20180401, v20180601, v20180930, v20181001, v20190301, v20190701, v20191101, v20191201, v20200501, v20200601, v20200630, v20200930, v20201001preview, v20201201, v20210301, v20210401, v20210701, v20210801, v20211001, v20211101, v20211201, v20220103, v20220301, v20220302, v20220404, v20220702, };
|
|
32
33
|
export declare const CachingTypes: {
|
|
33
34
|
readonly None: "None";
|
|
34
35
|
readonly ReadOnly: "ReadOnly";
|
|
@@ -2,8 +2,8 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi SDK Generator. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
-
exports.
|
|
6
|
-
exports.WindowsVMGuestPatchMode = exports.WindowsPatchAssessmentMode = exports.VirtualMachineSizeTypes = exports.VirtualMachineScaleSetScaleInRules = exports.VirtualMachinePriorityTypes = exports.VirtualMachineEvictionPolicyTypes = exports.UpgradeMode = exports.StorageAccountTypes = exports.StorageAccountType = exports.StatusLevelTypes = exports.SnapshotStorageAccountTypes = exports.SettingNames = exports.SecurityTypes = exports.ResourceIdentityType = exports.PublicIPAllocationMethod = exports.PublicIPAddressSkuTier = exports.PublicIPAddressSkuName = exports.ProximityPlacementGroupType = exports.ProtocolTypes = exports.PrivateEndpointServiceConnectionStatus = exports.PassNames = exports.OrchestrationMode = exports.OperatingSystemTypes = exports.OperatingSystemStateTypes = exports.NetworkApiVersion = exports.NetworkAccessPolicy = exports.LinuxVMGuestPatchMode = exports.LinuxPatchAssessmentMode = exports.IntervalInMins = exports.IPVersions = exports.IPVersion = exports.HyperVGenerationTypes = void 0;
|
|
5
|
+
exports.HostCaching = exports.GallerySharingPermissionTypes = exports.ExtendedLocationTypes = exports.EncryptionType = exports.DiskStorageAccountTypes = exports.DiskSecurityTypes = exports.DiskEncryptionSetType = exports.DiskEncryptionSetIdentityType = exports.DiskDetachOptionTypes = exports.DiskDeleteOptionTypes = exports.DiskCreateOptionTypes = exports.DiskCreateOption = exports.DiffDiskPlacement = exports.DiffDiskOptions = exports.DeleteOptions = exports.DedicatedHostLicenseTypes = exports.ComponentNames = exports.CloudServiceUpgradeMode = exports.CachingTypes = exports.v20220702 = exports.v20220404 = exports.v20220302 = exports.v20220301 = exports.v20220103 = exports.v20211201 = exports.v20211101 = exports.v20211001 = exports.v20210801 = exports.v20210701 = exports.v20210401 = exports.v20210301 = exports.v20201201 = exports.v20201001preview = exports.v20200930 = exports.v20200630 = exports.v20200601 = exports.v20200501 = exports.v20191201 = exports.v20191101 = exports.v20190701 = exports.v20190301 = exports.v20181001 = exports.v20180930 = exports.v20180601 = exports.v20180401 = exports.v20171201 = exports.v20170330 = exports.v20160430preview = exports.v20160330 = exports.v20150615 = void 0;
|
|
6
|
+
exports.WindowsVMGuestPatchMode = exports.WindowsPatchAssessmentMode = exports.VirtualMachineSizeTypes = exports.VirtualMachineScaleSetScaleInRules = exports.VirtualMachinePriorityTypes = exports.VirtualMachineEvictionPolicyTypes = exports.UpgradeMode = exports.StorageAccountTypes = exports.StorageAccountType = exports.StatusLevelTypes = exports.SnapshotStorageAccountTypes = exports.SettingNames = exports.SecurityTypes = exports.ResourceIdentityType = exports.PublicIPAllocationMethod = exports.PublicIPAddressSkuTier = exports.PublicIPAddressSkuName = exports.ProximityPlacementGroupType = exports.ProtocolTypes = exports.PrivateEndpointServiceConnectionStatus = exports.PassNames = exports.OrchestrationMode = exports.OperatingSystemTypes = exports.OperatingSystemStateTypes = exports.NetworkApiVersion = exports.NetworkAccessPolicy = exports.LinuxVMGuestPatchMode = exports.LinuxPatchAssessmentMode = exports.IntervalInMins = exports.IPVersions = exports.IPVersion = exports.HyperVGenerationTypes = exports.HyperVGeneration = void 0;
|
|
7
7
|
// Export sub-modules:
|
|
8
8
|
const v20150615 = require("./v20150615");
|
|
9
9
|
exports.v20150615 = v20150615;
|
|
@@ -65,6 +65,8 @@ const v20220302 = require("./v20220302");
|
|
|
65
65
|
exports.v20220302 = v20220302;
|
|
66
66
|
const v20220404 = require("./v20220404");
|
|
67
67
|
exports.v20220404 = v20220404;
|
|
68
|
+
const v20220702 = require("./v20220702");
|
|
69
|
+
exports.v20220702 = v20220702;
|
|
68
70
|
exports.CachingTypes = {
|
|
69
71
|
None: "None",
|
|
70
72
|
ReadOnly: "ReadOnly",
|
|
@@ -542,4 +544,4 @@ exports.WindowsVMGuestPatchMode = {
|
|
|
542
544
|
AutomaticByOS: "AutomaticByOS",
|
|
543
545
|
AutomaticByPlatform: "AutomaticByPlatform",
|
|
544
546
|
};
|
|
545
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../types/enums/compute/index.ts"],"names":[],"mappings":";AAAA,wEAAwE;AACxE,iFAAiF;;;;AAEjF,sBAAsB;AACtB,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,uDAAuD;AAgCnD,4CAAgB;AA/BpB,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,uDAAuD;AAgCnD,4CAAgB;AA/BpB,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AAGA,QAAA,YAAY,GAAG;IACxB,IAAI,EAAE,MAAM;IACZ,QAAQ,EAAE,UAAU;IACpB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC,IAAI,EAAE,MAAM;IACZ,MAAM,EAAE,QAAQ;IAChB,YAAY,EAAE,cAAc;CACtB,CAAC;AASE,QAAA,cAAc,GAAG;IAC1B,6BAA6B,EAAE,+BAA+B;CACxD,CAAC;AAOE,QAAA,yBAAyB,GAAG;IACrC,IAAI,EAAE,MAAM;IACZ,qBAAqB,EAAE,uBAAuB;IAC9C,wBAAwB,EAAE,0BAA0B;CAC9C,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,MAAM,EAAE,QAAQ;IAChB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,eAAe,GAAG;IAC3B,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B,SAAS,EAAE,WAAW;IACtB,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,gBAAgB,GAAG;IAC5B;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,SAAS,EAAE,WAAW;IACtB;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,OAAO,EAAE,SAAS;IAClB;;OAEG;IACH,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,SAAS,EAAE,WAAW;IACtB,KAAK,EAAE,OAAO;IACd,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,MAAM,EAAE,QAAQ;IAChB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,6BAA6B,GAAG;IACzC,cAAc,EAAE,gBAAgB;IAChC,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC;;OAEG;IACH,+BAA+B,EAAE,iCAAiC;IAClE;;OAEG;IACH,2CAA2C,EAAE,6CAA6C;CACpF,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B;;OAEG;IACH,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,eAAe,EAAE,iBAAiB;IAClC;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAOE,QAAA,cAAc,GAAG;IAC1B;;OAEG;IACH,+BAA+B,EAAE,iCAAiC;IAClE;;OAEG;IACH,+BAA+B,EAAE,iCAAiC;IAClE;;OAEG;IACH,2CAA2C,EAAE,6CAA6C;CACpF,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,6BAA6B,GAAG;IACzC,OAAO,EAAE,SAAS;IAClB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,WAAW,GAAG;IACvB,IAAI,EAAE,MAAM;IACZ,QAAQ,EAAE,UAAU;IACpB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,gBAAgB,GAAG;IAC5B,EAAE,EAAE,IAAI;IACR,EAAE,EAAE,IAAI;CACF,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,EAAE,EAAE,IAAI;IACR,EAAE,EAAE,IAAI;CACF,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB,IAAI,EAAE,MAAM;IACZ,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,IAAI,EAAE,MAAM;IACZ,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,cAAc,GAAG;IAC1B,SAAS,EAAE,WAAW;IACtB,QAAQ,EAAE,UAAU;IACpB,UAAU,EAAE,YAAY;IACxB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,wBAAwB,GAAG;IACpC,YAAY,EAAE,cAAc;IAC5B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,YAAY,EAAE,cAAc;IAC5B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,mBAAmB,GAAG;IAC/B;;OAEG;IACH,QAAQ,EAAE,UAAU;IACpB;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B,4BAA4B,EAAE,YAAY;CACpC,CAAC;AAOE,QAAA,yBAAyB,GAAG;IACrC;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,oBAAoB,GAAG;IAChC,OAAO,EAAE,SAAS;IAClB,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB,UAAU,EAAE,YAAY;CAClB,CAAC;AAOE,QAAA,sCAAsC,GAAG;IAClD,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,IAAI,EAAE,MAAM;IACZ,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,2BAA2B,GAAG;IACvC,QAAQ,EAAE,UAAU;IACpB,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,sBAAsB,GAAG;IAClC,KAAK,EAAE,OAAO;IACd,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,sBAAsB,GAAG;IAClC,QAAQ,EAAE,UAAU;IACpB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,wBAAwB,GAAG;IACpC,OAAO,EAAE,SAAS;IAClB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,oBAAoB,GAAG;IAChC,cAAc,EAAE,gBAAgB;IAChC,YAAY,EAAE,cAAc;IAC5B,2BAA2B,EAAE,8BAA8B;IAC3D,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,SAAS,EAAE,WAAW;IACtB,kBAAkB,EAAE,oBAAoB;CAClC,CAAC;AAOE,QAAA,2BAA2B,GAAG;IACvC;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,gBAAgB,GAAG;IAC5B,IAAI,EAAE,MAAM;IACZ,OAAO,EAAE,SAAS;IAClB,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,mBAAmB,GAAG;IAC/B,YAAY,EAAE,cAAc;IAC5B,WAAW,EAAE,aAAa;IAC1B,eAAe,EAAE,iBAAiB;IAClC,YAAY,EAAE,cAAc;IAC5B,WAAW,EAAE,aAAa;IAC1B,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAOE,QAAA,WAAW,GAAG;IACvB,SAAS,EAAE,WAAW;IACtB,MAAM,EAAE,QAAQ;IAChB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,iCAAiC,GAAG;IAC7C,UAAU,EAAE,YAAY;IACxB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,2BAA2B,GAAG;IACvC,OAAO,EAAE,SAAS;IAClB,GAAG,EAAE,KAAK;IACV,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,kCAAkC,GAAG;IAC9C,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;CACd,CAAC;AAIE,QAAA,uBAAuB,GAAG;IACnC,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,mBAAmB,EAAE,qBAAqB;IAC1C,mBAAmB,EAAE,qBAAqB;IAC1C,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,cAAc,EAAE,gBAAgB;IAChC,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,cAAc,EAAE,gBAAgB;IAChC,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,iBAAiB,EAAE,mBAAmB;IACtC,iBAAiB,EAAE,mBAAmB;IACtC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,cAAc,EAAE,gBAAgB;IAChC,gBAAgB,EAAE,kBAAkB;IACpC,iBAAiB,EAAE,mBAAmB;IACtC,iBAAiB,EAAE,mBAAmB;IACtC,kBAAkB,EAAE,oBAAoB;IACxC,gBAAgB,EAAE,kBAAkB;IACpC,iBAAiB,EAAE,mBAAmB;IACtC,iBAAiB,EAAE,mBAAmB;IACtC,kBAAkB,EAAE,oBAAoB;IACxC,aAAa,EAAE,eAAe;IAC9B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,0BAA0B,GAAG;IACtC,YAAY,EAAE,cAAc;IAC5B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC,MAAM,EAAE,QAAQ;IAChB,aAAa,EAAE,eAAe;IAC9B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC"}
|
|
547
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../types/enums/compute/index.ts"],"names":[],"mappings":";AAAA,wEAAwE;AACxE,iFAAiF;;;;AAEjF,sBAAsB;AACtB,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,uDAAuD;AAiCnD,4CAAgB;AAhCpB,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,uDAAuD;AAiCnD,4CAAgB;AAhCpB,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAhCb,yCAAyC;AAiCrC,8BAAS;AAGA,QAAA,YAAY,GAAG;IACxB,IAAI,EAAE,MAAM;IACZ,QAAQ,EAAE,UAAU;IACpB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC,IAAI,EAAE,MAAM;IACZ,MAAM,EAAE,QAAQ;IAChB,YAAY,EAAE,cAAc;CACtB,CAAC;AASE,QAAA,cAAc,GAAG;IAC1B,6BAA6B,EAAE,+BAA+B;CACxD,CAAC;AAOE,QAAA,yBAAyB,GAAG;IACrC,IAAI,EAAE,MAAM;IACZ,qBAAqB,EAAE,uBAAuB;IAC9C,wBAAwB,EAAE,0BAA0B;CAC9C,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,MAAM,EAAE,QAAQ;IAChB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,eAAe,GAAG;IAC3B,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B,SAAS,EAAE,WAAW;IACtB,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,gBAAgB,GAAG;IAC5B;;OAEG;IACH,KAAK,EAAE,OAAO;IACd;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,SAAS,EAAE,WAAW;IACtB;;OAEG;IACH,MAAM,EAAE,QAAQ;IAChB;;OAEG;IACH,IAAI,EAAE,MAAM;IACZ;;OAEG;IACH,OAAO,EAAE,SAAS;IAClB;;OAEG;IACH,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,SAAS,EAAE,WAAW;IACtB,KAAK,EAAE,OAAO;IACd,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,MAAM,EAAE,QAAQ;IAChB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,6BAA6B,GAAG;IACzC,cAAc,EAAE,gBAAgB;IAChC,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC;;OAEG;IACH,+BAA+B,EAAE,iCAAiC;IAClE;;OAEG;IACH,2CAA2C,EAAE,6CAA6C;CACpF,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B;;OAEG;IACH,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,eAAe,EAAE,iBAAiB;IAClC;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAOE,QAAA,cAAc,GAAG;IAC1B;;OAEG;IACH,+BAA+B,EAAE,iCAAiC;IAClE;;OAEG;IACH,+BAA+B,EAAE,iCAAiC;IAClE;;OAEG;IACH,2CAA2C,EAAE,6CAA6C;CACpF,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,6BAA6B,GAAG;IACzC,OAAO,EAAE,SAAS;IAClB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,WAAW,GAAG;IACvB,IAAI,EAAE,MAAM;IACZ,QAAQ,EAAE,UAAU;IACpB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,gBAAgB,GAAG;IAC5B,EAAE,EAAE,IAAI;IACR,EAAE,EAAE,IAAI;CACF,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,EAAE,EAAE,IAAI;IACR,EAAE,EAAE,IAAI;CACF,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB,IAAI,EAAE,MAAM;IACZ,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,UAAU,GAAG;IACtB,IAAI,EAAE,MAAM;IACZ,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,cAAc,GAAG;IAC1B,SAAS,EAAE,WAAW;IACtB,QAAQ,EAAE,UAAU;IACpB,UAAU,EAAE,YAAY;IACxB,SAAS,EAAE,WAAW;CAChB,CAAC;AAOE,QAAA,wBAAwB,GAAG;IACpC,YAAY,EAAE,cAAc;IAC5B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,qBAAqB,GAAG;IACjC,YAAY,EAAE,cAAc;IAC5B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,mBAAmB,GAAG;IAC/B;;OAEG;IACH,QAAQ,EAAE,UAAU;IACpB;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B,4BAA4B,EAAE,YAAY;CACpC,CAAC;AAOE,QAAA,yBAAyB,GAAG;IACrC;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,oBAAoB,GAAG;IAChC,OAAO,EAAE,SAAS;IAClB,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,iBAAiB,GAAG;IAC7B,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,SAAS,GAAG;IACrB,UAAU,EAAE,YAAY;CAClB,CAAC;AAOE,QAAA,sCAAsC,GAAG;IAClD,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,IAAI,EAAE,MAAM;IACZ,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,2BAA2B,GAAG;IACvC,QAAQ,EAAE,UAAU;IACpB,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,sBAAsB,GAAG;IAClC,KAAK,EAAE,OAAO;IACd,QAAQ,EAAE,UAAU;CACd,CAAC;AAOE,QAAA,sBAAsB,GAAG;IAClC,QAAQ,EAAE,UAAU;IACpB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,wBAAwB,GAAG;IACpC,OAAO,EAAE,SAAS;IAClB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,oBAAoB,GAAG;IAChC,cAAc,EAAE,gBAAgB;IAChC,YAAY,EAAE,cAAc;IAC5B,2BAA2B,EAAE,8BAA8B;IAC3D,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,aAAa,GAAG;IACzB,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,YAAY,GAAG;IACxB,SAAS,EAAE,WAAW;IACtB,kBAAkB,EAAE,oBAAoB;CAClC,CAAC;AAOE,QAAA,2BAA2B,GAAG;IACvC;;OAEG;IACH,YAAY,EAAE,cAAc;IAC5B;;OAEG;IACH,WAAW,EAAE,aAAa;IAC1B;;OAEG;IACH,YAAY,EAAE,cAAc;CACtB,CAAC;AAOE,QAAA,gBAAgB,GAAG;IAC5B,IAAI,EAAE,MAAM;IACZ,OAAO,EAAE,SAAS;IAClB,KAAK,EAAE,OAAO;CACR,CAAC;AAOE,QAAA,kBAAkB,GAAG;IAC9B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,WAAW,EAAE,aAAa;CACpB,CAAC;AAOE,QAAA,mBAAmB,GAAG;IAC/B,YAAY,EAAE,cAAc;IAC5B,WAAW,EAAE,aAAa;IAC1B,eAAe,EAAE,iBAAiB;IAClC,YAAY,EAAE,cAAc;IAC5B,WAAW,EAAE,aAAa;IAC1B,eAAe,EAAE,iBAAiB;CAC5B,CAAC;AAOE,QAAA,WAAW,GAAG;IACvB,SAAS,EAAE,WAAW;IACtB,MAAM,EAAE,QAAQ;IAChB,OAAO,EAAE,SAAS;CACZ,CAAC;AAOE,QAAA,iCAAiC,GAAG;IAC7C,UAAU,EAAE,YAAY;IACxB,MAAM,EAAE,QAAQ;CACV,CAAC;AAOE,QAAA,2BAA2B,GAAG;IACvC,OAAO,EAAE,SAAS;IAClB,GAAG,EAAE,KAAK;IACV,IAAI,EAAE,MAAM;CACN,CAAC;AAOE,QAAA,kCAAkC,GAAG;IAC9C,OAAO,EAAE,SAAS;IAClB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;CACd,CAAC;AAIE,QAAA,uBAAuB,GAAG;IACnC,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,QAAQ,EAAE,UAAU;IACpB,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,mBAAmB,EAAE,qBAAqB;IAC1C,mBAAmB,EAAE,qBAAqB;IAC1C,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,eAAe,EAAE,iBAAiB;IAClC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,gBAAgB,EAAE,kBAAkB;IACpC,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,cAAc,EAAE,gBAAgB;IAChC,WAAW,EAAE,aAAa;IAC1B,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,cAAc,EAAE,gBAAgB;IAChC,YAAY,EAAE,cAAc;IAC5B,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,iBAAiB,EAAE,mBAAmB;IACtC,iBAAiB,EAAE,mBAAmB;IACtC,kBAAkB,EAAE,oBAAoB;IACxC,kBAAkB,EAAE,oBAAoB;IACxC,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;IAC9B,cAAc,EAAE,gBAAgB;IAChC,gBAAgB,EAAE,kBAAkB;IACpC,iBAAiB,EAAE,mBAAmB;IACtC,iBAAiB,EAAE,mBAAmB;IACtC,kBAAkB,EAAE,oBAAoB;IACxC,gBAAgB,EAAE,kBAAkB;IACpC,iBAAiB,EAAE,mBAAmB;IACtC,iBAAiB,EAAE,mBAAmB;IACtC,kBAAkB,EAAE,oBAAoB;IACxC,aAAa,EAAE,eAAe;IAC9B,cAAc,EAAE,gBAAgB;IAChC,cAAc,EAAE,gBAAgB;IAChC,eAAe,EAAE,iBAAiB;IAClC,YAAY,EAAE,cAAc;IAC5B,aAAa,EAAE,eAAe;IAC9B,aAAa,EAAE,eAAe;CACxB,CAAC;AAOE,QAAA,0BAA0B,GAAG;IACtC,YAAY,EAAE,cAAc;IAC5B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC;AAOE,QAAA,uBAAuB,GAAG;IACnC,MAAM,EAAE,QAAQ;IAChB,aAAa,EAAE,eAAe;IAC9B,mBAAmB,EAAE,qBAAqB;CACpC,CAAC"}
|
|
@@ -0,0 +1,262 @@
|
|
|
1
|
+
export declare const Architecture: {
|
|
2
|
+
readonly X64: "x64";
|
|
3
|
+
readonly Arm64: "Arm64";
|
|
4
|
+
};
|
|
5
|
+
/**
|
|
6
|
+
* CPU architecture supported by an OS disk.
|
|
7
|
+
*/
|
|
8
|
+
export declare type Architecture = (typeof Architecture)[keyof typeof Architecture];
|
|
9
|
+
export declare const CopyCompletionErrorReason: {
|
|
10
|
+
/**
|
|
11
|
+
* Indicates that the source snapshot was deleted while the background copy of the resource created via CopyStart operation was in progress.
|
|
12
|
+
*/
|
|
13
|
+
readonly CopySourceNotFound: "CopySourceNotFound";
|
|
14
|
+
};
|
|
15
|
+
/**
|
|
16
|
+
* Indicates the error code if the background copy of a resource created via the CopyStart operation fails.
|
|
17
|
+
*/
|
|
18
|
+
export declare type CopyCompletionErrorReason = (typeof CopyCompletionErrorReason)[keyof typeof CopyCompletionErrorReason];
|
|
19
|
+
export declare const DataAccessAuthMode: {
|
|
20
|
+
/**
|
|
21
|
+
* When export/upload URL is used, the system checks if the user has an identity in Azure Active Directory and has necessary permissions to export/upload the data. Please refer to aka.ms/DisksAzureADAuth.
|
|
22
|
+
*/
|
|
23
|
+
readonly AzureActiveDirectory: "AzureActiveDirectory";
|
|
24
|
+
/**
|
|
25
|
+
* No additional authentication would be performed when accessing export/upload URL.
|
|
26
|
+
*/
|
|
27
|
+
readonly None: "None";
|
|
28
|
+
};
|
|
29
|
+
/**
|
|
30
|
+
* Additional authentication requirements when exporting or uploading to a disk or snapshot.
|
|
31
|
+
*/
|
|
32
|
+
export declare type DataAccessAuthMode = (typeof DataAccessAuthMode)[keyof typeof DataAccessAuthMode];
|
|
33
|
+
export declare const DiskCreateOption: {
|
|
34
|
+
/**
|
|
35
|
+
* Create an empty data disk of a size given by diskSizeGB.
|
|
36
|
+
*/
|
|
37
|
+
readonly Empty: "Empty";
|
|
38
|
+
/**
|
|
39
|
+
* Disk will be attached to a VM.
|
|
40
|
+
*/
|
|
41
|
+
readonly Attach: "Attach";
|
|
42
|
+
/**
|
|
43
|
+
* Create a new disk from a platform image specified by the given imageReference or galleryImageReference.
|
|
44
|
+
*/
|
|
45
|
+
readonly FromImage: "FromImage";
|
|
46
|
+
/**
|
|
47
|
+
* Create a disk by importing from a blob specified by a sourceUri in a storage account specified by storageAccountId.
|
|
48
|
+
*/
|
|
49
|
+
readonly Import: "Import";
|
|
50
|
+
/**
|
|
51
|
+
* Create a new disk or snapshot by copying from a disk or snapshot specified by the given sourceResourceId.
|
|
52
|
+
*/
|
|
53
|
+
readonly Copy: "Copy";
|
|
54
|
+
/**
|
|
55
|
+
* Create a new disk by copying from a backup recovery point.
|
|
56
|
+
*/
|
|
57
|
+
readonly Restore: "Restore";
|
|
58
|
+
/**
|
|
59
|
+
* Create a new disk by obtaining a write token and using it to directly upload the contents of the disk.
|
|
60
|
+
*/
|
|
61
|
+
readonly Upload: "Upload";
|
|
62
|
+
/**
|
|
63
|
+
* Create a new disk by using a deep copy process, where the resource creation is considered complete only after all data has been copied from the source.
|
|
64
|
+
*/
|
|
65
|
+
readonly CopyStart: "CopyStart";
|
|
66
|
+
/**
|
|
67
|
+
* Similar to Import create option. Create a new Trusted Launch VM or Confidential VM supported disk by importing additional blob for VM guest state specified by securityDataUri in storage account specified by storageAccountId
|
|
68
|
+
*/
|
|
69
|
+
readonly ImportSecure: "ImportSecure";
|
|
70
|
+
/**
|
|
71
|
+
* Similar to Upload create option. Create a new Trusted Launch VM or Confidential VM supported disk and upload using write token in both disk and VM guest state
|
|
72
|
+
*/
|
|
73
|
+
readonly UploadPreparedSecure: "UploadPreparedSecure";
|
|
74
|
+
};
|
|
75
|
+
/**
|
|
76
|
+
* This enumerates the possible sources of a disk's creation.
|
|
77
|
+
*/
|
|
78
|
+
export declare type DiskCreateOption = (typeof DiskCreateOption)[keyof typeof DiskCreateOption];
|
|
79
|
+
export declare const DiskEncryptionSetIdentityType: {
|
|
80
|
+
readonly SystemAssigned: "SystemAssigned";
|
|
81
|
+
readonly UserAssigned: "UserAssigned";
|
|
82
|
+
readonly SystemAssigned_UserAssigned: "SystemAssigned, UserAssigned";
|
|
83
|
+
readonly None: "None";
|
|
84
|
+
};
|
|
85
|
+
/**
|
|
86
|
+
* The type of Managed Identity used by the DiskEncryptionSet. Only SystemAssigned is supported for new creations. Disk Encryption Sets can be updated with Identity type None during migration of subscription to a new Azure Active Directory tenant; it will cause the encrypted resources to lose access to the keys.
|
|
87
|
+
*/
|
|
88
|
+
export declare type DiskEncryptionSetIdentityType = (typeof DiskEncryptionSetIdentityType)[keyof typeof DiskEncryptionSetIdentityType];
|
|
89
|
+
export declare const DiskEncryptionSetType: {
|
|
90
|
+
/**
|
|
91
|
+
* Resource using diskEncryptionSet would be encrypted at rest with Customer managed key that can be changed and revoked by a customer.
|
|
92
|
+
*/
|
|
93
|
+
readonly EncryptionAtRestWithCustomerKey: "EncryptionAtRestWithCustomerKey";
|
|
94
|
+
/**
|
|
95
|
+
* Resource using diskEncryptionSet would be encrypted at rest with two layers of encryption. One of the keys is Customer managed and the other key is Platform managed.
|
|
96
|
+
*/
|
|
97
|
+
readonly EncryptionAtRestWithPlatformAndCustomerKeys: "EncryptionAtRestWithPlatformAndCustomerKeys";
|
|
98
|
+
/**
|
|
99
|
+
* Confidential VM supported disk and VM guest state would be encrypted with customer managed key.
|
|
100
|
+
*/
|
|
101
|
+
readonly ConfidentialVmEncryptedWithCustomerKey: "ConfidentialVmEncryptedWithCustomerKey";
|
|
102
|
+
};
|
|
103
|
+
/**
|
|
104
|
+
* The type of key used to encrypt the data of the disk.
|
|
105
|
+
*/
|
|
106
|
+
export declare type DiskEncryptionSetType = (typeof DiskEncryptionSetType)[keyof typeof DiskEncryptionSetType];
|
|
107
|
+
export declare const DiskSecurityTypes: {
|
|
108
|
+
/**
|
|
109
|
+
* Trusted Launch provides security features such as secure boot and virtual Trusted Platform Module (vTPM)
|
|
110
|
+
*/
|
|
111
|
+
readonly TrustedLaunch: "TrustedLaunch";
|
|
112
|
+
/**
|
|
113
|
+
* Indicates Confidential VM disk with only VM guest state encrypted
|
|
114
|
+
*/
|
|
115
|
+
readonly ConfidentialVM_VMGuestStateOnlyEncryptedWithPlatformKey: "ConfidentialVM_VMGuestStateOnlyEncryptedWithPlatformKey";
|
|
116
|
+
/**
|
|
117
|
+
* Indicates Confidential VM disk with both OS disk and VM guest state encrypted with a platform managed key
|
|
118
|
+
*/
|
|
119
|
+
readonly ConfidentialVM_DiskEncryptedWithPlatformKey: "ConfidentialVM_DiskEncryptedWithPlatformKey";
|
|
120
|
+
/**
|
|
121
|
+
* Indicates Confidential VM disk with both OS disk and VM guest state encrypted with a customer managed key
|
|
122
|
+
*/
|
|
123
|
+
readonly ConfidentialVM_DiskEncryptedWithCustomerKey: "ConfidentialVM_DiskEncryptedWithCustomerKey";
|
|
124
|
+
};
|
|
125
|
+
/**
|
|
126
|
+
* Specifies the SecurityType of the VM. Applicable for OS disks only.
|
|
127
|
+
*/
|
|
128
|
+
export declare type DiskSecurityTypes = (typeof DiskSecurityTypes)[keyof typeof DiskSecurityTypes];
|
|
129
|
+
export declare const DiskStorageAccountTypes: {
|
|
130
|
+
/**
|
|
131
|
+
* Standard HDD locally redundant storage. Best for backup, non-critical, and infrequent access.
|
|
132
|
+
*/
|
|
133
|
+
readonly Standard_LRS: "Standard_LRS";
|
|
134
|
+
/**
|
|
135
|
+
* Premium SSD locally redundant storage. Best for production and performance sensitive workloads.
|
|
136
|
+
*/
|
|
137
|
+
readonly Premium_LRS: "Premium_LRS";
|
|
138
|
+
/**
|
|
139
|
+
* Standard SSD locally redundant storage. Best for web servers, lightly used enterprise applications and dev/test.
|
|
140
|
+
*/
|
|
141
|
+
readonly StandardSSD_LRS: "StandardSSD_LRS";
|
|
142
|
+
/**
|
|
143
|
+
* Ultra SSD locally redundant storage. Best for IO-intensive workloads such as SAP HANA, top tier databases (for example, SQL, Oracle), and other transaction-heavy workloads.
|
|
144
|
+
*/
|
|
145
|
+
readonly UltraSSD_LRS: "UltraSSD_LRS";
|
|
146
|
+
/**
|
|
147
|
+
* Premium SSD zone redundant storage. Best for the production workloads that need storage resiliency against zone failures.
|
|
148
|
+
*/
|
|
149
|
+
readonly Premium_ZRS: "Premium_ZRS";
|
|
150
|
+
/**
|
|
151
|
+
* Standard SSD zone redundant storage. Best for web servers, lightly used enterprise applications and dev/test that need storage resiliency against zone failures.
|
|
152
|
+
*/
|
|
153
|
+
readonly StandardSSD_ZRS: "StandardSSD_ZRS";
|
|
154
|
+
/**
|
|
155
|
+
* Premium SSD v2 locally redundant storage. Best for production and performance-sensitive workloads that consistently require low latency and high IOPS and throughput.
|
|
156
|
+
*/
|
|
157
|
+
readonly PremiumV2_LRS: "PremiumV2_LRS";
|
|
158
|
+
};
|
|
159
|
+
/**
|
|
160
|
+
* The sku name.
|
|
161
|
+
*/
|
|
162
|
+
export declare type DiskStorageAccountTypes = (typeof DiskStorageAccountTypes)[keyof typeof DiskStorageAccountTypes];
|
|
163
|
+
export declare const EncryptionType: {
|
|
164
|
+
/**
|
|
165
|
+
* Disk is encrypted at rest with Platform managed key. It is the default encryption type. This is not a valid encryption type for disk encryption sets.
|
|
166
|
+
*/
|
|
167
|
+
readonly EncryptionAtRestWithPlatformKey: "EncryptionAtRestWithPlatformKey";
|
|
168
|
+
/**
|
|
169
|
+
* Disk is encrypted at rest with Customer managed key that can be changed and revoked by a customer.
|
|
170
|
+
*/
|
|
171
|
+
readonly EncryptionAtRestWithCustomerKey: "EncryptionAtRestWithCustomerKey";
|
|
172
|
+
/**
|
|
173
|
+
* Disk is encrypted at rest with 2 layers of encryption. One of the keys is Customer managed and the other key is Platform managed.
|
|
174
|
+
*/
|
|
175
|
+
readonly EncryptionAtRestWithPlatformAndCustomerKeys: "EncryptionAtRestWithPlatformAndCustomerKeys";
|
|
176
|
+
};
|
|
177
|
+
/**
|
|
178
|
+
* The type of key used to encrypt the data of the disk.
|
|
179
|
+
*/
|
|
180
|
+
export declare type EncryptionType = (typeof EncryptionType)[keyof typeof EncryptionType];
|
|
181
|
+
export declare const ExtendedLocationTypes: {
|
|
182
|
+
readonly EdgeZone: "EdgeZone";
|
|
183
|
+
};
|
|
184
|
+
/**
|
|
185
|
+
* The type of the extended location.
|
|
186
|
+
*/
|
|
187
|
+
export declare type ExtendedLocationTypes = (typeof ExtendedLocationTypes)[keyof typeof ExtendedLocationTypes];
|
|
188
|
+
export declare const HyperVGeneration: {
|
|
189
|
+
readonly V1: "V1";
|
|
190
|
+
readonly V2: "V2";
|
|
191
|
+
};
|
|
192
|
+
/**
|
|
193
|
+
* The hypervisor generation of the Virtual Machine. Applicable to OS disks only.
|
|
194
|
+
*/
|
|
195
|
+
export declare type HyperVGeneration = (typeof HyperVGeneration)[keyof typeof HyperVGeneration];
|
|
196
|
+
export declare const NetworkAccessPolicy: {
|
|
197
|
+
/**
|
|
198
|
+
* The disk can be exported or uploaded to from any network.
|
|
199
|
+
*/
|
|
200
|
+
readonly AllowAll: "AllowAll";
|
|
201
|
+
/**
|
|
202
|
+
* The disk can be exported or uploaded to using a DiskAccess resource's private endpoints.
|
|
203
|
+
*/
|
|
204
|
+
readonly AllowPrivate: "AllowPrivate";
|
|
205
|
+
/**
|
|
206
|
+
* The disk cannot be exported.
|
|
207
|
+
*/
|
|
208
|
+
readonly DenyAll: "DenyAll";
|
|
209
|
+
};
|
|
210
|
+
/**
|
|
211
|
+
* Policy for accessing the disk via network.
|
|
212
|
+
*/
|
|
213
|
+
export declare type NetworkAccessPolicy = (typeof NetworkAccessPolicy)[keyof typeof NetworkAccessPolicy];
|
|
214
|
+
export declare const OperatingSystemTypes: {
|
|
215
|
+
readonly Windows: "Windows";
|
|
216
|
+
readonly Linux: "Linux";
|
|
217
|
+
};
|
|
218
|
+
/**
|
|
219
|
+
* The Operating System type.
|
|
220
|
+
*/
|
|
221
|
+
export declare type OperatingSystemTypes = (typeof OperatingSystemTypes)[keyof typeof OperatingSystemTypes];
|
|
222
|
+
export declare const PrivateEndpointServiceConnectionStatus: {
|
|
223
|
+
readonly Pending: "Pending";
|
|
224
|
+
readonly Approved: "Approved";
|
|
225
|
+
readonly Rejected: "Rejected";
|
|
226
|
+
};
|
|
227
|
+
/**
|
|
228
|
+
* Indicates whether the connection has been Approved/Rejected/Removed by the owner of the service.
|
|
229
|
+
*/
|
|
230
|
+
export declare type PrivateEndpointServiceConnectionStatus = (typeof PrivateEndpointServiceConnectionStatus)[keyof typeof PrivateEndpointServiceConnectionStatus];
|
|
231
|
+
export declare const PublicNetworkAccess: {
|
|
232
|
+
/**
|
|
233
|
+
* You can generate a SAS URI to access the underlying data of the disk publicly on the internet when NetworkAccessPolicy is set to AllowAll. You can access the data via the SAS URI only from your trusted Azure VNET when NetworkAccessPolicy is set to AllowPrivate.
|
|
234
|
+
*/
|
|
235
|
+
readonly Enabled: "Enabled";
|
|
236
|
+
/**
|
|
237
|
+
* You cannot access the underlying data of the disk publicly on the internet even when NetworkAccessPolicy is set to AllowAll. You can access the data via the SAS URI only from your trusted Azure VNET when NetworkAccessPolicy is set to AllowPrivate.
|
|
238
|
+
*/
|
|
239
|
+
readonly Disabled: "Disabled";
|
|
240
|
+
};
|
|
241
|
+
/**
|
|
242
|
+
* Policy for controlling export on the disk.
|
|
243
|
+
*/
|
|
244
|
+
export declare type PublicNetworkAccess = (typeof PublicNetworkAccess)[keyof typeof PublicNetworkAccess];
|
|
245
|
+
export declare const SnapshotStorageAccountTypes: {
|
|
246
|
+
/**
|
|
247
|
+
* Standard HDD locally redundant storage
|
|
248
|
+
*/
|
|
249
|
+
readonly Standard_LRS: "Standard_LRS";
|
|
250
|
+
/**
|
|
251
|
+
* Premium SSD locally redundant storage
|
|
252
|
+
*/
|
|
253
|
+
readonly Premium_LRS: "Premium_LRS";
|
|
254
|
+
/**
|
|
255
|
+
* Standard zone redundant storage
|
|
256
|
+
*/
|
|
257
|
+
readonly Standard_ZRS: "Standard_ZRS";
|
|
258
|
+
};
|
|
259
|
+
/**
|
|
260
|
+
* The sku name.
|
|
261
|
+
*/
|
|
262
|
+
export declare type SnapshotStorageAccountTypes = (typeof SnapshotStorageAccountTypes)[keyof typeof SnapshotStorageAccountTypes];
|
|
@@ -0,0 +1,204 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi SDK Generator. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SnapshotStorageAccountTypes = exports.PublicNetworkAccess = exports.PrivateEndpointServiceConnectionStatus = exports.OperatingSystemTypes = exports.NetworkAccessPolicy = exports.HyperVGeneration = exports.ExtendedLocationTypes = exports.EncryptionType = exports.DiskStorageAccountTypes = exports.DiskSecurityTypes = exports.DiskEncryptionSetType = exports.DiskEncryptionSetIdentityType = exports.DiskCreateOption = exports.DataAccessAuthMode = exports.CopyCompletionErrorReason = exports.Architecture = void 0;
|
|
6
|
+
exports.Architecture = {
|
|
7
|
+
X64: "x64",
|
|
8
|
+
Arm64: "Arm64",
|
|
9
|
+
};
|
|
10
|
+
exports.CopyCompletionErrorReason = {
|
|
11
|
+
/**
|
|
12
|
+
* Indicates that the source snapshot was deleted while the background copy of the resource created via CopyStart operation was in progress.
|
|
13
|
+
*/
|
|
14
|
+
CopySourceNotFound: "CopySourceNotFound",
|
|
15
|
+
};
|
|
16
|
+
exports.DataAccessAuthMode = {
|
|
17
|
+
/**
|
|
18
|
+
* When export/upload URL is used, the system checks if the user has an identity in Azure Active Directory and has necessary permissions to export/upload the data. Please refer to aka.ms/DisksAzureADAuth.
|
|
19
|
+
*/
|
|
20
|
+
AzureActiveDirectory: "AzureActiveDirectory",
|
|
21
|
+
/**
|
|
22
|
+
* No additional authentication would be performed when accessing export/upload URL.
|
|
23
|
+
*/
|
|
24
|
+
None: "None",
|
|
25
|
+
};
|
|
26
|
+
exports.DiskCreateOption = {
|
|
27
|
+
/**
|
|
28
|
+
* Create an empty data disk of a size given by diskSizeGB.
|
|
29
|
+
*/
|
|
30
|
+
Empty: "Empty",
|
|
31
|
+
/**
|
|
32
|
+
* Disk will be attached to a VM.
|
|
33
|
+
*/
|
|
34
|
+
Attach: "Attach",
|
|
35
|
+
/**
|
|
36
|
+
* Create a new disk from a platform image specified by the given imageReference or galleryImageReference.
|
|
37
|
+
*/
|
|
38
|
+
FromImage: "FromImage",
|
|
39
|
+
/**
|
|
40
|
+
* Create a disk by importing from a blob specified by a sourceUri in a storage account specified by storageAccountId.
|
|
41
|
+
*/
|
|
42
|
+
Import: "Import",
|
|
43
|
+
/**
|
|
44
|
+
* Create a new disk or snapshot by copying from a disk or snapshot specified by the given sourceResourceId.
|
|
45
|
+
*/
|
|
46
|
+
Copy: "Copy",
|
|
47
|
+
/**
|
|
48
|
+
* Create a new disk by copying from a backup recovery point.
|
|
49
|
+
*/
|
|
50
|
+
Restore: "Restore",
|
|
51
|
+
/**
|
|
52
|
+
* Create a new disk by obtaining a write token and using it to directly upload the contents of the disk.
|
|
53
|
+
*/
|
|
54
|
+
Upload: "Upload",
|
|
55
|
+
/**
|
|
56
|
+
* Create a new disk by using a deep copy process, where the resource creation is considered complete only after all data has been copied from the source.
|
|
57
|
+
*/
|
|
58
|
+
CopyStart: "CopyStart",
|
|
59
|
+
/**
|
|
60
|
+
* Similar to Import create option. Create a new Trusted Launch VM or Confidential VM supported disk by importing additional blob for VM guest state specified by securityDataUri in storage account specified by storageAccountId
|
|
61
|
+
*/
|
|
62
|
+
ImportSecure: "ImportSecure",
|
|
63
|
+
/**
|
|
64
|
+
* Similar to Upload create option. Create a new Trusted Launch VM or Confidential VM supported disk and upload using write token in both disk and VM guest state
|
|
65
|
+
*/
|
|
66
|
+
UploadPreparedSecure: "UploadPreparedSecure",
|
|
67
|
+
};
|
|
68
|
+
exports.DiskEncryptionSetIdentityType = {
|
|
69
|
+
SystemAssigned: "SystemAssigned",
|
|
70
|
+
UserAssigned: "UserAssigned",
|
|
71
|
+
SystemAssigned_UserAssigned: "SystemAssigned, UserAssigned",
|
|
72
|
+
None: "None",
|
|
73
|
+
};
|
|
74
|
+
exports.DiskEncryptionSetType = {
|
|
75
|
+
/**
|
|
76
|
+
* Resource using diskEncryptionSet would be encrypted at rest with Customer managed key that can be changed and revoked by a customer.
|
|
77
|
+
*/
|
|
78
|
+
EncryptionAtRestWithCustomerKey: "EncryptionAtRestWithCustomerKey",
|
|
79
|
+
/**
|
|
80
|
+
* Resource using diskEncryptionSet would be encrypted at rest with two layers of encryption. One of the keys is Customer managed and the other key is Platform managed.
|
|
81
|
+
*/
|
|
82
|
+
EncryptionAtRestWithPlatformAndCustomerKeys: "EncryptionAtRestWithPlatformAndCustomerKeys",
|
|
83
|
+
/**
|
|
84
|
+
* Confidential VM supported disk and VM guest state would be encrypted with customer managed key.
|
|
85
|
+
*/
|
|
86
|
+
ConfidentialVmEncryptedWithCustomerKey: "ConfidentialVmEncryptedWithCustomerKey",
|
|
87
|
+
};
|
|
88
|
+
exports.DiskSecurityTypes = {
|
|
89
|
+
/**
|
|
90
|
+
* Trusted Launch provides security features such as secure boot and virtual Trusted Platform Module (vTPM)
|
|
91
|
+
*/
|
|
92
|
+
TrustedLaunch: "TrustedLaunch",
|
|
93
|
+
/**
|
|
94
|
+
* Indicates Confidential VM disk with only VM guest state encrypted
|
|
95
|
+
*/
|
|
96
|
+
ConfidentialVM_VMGuestStateOnlyEncryptedWithPlatformKey: "ConfidentialVM_VMGuestStateOnlyEncryptedWithPlatformKey",
|
|
97
|
+
/**
|
|
98
|
+
* Indicates Confidential VM disk with both OS disk and VM guest state encrypted with a platform managed key
|
|
99
|
+
*/
|
|
100
|
+
ConfidentialVM_DiskEncryptedWithPlatformKey: "ConfidentialVM_DiskEncryptedWithPlatformKey",
|
|
101
|
+
/**
|
|
102
|
+
* Indicates Confidential VM disk with both OS disk and VM guest state encrypted with a customer managed key
|
|
103
|
+
*/
|
|
104
|
+
ConfidentialVM_DiskEncryptedWithCustomerKey: "ConfidentialVM_DiskEncryptedWithCustomerKey",
|
|
105
|
+
};
|
|
106
|
+
exports.DiskStorageAccountTypes = {
|
|
107
|
+
/**
|
|
108
|
+
* Standard HDD locally redundant storage. Best for backup, non-critical, and infrequent access.
|
|
109
|
+
*/
|
|
110
|
+
Standard_LRS: "Standard_LRS",
|
|
111
|
+
/**
|
|
112
|
+
* Premium SSD locally redundant storage. Best for production and performance sensitive workloads.
|
|
113
|
+
*/
|
|
114
|
+
Premium_LRS: "Premium_LRS",
|
|
115
|
+
/**
|
|
116
|
+
* Standard SSD locally redundant storage. Best for web servers, lightly used enterprise applications and dev/test.
|
|
117
|
+
*/
|
|
118
|
+
StandardSSD_LRS: "StandardSSD_LRS",
|
|
119
|
+
/**
|
|
120
|
+
* Ultra SSD locally redundant storage. Best for IO-intensive workloads such as SAP HANA, top tier databases (for example, SQL, Oracle), and other transaction-heavy workloads.
|
|
121
|
+
*/
|
|
122
|
+
UltraSSD_LRS: "UltraSSD_LRS",
|
|
123
|
+
/**
|
|
124
|
+
* Premium SSD zone redundant storage. Best for the production workloads that need storage resiliency against zone failures.
|
|
125
|
+
*/
|
|
126
|
+
Premium_ZRS: "Premium_ZRS",
|
|
127
|
+
/**
|
|
128
|
+
* Standard SSD zone redundant storage. Best for web servers, lightly used enterprise applications and dev/test that need storage resiliency against zone failures.
|
|
129
|
+
*/
|
|
130
|
+
StandardSSD_ZRS: "StandardSSD_ZRS",
|
|
131
|
+
/**
|
|
132
|
+
* Premium SSD v2 locally redundant storage. Best for production and performance-sensitive workloads that consistently require low latency and high IOPS and throughput.
|
|
133
|
+
*/
|
|
134
|
+
PremiumV2_LRS: "PremiumV2_LRS",
|
|
135
|
+
};
|
|
136
|
+
exports.EncryptionType = {
|
|
137
|
+
/**
|
|
138
|
+
* Disk is encrypted at rest with Platform managed key. It is the default encryption type. This is not a valid encryption type for disk encryption sets.
|
|
139
|
+
*/
|
|
140
|
+
EncryptionAtRestWithPlatformKey: "EncryptionAtRestWithPlatformKey",
|
|
141
|
+
/**
|
|
142
|
+
* Disk is encrypted at rest with Customer managed key that can be changed and revoked by a customer.
|
|
143
|
+
*/
|
|
144
|
+
EncryptionAtRestWithCustomerKey: "EncryptionAtRestWithCustomerKey",
|
|
145
|
+
/**
|
|
146
|
+
* Disk is encrypted at rest with 2 layers of encryption. One of the keys is Customer managed and the other key is Platform managed.
|
|
147
|
+
*/
|
|
148
|
+
EncryptionAtRestWithPlatformAndCustomerKeys: "EncryptionAtRestWithPlatformAndCustomerKeys",
|
|
149
|
+
};
|
|
150
|
+
exports.ExtendedLocationTypes = {
|
|
151
|
+
EdgeZone: "EdgeZone",
|
|
152
|
+
};
|
|
153
|
+
exports.HyperVGeneration = {
|
|
154
|
+
V1: "V1",
|
|
155
|
+
V2: "V2",
|
|
156
|
+
};
|
|
157
|
+
exports.NetworkAccessPolicy = {
|
|
158
|
+
/**
|
|
159
|
+
* The disk can be exported or uploaded to from any network.
|
|
160
|
+
*/
|
|
161
|
+
AllowAll: "AllowAll",
|
|
162
|
+
/**
|
|
163
|
+
* The disk can be exported or uploaded to using a DiskAccess resource's private endpoints.
|
|
164
|
+
*/
|
|
165
|
+
AllowPrivate: "AllowPrivate",
|
|
166
|
+
/**
|
|
167
|
+
* The disk cannot be exported.
|
|
168
|
+
*/
|
|
169
|
+
DenyAll: "DenyAll",
|
|
170
|
+
};
|
|
171
|
+
exports.OperatingSystemTypes = {
|
|
172
|
+
Windows: "Windows",
|
|
173
|
+
Linux: "Linux",
|
|
174
|
+
};
|
|
175
|
+
exports.PrivateEndpointServiceConnectionStatus = {
|
|
176
|
+
Pending: "Pending",
|
|
177
|
+
Approved: "Approved",
|
|
178
|
+
Rejected: "Rejected",
|
|
179
|
+
};
|
|
180
|
+
exports.PublicNetworkAccess = {
|
|
181
|
+
/**
|
|
182
|
+
* You can generate a SAS URI to access the underlying data of the disk publicly on the internet when NetworkAccessPolicy is set to AllowAll. You can access the data via the SAS URI only from your trusted Azure VNET when NetworkAccessPolicy is set to AllowPrivate.
|
|
183
|
+
*/
|
|
184
|
+
Enabled: "Enabled",
|
|
185
|
+
/**
|
|
186
|
+
* You cannot access the underlying data of the disk publicly on the internet even when NetworkAccessPolicy is set to AllowAll. You can access the data via the SAS URI only from your trusted Azure VNET when NetworkAccessPolicy is set to AllowPrivate.
|
|
187
|
+
*/
|
|
188
|
+
Disabled: "Disabled",
|
|
189
|
+
};
|
|
190
|
+
exports.SnapshotStorageAccountTypes = {
|
|
191
|
+
/**
|
|
192
|
+
* Standard HDD locally redundant storage
|
|
193
|
+
*/
|
|
194
|
+
Standard_LRS: "Standard_LRS",
|
|
195
|
+
/**
|
|
196
|
+
* Premium SSD locally redundant storage
|
|
197
|
+
*/
|
|
198
|
+
Premium_LRS: "Premium_LRS",
|
|
199
|
+
/**
|
|
200
|
+
* Standard zone redundant storage
|
|
201
|
+
*/
|
|
202
|
+
Standard_ZRS: "Standard_ZRS",
|
|
203
|
+
};
|
|
204
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -14,7 +14,8 @@ import * as v20211001 from "./v20211001";
|
|
|
14
14
|
import * as v20220401preview from "./v20220401preview";
|
|
15
15
|
import * as v20220601preview from "./v20220601preview";
|
|
16
16
|
import * as v20220801preview from "./v20220801preview";
|
|
17
|
-
|
|
17
|
+
import * as v20221001preview from "./v20221001preview";
|
|
18
|
+
export { v20180531, v20180801preview, v20190101, v20190301preview, v20190401preview, v20190901, v20191001, v20191101, v20200301preview, v20200601, v20201201preview, v20210101, v20211001, v20220401preview, v20220601preview, v20220801preview, v20221001preview, };
|
|
18
19
|
export declare const AccumulatedType: {
|
|
19
20
|
readonly True: "true";
|
|
20
21
|
readonly False: "false";
|