@pulumi/azure 5.64.0-alpha.1706715827 → 5.64.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/apimanagement/certificate.d.ts +2 -2
- package/apimanagement/certificate.js +2 -2
- package/apimanagement/gatewayCertificateAuthority.d.ts +1 -1
- package/apimanagement/gatewayCertificateAuthority.js +1 -1
- package/apimanagement/gatewayHostNameConfiguration.d.ts +1 -1
- package/apimanagement/gatewayHostNameConfiguration.js +1 -1
- package/appservice/certificate.d.ts +1 -1
- package/appservice/certificate.js +1 -1
- package/appservice/publicCertificate.d.ts +1 -1
- package/appservice/publicCertificate.js +1 -1
- package/arckubernetes/cluster.d.ts +1 -1
- package/arckubernetes/cluster.js +1 -1
- package/arckubernetes/clusterExtension.d.ts +1 -1
- package/arckubernetes/clusterExtension.js +1 -1
- package/arckubernetes/fluxConfiguration.d.ts +1 -1
- package/arckubernetes/fluxConfiguration.js +1 -1
- package/automation/certificate.d.ts +1 -1
- package/automation/certificate.js +1 -1
- package/automation/connectionCertificate.d.ts +1 -1
- package/automation/connectionCertificate.js +1 -1
- package/batch/certificate.d.ts +1 -1
- package/batch/certificate.js +1 -1
- package/batch/pool.d.ts +1 -1
- package/batch/pool.js +1 -1
- package/cdn/frontdoorSecret.d.ts +1 -1
- package/cdn/frontdoorSecret.js +1 -1
- package/config/vars.d.ts +0 -3
- package/config/vars.js.map +1 -1
- package/iot/certificate.d.ts +1 -1
- package/iot/certificate.js +1 -1
- package/iot/iotHubCertificate.d.ts +1 -1
- package/iot/iotHubCertificate.js +1 -1
- package/keyvault/certifiate.d.ts +1 -1
- package/keyvault/certifiate.js +1 -1
- package/keyvault/certificate.d.ts +1 -1
- package/keyvault/certificate.js +1 -1
- package/lab/user.d.ts +1 -1
- package/lab/user.js +1 -1
- package/logicapps/integrationAccountAssembly.d.ts +1 -1
- package/logicapps/integrationAccountAssembly.js +1 -1
- package/mssql/managedInstanceActiveDirectoryAdministrator.d.ts +1 -1
- package/mssql/managedInstanceActiveDirectoryAdministrator.js +1 -1
- package/nginx/certificate.d.ts +1 -1
- package/nginx/certificate.js +1 -1
- package/package.json +1 -1
- package/provider.js +14 -12
- package/provider.js.map +1 -1
- package/signalr/serviceCustomCertificate.d.ts +1 -1
- package/signalr/serviceCustomCertificate.js +1 -1
- package/signalr/serviceCustomDomain.d.ts +1 -1
- package/signalr/serviceCustomDomain.js +1 -1
- package/types/input.d.ts +108 -0
- package/types/output.d.ts +249 -0
|
@@ -21,7 +21,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
21
21
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
22
22
|
* apiManagementName: exampleService.name,
|
|
23
23
|
* resourceGroupName: exampleResourceGroup.name,
|
|
24
|
-
* data:
|
|
24
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
25
25
|
* });
|
|
26
26
|
* ```
|
|
27
27
|
* ### With Key Vault Certificate)
|
|
@@ -59,7 +59,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
59
59
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
60
60
|
* keyVaultId: exampleKeyVault.id,
|
|
61
61
|
* certificate: {
|
|
62
|
-
* contents:
|
|
62
|
+
* contents: fs.readFileSync("example_cert.pfx", { encoding: "base64" }),
|
|
63
63
|
* password: "terraform",
|
|
64
64
|
* },
|
|
65
65
|
* certificatePolicy: {
|
|
@@ -27,7 +27,7 @@ const utilities = require("../utilities");
|
|
|
27
27
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
28
28
|
* apiManagementName: exampleService.name,
|
|
29
29
|
* resourceGroupName: exampleResourceGroup.name,
|
|
30
|
-
* data:
|
|
30
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
31
31
|
* });
|
|
32
32
|
* ```
|
|
33
33
|
* ### With Key Vault Certificate)
|
|
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
|
|
|
65
65
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
66
66
|
* keyVaultId: exampleKeyVault.id,
|
|
67
67
|
* certificate: {
|
|
68
|
-
* contents:
|
|
68
|
+
* contents: fs.readFileSync("example_cert.pfx", { encoding: "base64" }),
|
|
69
69
|
* password: "terraform",
|
|
70
70
|
* },
|
|
71
71
|
* certificatePolicy: {
|
|
@@ -30,7 +30,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
30
30
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
31
31
|
* apiManagementName: exampleService.name,
|
|
32
32
|
* resourceGroupName: exampleResourceGroup.name,
|
|
33
|
-
* data:
|
|
33
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
34
34
|
* });
|
|
35
35
|
* const exampleGatewayCertificateAuthority = new azure.apimanagement.GatewayCertificateAuthority("exampleGatewayCertificateAuthority", {
|
|
36
36
|
* apiManagementId: exampleService.id,
|
|
@@ -36,7 +36,7 @@ const utilities = require("../utilities");
|
|
|
36
36
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
37
37
|
* apiManagementName: exampleService.name,
|
|
38
38
|
* resourceGroupName: exampleResourceGroup.name,
|
|
39
|
-
* data:
|
|
39
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
40
40
|
* });
|
|
41
41
|
* const exampleGatewayCertificateAuthority = new azure.apimanagement.GatewayCertificateAuthority("exampleGatewayCertificateAuthority", {
|
|
42
42
|
* apiManagementId: exampleService.id,
|
|
@@ -30,7 +30,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
30
30
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
31
31
|
* apiManagementName: exampleService.name,
|
|
32
32
|
* resourceGroupName: exampleResourceGroup.name,
|
|
33
|
-
* data:
|
|
33
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
34
34
|
* });
|
|
35
35
|
* const exampleGatewayHostNameConfiguration = new azure.apimanagement.GatewayHostNameConfiguration("exampleGatewayHostNameConfiguration", {
|
|
36
36
|
* apiManagementId: exampleService.id,
|
|
@@ -36,7 +36,7 @@ const utilities = require("../utilities");
|
|
|
36
36
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
37
37
|
* apiManagementName: exampleService.name,
|
|
38
38
|
* resourceGroupName: exampleResourceGroup.name,
|
|
39
|
-
* data:
|
|
39
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
40
40
|
* });
|
|
41
41
|
* const exampleGatewayHostNameConfiguration = new azure.apimanagement.GatewayHostNameConfiguration("exampleGatewayHostNameConfiguration", {
|
|
42
42
|
* apiManagementId: exampleService.id,
|
|
@@ -15,7 +15,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
15
15
|
* const exampleCertificate = new azure.appservice.Certificate("exampleCertificate", {
|
|
16
16
|
* resourceGroupName: exampleResourceGroup.name,
|
|
17
17
|
* location: exampleResourceGroup.location,
|
|
18
|
-
* pfxBlob:
|
|
18
|
+
* pfxBlob: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
19
19
|
* password: "password123!",
|
|
20
20
|
* });
|
|
21
21
|
* ```
|
|
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
|
|
|
21
21
|
* const exampleCertificate = new azure.appservice.Certificate("exampleCertificate", {
|
|
22
22
|
* resourceGroupName: exampleResourceGroup.name,
|
|
23
23
|
* location: exampleResourceGroup.location,
|
|
24
|
-
* pfxBlob:
|
|
24
|
+
* pfxBlob: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
25
25
|
* password: "password123!",
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
|
@@ -28,7 +28,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
28
28
|
* appServiceName: exampleAppService.name,
|
|
29
29
|
* certificateName: "example-public-certificate",
|
|
30
30
|
* certificateLocation: "Unknown",
|
|
31
|
-
* blob:
|
|
31
|
+
* blob: fs.readFileSync("app_service_public_certificate.cer", { encoding: "base64" }),
|
|
32
32
|
* });
|
|
33
33
|
* ```
|
|
34
34
|
*
|
|
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
|
|
|
34
34
|
* appServiceName: exampleAppService.name,
|
|
35
35
|
* certificateName: "example-public-certificate",
|
|
36
36
|
* certificateLocation: "Unknown",
|
|
37
|
-
* blob:
|
|
37
|
+
* blob: fs.readFileSync("app_service_public_certificate.cer", { encoding: "base64" }),
|
|
38
38
|
* });
|
|
39
39
|
* ```
|
|
40
40
|
*
|
|
@@ -17,7 +17,7 @@ import * as outputs from "../types/output";
|
|
|
17
17
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
18
18
|
* resourceGroupName: exampleResourceGroup.name,
|
|
19
19
|
* location: "West Europe",
|
|
20
|
-
* agentPublicKeyCertificate:
|
|
20
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
21
21
|
* identity: {
|
|
22
22
|
* type: "SystemAssigned",
|
|
23
23
|
* },
|
package/arckubernetes/cluster.js
CHANGED
|
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
|
|
|
21
21
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
22
22
|
* resourceGroupName: exampleResourceGroup.name,
|
|
23
23
|
* location: "West Europe",
|
|
24
|
-
* agentPublicKeyCertificate:
|
|
24
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
25
25
|
* identity: {
|
|
26
26
|
* type: "SystemAssigned",
|
|
27
27
|
* },
|
|
@@ -15,7 +15,7 @@ import * as outputs from "../types/output";
|
|
|
15
15
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
16
16
|
* resourceGroupName: exampleResourceGroup.name,
|
|
17
17
|
* location: "West Europe",
|
|
18
|
-
* agentPublicKeyCertificate:
|
|
18
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
19
19
|
* identity: {
|
|
20
20
|
* type: "SystemAssigned",
|
|
21
21
|
* },
|
|
@@ -19,7 +19,7 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
20
20
|
* resourceGroupName: exampleResourceGroup.name,
|
|
21
21
|
* location: "West Europe",
|
|
22
|
-
* agentPublicKeyCertificate:
|
|
22
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
23
23
|
* identity: {
|
|
24
24
|
* type: "SystemAssigned",
|
|
25
25
|
* },
|
|
@@ -15,7 +15,7 @@ import * as outputs from "../types/output";
|
|
|
15
15
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
16
16
|
* resourceGroupName: exampleResourceGroup.name,
|
|
17
17
|
* location: "West Europe",
|
|
18
|
-
* agentPublicKeyCertificate:
|
|
18
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
19
19
|
* identity: {
|
|
20
20
|
* type: "SystemAssigned",
|
|
21
21
|
* },
|
|
@@ -19,7 +19,7 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
20
20
|
* resourceGroupName: exampleResourceGroup.name,
|
|
21
21
|
* location: "West Europe",
|
|
22
|
-
* agentPublicKeyCertificate:
|
|
22
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
23
23
|
* identity: {
|
|
24
24
|
* type: "SystemAssigned",
|
|
25
25
|
* },
|
|
@@ -19,7 +19,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
19
|
* resourceGroupName: exampleResourceGroup.name,
|
|
20
20
|
* automationAccountName: exampleAccount.name,
|
|
21
21
|
* description: "This is an example certificate",
|
|
22
|
-
* base64:
|
|
22
|
+
* base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
23
23
|
* exportable: true,
|
|
24
24
|
* });
|
|
25
25
|
* ```
|
|
@@ -25,7 +25,7 @@ const utilities = require("../utilities");
|
|
|
25
25
|
* resourceGroupName: exampleResourceGroup.name,
|
|
26
26
|
* automationAccountName: exampleAccount.name,
|
|
27
27
|
* description: "This is an example certificate",
|
|
28
|
-
* base64:
|
|
28
|
+
* base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
29
29
|
* exportable: true,
|
|
30
30
|
* });
|
|
31
31
|
* ```
|
|
@@ -19,7 +19,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
19
|
* const exampleCertificate = new azure.automation.Certificate("exampleCertificate", {
|
|
20
20
|
* resourceGroupName: exampleResourceGroup.name,
|
|
21
21
|
* automationAccountName: exampleAccount.name,
|
|
22
|
-
* base64:
|
|
22
|
+
* base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
23
23
|
* });
|
|
24
24
|
* const exampleConnectionCertificate = new azure.automation.ConnectionCertificate("exampleConnectionCertificate", {
|
|
25
25
|
* resourceGroupName: exampleResourceGroup.name,
|
|
@@ -25,7 +25,7 @@ const utilities = require("../utilities");
|
|
|
25
25
|
* const exampleCertificate = new azure.automation.Certificate("exampleCertificate", {
|
|
26
26
|
* resourceGroupName: exampleResourceGroup.name,
|
|
27
27
|
* automationAccountName: exampleAccount.name,
|
|
28
|
-
* base64:
|
|
28
|
+
* base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
29
29
|
* });
|
|
30
30
|
* const exampleConnectionCertificate = new azure.automation.ConnectionCertificate("exampleConnectionCertificate", {
|
|
31
31
|
* resourceGroupName: exampleResourceGroup.name,
|
package/batch/certificate.d.ts
CHANGED
|
@@ -29,7 +29,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
29
29
|
* const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
|
|
30
30
|
* resourceGroupName: exampleResourceGroup.name,
|
|
31
31
|
* accountName: exampleBatch / accountAccount.name,
|
|
32
|
-
* certificate:
|
|
32
|
+
* certificate: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
33
33
|
* format: "Pfx",
|
|
34
34
|
* password: "password",
|
|
35
35
|
* thumbprint: "42C107874FD0E4A9583292A2F1098E8FE4B2EDDA",
|
package/batch/certificate.js
CHANGED
|
@@ -35,7 +35,7 @@ const utilities = require("../utilities");
|
|
|
35
35
|
* const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
|
|
36
36
|
* resourceGroupName: exampleResourceGroup.name,
|
|
37
37
|
* accountName: exampleBatch / accountAccount.name,
|
|
38
|
-
* certificate:
|
|
38
|
+
* certificate: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
39
39
|
* format: "Pfx",
|
|
40
40
|
* password: "password",
|
|
41
41
|
* thumbprint: "42C107874FD0E4A9583292A2F1098E8FE4B2EDDA",
|
package/batch/pool.d.ts
CHANGED
|
@@ -31,7 +31,7 @@ import * as outputs from "../types/output";
|
|
|
31
31
|
* const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
|
|
32
32
|
* resourceGroupName: exampleResourceGroup.name,
|
|
33
33
|
* accountName: exampleBatch / accountAccount.name,
|
|
34
|
-
* certificate:
|
|
34
|
+
* certificate: fs.readFileSync("certificate.cer", { encoding: "base64" }),
|
|
35
35
|
* format: "Cer",
|
|
36
36
|
* thumbprint: "312d31a79fa0cef49c00f769afc2b73e9f4edf34",
|
|
37
37
|
* thumbprintAlgorithm: "SHA1",
|
package/batch/pool.js
CHANGED
|
@@ -35,7 +35,7 @@ const utilities = require("../utilities");
|
|
|
35
35
|
* const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
|
|
36
36
|
* resourceGroupName: exampleResourceGroup.name,
|
|
37
37
|
* accountName: exampleBatch / accountAccount.name,
|
|
38
|
-
* certificate:
|
|
38
|
+
* certificate: fs.readFileSync("certificate.cer", { encoding: "base64" }),
|
|
39
39
|
* format: "Cer",
|
|
40
40
|
* thumbprint: "312d31a79fa0cef49c00f769afc2b73e9f4edf34",
|
|
41
41
|
* thumbprintAlgorithm: "SHA1",
|
package/cdn/frontdoorSecret.d.ts
CHANGED
|
@@ -50,7 +50,7 @@ import * as outputs from "../types/output";
|
|
|
50
50
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
51
51
|
* keyVaultId: exampleKeyVault.id,
|
|
52
52
|
* certificate: {
|
|
53
|
-
* contents:
|
|
53
|
+
* contents: fs.readFileSync("my-certificate.pfx", { encoding: "base64" }),
|
|
54
54
|
* },
|
|
55
55
|
* });
|
|
56
56
|
* const exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile("exampleFrontdoorProfile", {
|
package/cdn/frontdoorSecret.js
CHANGED
|
@@ -54,7 +54,7 @@ const utilities = require("../utilities");
|
|
|
54
54
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
55
55
|
* keyVaultId: exampleKeyVault.id,
|
|
56
56
|
* certificate: {
|
|
57
|
-
* contents:
|
|
57
|
+
* contents: fs.readFileSync("my-certificate.pfx", { encoding: "base64" }),
|
|
58
58
|
* },
|
|
59
59
|
* });
|
|
60
60
|
* const exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile("exampleFrontdoorProfile", {
|
package/config/vars.d.ts
CHANGED
|
@@ -35,9 +35,6 @@ export declare const clientSecretFilePath: string | undefined;
|
|
|
35
35
|
* This will disable the x-ms-correlation-request-id header.
|
|
36
36
|
*/
|
|
37
37
|
export declare const disableCorrelationRequestId: boolean | undefined;
|
|
38
|
-
/**
|
|
39
|
-
* This will disable the Terraform Partner ID which is used if a custom `partner_id` isn't specified.
|
|
40
|
-
*/
|
|
41
38
|
export declare const disableTerraformPartnerId: boolean | undefined;
|
|
42
39
|
/**
|
|
43
40
|
* The Cloud Environment which should be used. Possible values are public, usgovernment, and china. Defaults to public.
|
package/config/vars.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAG5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAW,oBAAoB,CAAC,CAAC;IAC9D,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;IACrD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,uBAAuB,EAAE;IACpD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;IACxC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,sBAAsB,EAAE;IACnD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;IAChD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,6BAA6B,EAAE;IAC1D,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,6BAA6B,CAAC,CAAC;IACtE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;
|
|
1
|
+
{"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAG5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAW,oBAAoB,CAAC,CAAC;IAC9D,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;IACrD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,uBAAuB,EAAE;IACpD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;IACxC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,sBAAsB,EAAE;IACnD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;IAChD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,6BAA6B,EAAE;IAC1D,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,6BAA6B,CAAC,CAAC;IACtE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,2BAA2B,CAAC,CAAC;IACpE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,aAAa,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,mBAAmB,EAAE,iBAAiB,CAAC,IAAI,QAAQ,CAAC,CAAC;IACjH,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA0B,UAAU,CAAC,CAAC;IACnE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,mCAAI,SAAS,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;IACxE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,mCAAI,SAAS,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;IACrF,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;IACvC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,gBAAgB,EAAE;IAC7C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;IAC1C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,0BAA0B,EAAE;IACvD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,0BAA0B,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,gCAAgC,CAAC,IAAI,KAAK,CAAC,CAAC;IAC3I,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,mBAAmB,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,yBAAyB,CAAC,IAAI,KAAK,CAAC,CAAC;IAC7H,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,gBAAgB,EAAE;IAC7C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,gBAAgB,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,qBAAqB,CAAC,IAAI,EAAE,CAAC,CAAC;IAC7F,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,wBAAwB,EAAE;IACrD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,wBAAwB,CAAC,CAAC;IACjE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;IACrC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,QAAQ,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;IACrC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,QAAQ,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,SAAS,CAAC,CAAC;IAClD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC"}
|
package/iot/certificate.d.ts
CHANGED
|
@@ -22,7 +22,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
22
22
|
* resourceGroupName: exampleResourceGroup.name,
|
|
23
23
|
* iothubName: exampleIoTHub.name,
|
|
24
24
|
* isVerified: true,
|
|
25
|
-
* certificateContent:
|
|
25
|
+
* certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
|
28
28
|
*
|
package/iot/certificate.js
CHANGED
|
@@ -28,7 +28,7 @@ const utilities = require("../utilities");
|
|
|
28
28
|
* resourceGroupName: exampleResourceGroup.name,
|
|
29
29
|
* iothubName: exampleIoTHub.name,
|
|
30
30
|
* isVerified: true,
|
|
31
|
-
* certificateContent:
|
|
31
|
+
* certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
|
|
32
32
|
* });
|
|
33
33
|
* ```
|
|
34
34
|
*
|
|
@@ -21,7 +21,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
21
21
|
* const exampleIotHubCertificate = new azure.iot.IotHubCertificate("exampleIotHubCertificate", {
|
|
22
22
|
* resourceGroupName: exampleResourceGroup.name,
|
|
23
23
|
* iotDpsName: exampleIotHubDps.name,
|
|
24
|
-
* certificateContent:
|
|
24
|
+
* certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
|
|
25
25
|
* });
|
|
26
26
|
* ```
|
|
27
27
|
*
|
package/iot/iotHubCertificate.js
CHANGED
|
@@ -27,7 +27,7 @@ const utilities = require("../utilities");
|
|
|
27
27
|
* const exampleIotHubCertificate = new azure.iot.IotHubCertificate("exampleIotHubCertificate", {
|
|
28
28
|
* resourceGroupName: exampleResourceGroup.name,
|
|
29
29
|
* iotDpsName: exampleIotHubDps.name,
|
|
30
|
-
* certificateContent:
|
|
30
|
+
* certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
|
|
31
31
|
* });
|
|
32
32
|
* ```
|
|
33
33
|
*
|
package/keyvault/certifiate.d.ts
CHANGED
|
@@ -76,7 +76,7 @@ import * as outputs from "../types/output";
|
|
|
76
76
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
77
77
|
* keyVaultId: exampleKeyVault.id,
|
|
78
78
|
* certificate: {
|
|
79
|
-
* contents:
|
|
79
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
80
80
|
* password: "",
|
|
81
81
|
* },
|
|
82
82
|
* });
|
package/keyvault/certifiate.js
CHANGED
|
@@ -80,7 +80,7 @@ const utilities = require("../utilities");
|
|
|
80
80
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
81
81
|
* keyVaultId: exampleKeyVault.id,
|
|
82
82
|
* certificate: {
|
|
83
|
-
* contents:
|
|
83
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
84
84
|
* password: "",
|
|
85
85
|
* },
|
|
86
86
|
* });
|
|
@@ -76,7 +76,7 @@ import * as outputs from "../types/output";
|
|
|
76
76
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
77
77
|
* keyVaultId: exampleKeyVault.id,
|
|
78
78
|
* certificate: {
|
|
79
|
-
* contents:
|
|
79
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
80
80
|
* password: "",
|
|
81
81
|
* },
|
|
82
82
|
* });
|
package/keyvault/certificate.js
CHANGED
|
@@ -80,7 +80,7 @@ const utilities = require("../utilities");
|
|
|
80
80
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
81
81
|
* keyVaultId: exampleKeyVault.id,
|
|
82
82
|
* certificate: {
|
|
83
|
-
* contents:
|
|
83
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
84
84
|
* password: "",
|
|
85
85
|
* },
|
|
86
86
|
* });
|
package/lab/user.d.ts
CHANGED
package/lab/user.js
CHANGED
|
@@ -19,7 +19,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
19
|
* resourceGroupName: exampleResourceGroup.name,
|
|
20
20
|
* integrationAccountName: exampleIntegrationAccount.name,
|
|
21
21
|
* assemblyName: "TestAssembly",
|
|
22
|
-
* content:
|
|
22
|
+
* content: fs.readFileSync("testdata/log4net.dll", { encoding: "base64" }),
|
|
23
23
|
* });
|
|
24
24
|
* ```
|
|
25
25
|
*
|
|
@@ -25,7 +25,7 @@ const utilities = require("../utilities");
|
|
|
25
25
|
* resourceGroupName: exampleResourceGroup.name,
|
|
26
26
|
* integrationAccountName: exampleIntegrationAccount.name,
|
|
27
27
|
* assemblyName: "TestAssembly",
|
|
28
|
-
* content:
|
|
28
|
+
* content: fs.readFileSync("testdata/log4net.dll", { encoding: "base64" }),
|
|
29
29
|
* });
|
|
30
30
|
* ```
|
|
31
31
|
*
|
|
@@ -41,7 +41,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
41
41
|
* memberObjectId: exampleManagedInstance.identity.apply(identity => identity?.principalId),
|
|
42
42
|
* });
|
|
43
43
|
* const admin = new azuread.User("admin", {
|
|
44
|
-
* userPrincipalName: "ms.admin@
|
|
44
|
+
* userPrincipalName: "ms.admin@example.com",
|
|
45
45
|
* displayName: "Ms Admin",
|
|
46
46
|
* mailNickname: "ms.admin",
|
|
47
47
|
* password: "SecretP@sswd99!",
|
|
@@ -47,7 +47,7 @@ const utilities = require("../utilities");
|
|
|
47
47
|
* memberObjectId: exampleManagedInstance.identity.apply(identity => identity?.principalId),
|
|
48
48
|
* });
|
|
49
49
|
* const admin = new azuread.User("admin", {
|
|
50
|
-
* userPrincipalName: "ms.admin@
|
|
50
|
+
* userPrincipalName: "ms.admin@example.com",
|
|
51
51
|
* displayName: "Ms Admin",
|
|
52
52
|
* mailNickname: "ms.admin",
|
|
53
53
|
* password: "SecretP@sswd99!",
|
package/nginx/certificate.d.ts
CHANGED
|
@@ -77,7 +77,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
77
77
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
78
78
|
* keyVaultId: exampleKeyVault.id,
|
|
79
79
|
* certificate: {
|
|
80
|
-
* contents:
|
|
80
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
81
81
|
* password: "",
|
|
82
82
|
* },
|
|
83
83
|
* });
|
package/nginx/certificate.js
CHANGED
|
@@ -83,7 +83,7 @@ const utilities = require("../utilities");
|
|
|
83
83
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
84
84
|
* keyVaultId: exampleKeyVault.id,
|
|
85
85
|
* certificate: {
|
|
86
|
-
* contents:
|
|
86
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
87
87
|
* password: "",
|
|
88
88
|
* },
|
|
89
89
|
* });
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/azure",
|
|
3
|
-
"version": "v5.64.
|
|
3
|
+
"version": "v5.64.1",
|
|
4
4
|
"description": "A Pulumi package for creating and managing Microsoft Azure cloud resources, based on the Terraform azurerm provider. We recommend using the [Azure Native provider](https://github.com/pulumi/pulumi-azure-native) to provision Azure infrastructure. Azure Native provides complete coverage of Azure resources and same-day access to new resources and resource updates.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
package/provider.js
CHANGED
|
@@ -25,34 +25,36 @@ class Provider extends pulumi.ProviderResource {
|
|
|
25
25
|
opts = opts || {};
|
|
26
26
|
{
|
|
27
27
|
resourceInputs["auxiliaryTenantIds"] = pulumi.output(args ? args.auxiliaryTenantIds : undefined).apply(JSON.stringify);
|
|
28
|
-
resourceInputs["clientCertificate"] = args ? args.clientCertificate : undefined;
|
|
29
|
-
resourceInputs["clientCertificatePassword"] = args ? args.clientCertificatePassword : undefined;
|
|
30
|
-
resourceInputs["clientCertificatePath"] = args ? args.clientCertificatePath : undefined;
|
|
31
|
-
resourceInputs["clientId"] = args ? args.clientId : undefined;
|
|
32
|
-
resourceInputs["clientIdFilePath"] = args ? args.clientIdFilePath : undefined;
|
|
33
|
-
resourceInputs["clientSecret"] = args ? args.clientSecret : undefined;
|
|
34
|
-
resourceInputs["clientSecretFilePath"] = args ? args.clientSecretFilePath : undefined;
|
|
28
|
+
resourceInputs["clientCertificate"] = (args === null || args === void 0 ? void 0 : args.clientCertificate) ? pulumi.secret(args.clientCertificate) : undefined;
|
|
29
|
+
resourceInputs["clientCertificatePassword"] = (args === null || args === void 0 ? void 0 : args.clientCertificatePassword) ? pulumi.secret(args.clientCertificatePassword) : undefined;
|
|
30
|
+
resourceInputs["clientCertificatePath"] = (args === null || args === void 0 ? void 0 : args.clientCertificatePath) ? pulumi.secret(args.clientCertificatePath) : undefined;
|
|
31
|
+
resourceInputs["clientId"] = (args === null || args === void 0 ? void 0 : args.clientId) ? pulumi.secret(args.clientId) : undefined;
|
|
32
|
+
resourceInputs["clientIdFilePath"] = (args === null || args === void 0 ? void 0 : args.clientIdFilePath) ? pulumi.secret(args.clientIdFilePath) : undefined;
|
|
33
|
+
resourceInputs["clientSecret"] = (args === null || args === void 0 ? void 0 : args.clientSecret) ? pulumi.secret(args.clientSecret) : undefined;
|
|
34
|
+
resourceInputs["clientSecretFilePath"] = (args === null || args === void 0 ? void 0 : args.clientSecretFilePath) ? pulumi.secret(args.clientSecretFilePath) : undefined;
|
|
35
35
|
resourceInputs["disableCorrelationRequestId"] = pulumi.output(args ? args.disableCorrelationRequestId : undefined).apply(JSON.stringify);
|
|
36
36
|
resourceInputs["disableTerraformPartnerId"] = pulumi.output(args ? args.disableTerraformPartnerId : undefined).apply(JSON.stringify);
|
|
37
37
|
resourceInputs["environment"] = (_a = (args ? args.environment : undefined)) !== null && _a !== void 0 ? _a : (utilities.getEnv("AZURE_ENVIRONMENT", "ARM_ENVIRONMENT") || "public");
|
|
38
38
|
resourceInputs["features"] = pulumi.output(args ? args.features : undefined).apply(JSON.stringify);
|
|
39
39
|
resourceInputs["metadataHost"] = (_b = (args ? args.metadataHost : undefined)) !== null && _b !== void 0 ? _b : utilities.getEnv("ARM_METADATA_HOSTNAME");
|
|
40
40
|
resourceInputs["msiEndpoint"] = args ? args.msiEndpoint : undefined;
|
|
41
|
-
resourceInputs["oidcRequestToken"] = args ? args.oidcRequestToken : undefined;
|
|
41
|
+
resourceInputs["oidcRequestToken"] = (args === null || args === void 0 ? void 0 : args.oidcRequestToken) ? pulumi.secret(args.oidcRequestToken) : undefined;
|
|
42
42
|
resourceInputs["oidcRequestUrl"] = args ? args.oidcRequestUrl : undefined;
|
|
43
|
-
resourceInputs["oidcToken"] = args ? args.oidcToken : undefined;
|
|
44
|
-
resourceInputs["oidcTokenFilePath"] = args ? args.oidcTokenFilePath : undefined;
|
|
43
|
+
resourceInputs["oidcToken"] = (args === null || args === void 0 ? void 0 : args.oidcToken) ? pulumi.secret(args.oidcToken) : undefined;
|
|
44
|
+
resourceInputs["oidcTokenFilePath"] = (args === null || args === void 0 ? void 0 : args.oidcTokenFilePath) ? pulumi.secret(args.oidcTokenFilePath) : undefined;
|
|
45
45
|
resourceInputs["partnerId"] = args ? args.partnerId : undefined;
|
|
46
46
|
resourceInputs["skipProviderRegistration"] = pulumi.output((_c = (args ? args.skipProviderRegistration : undefined)) !== null && _c !== void 0 ? _c : (utilities.getEnvBoolean("ARM_SKIP_PROVIDER_REGISTRATION") || false)).apply(JSON.stringify);
|
|
47
47
|
resourceInputs["storageUseAzuread"] = pulumi.output((_d = (args ? args.storageUseAzuread : undefined)) !== null && _d !== void 0 ? _d : (utilities.getEnvBoolean("ARM_STORAGE_USE_AZUREAD") || false)).apply(JSON.stringify);
|
|
48
|
-
resourceInputs["subscriptionId"] = (_e = (args ? args.subscriptionId : undefined)) !== null && _e !== void 0 ? _e : (utilities.getEnv("ARM_SUBSCRIPTION_ID") || "");
|
|
49
|
-
resourceInputs["tenantId"] = args ? args.tenantId : undefined;
|
|
48
|
+
resourceInputs["subscriptionId"] = (_e = ((args === null || args === void 0 ? void 0 : args.subscriptionId) ? pulumi.secret(args.subscriptionId) : undefined)) !== null && _e !== void 0 ? _e : (utilities.getEnv("ARM_SUBSCRIPTION_ID") || "");
|
|
49
|
+
resourceInputs["tenantId"] = (args === null || args === void 0 ? void 0 : args.tenantId) ? pulumi.secret(args.tenantId) : undefined;
|
|
50
50
|
resourceInputs["useAksWorkloadIdentity"] = pulumi.output(args ? args.useAksWorkloadIdentity : undefined).apply(JSON.stringify);
|
|
51
51
|
resourceInputs["useCli"] = pulumi.output(args ? args.useCli : undefined).apply(JSON.stringify);
|
|
52
52
|
resourceInputs["useMsi"] = pulumi.output(args ? args.useMsi : undefined).apply(JSON.stringify);
|
|
53
53
|
resourceInputs["useOidc"] = pulumi.output(args ? args.useOidc : undefined).apply(JSON.stringify);
|
|
54
54
|
}
|
|
55
55
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
56
|
+
const secretOpts = { additionalSecretOutputs: ["clientCertificate", "clientCertificatePassword", "clientCertificatePath", "clientId", "clientIdFilePath", "clientSecret", "clientSecretFilePath", "oidcRequestToken", "oidcToken", "oidcTokenFilePath", "subscriptionId", "tenantId"] };
|
|
57
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
56
58
|
super(Provider.__pulumiType, name, resourceInputs, opts);
|
|
57
59
|
}
|
|
58
60
|
/**
|
package/provider.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"provider.js","sourceRoot":"","sources":["../provider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;GAKG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,gBAAgB;IA0FjD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAAmB,EAAE,IAA6B;;QACxE,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB;YACI,cAAc,CAAC,oBAAoB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACvH,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;
|
|
1
|
+
{"version":3,"file":"provider.js","sourceRoot":"","sources":["../provider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;GAKG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,gBAAgB;IA0FjD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAAmB,EAAE,IAA6B;;QACxE,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB;YACI,cAAc,CAAC,oBAAoB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACvH,cAAc,CAAC,mBAAmB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,iBAAiB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAClH,cAAc,CAAC,2BAA2B,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,yBAAyB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1I,cAAc,CAAC,uBAAuB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,qBAAqB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9H,cAAc,CAAC,UAAU,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,QAAQ,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACvF,cAAc,CAAC,kBAAkB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,gBAAgB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC/G,cAAc,CAAC,cAAc,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACnG,cAAc,CAAC,sBAAsB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,oBAAoB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC3H,cAAc,CAAC,6BAA6B,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,2BAA2B,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACzI,cAAc,CAAC,2BAA2B,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrI,cAAc,CAAC,aAAa,CAAC,GAAG,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,mBAAmB,EAAE,iBAAiB,CAAC,IAAI,QAAQ,CAAC,CAAC;YAChJ,cAAc,CAAC,UAAU,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACnG,cAAc,CAAC,cAAc,CAAC,GAAG,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,SAAS,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;YACrH,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,gBAAgB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC/G,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,mBAAmB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,iBAAiB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAClH,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,0BAA0B,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,gCAAgC,CAAC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7M,cAAc,CAAC,mBAAmB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,yBAAyB,CAAC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACxL,cAAc,CAAC,gBAAgB,CAAC,GAAG,MAAA,CAAC,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,cAAc,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,qBAAqB,CAAC,IAAI,EAAE,CAAC,CAAC;YAC9J,cAAc,CAAC,UAAU,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,QAAQ,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACvF,cAAc,CAAC,wBAAwB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/H,cAAc,CAAC,QAAQ,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/F,cAAc,CAAC,QAAQ,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/F,cAAc,CAAC,SAAS,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;SACpG;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,mBAAmB,EAAE,2BAA2B,EAAE,uBAAuB,EAAE,UAAU,EAAE,kBAAkB,EAAE,cAAc,EAAE,sBAAsB,EAAE,kBAAkB,EAAE,WAAW,EAAE,mBAAmB,EAAE,gBAAgB,EAAE,UAAU,CAAC,EAAE,CAAC;QACxR,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;IAjID;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,GAAG,QAAQ,CAAC,YAAY,CAAC;IAC/E,CAAC;;AAbL,4BAsIC;AArIG,gBAAgB;AACO,qBAAY,GAAG,OAAO,CAAC"}
|
|
@@ -59,7 +59,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
59
59
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
60
60
|
* keyVaultId: exampleKeyVault.id,
|
|
61
61
|
* certificate: {
|
|
62
|
-
* contents:
|
|
62
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
63
63
|
* password: "",
|
|
64
64
|
* },
|
|
65
65
|
* });
|
|
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
|
|
|
65
65
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
66
66
|
* keyVaultId: exampleKeyVault.id,
|
|
67
67
|
* certificate: {
|
|
68
|
-
* contents:
|
|
68
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
69
69
|
* password: "",
|
|
70
70
|
* },
|
|
71
71
|
* });
|