@pulumi/azure 5.64.0 → 5.65.0-alpha.1706814605

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/apimanagement/certificate.d.ts +2 -2
  2. package/apimanagement/certificate.js +2 -2
  3. package/apimanagement/gatewayCertificateAuthority.d.ts +1 -1
  4. package/apimanagement/gatewayCertificateAuthority.js +1 -1
  5. package/apimanagement/gatewayHostNameConfiguration.d.ts +1 -1
  6. package/apimanagement/gatewayHostNameConfiguration.js +1 -1
  7. package/appservice/certificate.d.ts +1 -1
  8. package/appservice/certificate.js +1 -1
  9. package/appservice/publicCertificate.d.ts +1 -1
  10. package/appservice/publicCertificate.js +1 -1
  11. package/arckubernetes/cluster.d.ts +1 -1
  12. package/arckubernetes/cluster.js +1 -1
  13. package/arckubernetes/clusterExtension.d.ts +1 -1
  14. package/arckubernetes/clusterExtension.js +1 -1
  15. package/arckubernetes/fluxConfiguration.d.ts +1 -1
  16. package/arckubernetes/fluxConfiguration.js +1 -1
  17. package/automation/certificate.d.ts +1 -1
  18. package/automation/certificate.js +1 -1
  19. package/automation/connectionCertificate.d.ts +1 -1
  20. package/automation/connectionCertificate.js +1 -1
  21. package/batch/certificate.d.ts +1 -1
  22. package/batch/certificate.js +1 -1
  23. package/batch/pool.d.ts +1 -1
  24. package/batch/pool.js +1 -1
  25. package/cdn/frontdoorSecret.d.ts +1 -1
  26. package/cdn/frontdoorSecret.js +1 -1
  27. package/config/vars.d.ts +0 -3
  28. package/config/vars.js.map +1 -1
  29. package/iot/certificate.d.ts +1 -1
  30. package/iot/certificate.js +1 -1
  31. package/iot/iotHubCertificate.d.ts +1 -1
  32. package/iot/iotHubCertificate.js +1 -1
  33. package/keyvault/certifiate.d.ts +1 -1
  34. package/keyvault/certifiate.js +1 -1
  35. package/keyvault/certificate.d.ts +1 -1
  36. package/keyvault/certificate.js +1 -1
  37. package/lab/user.d.ts +1 -1
  38. package/lab/user.js +1 -1
  39. package/logicapps/integrationAccountAssembly.d.ts +1 -1
  40. package/logicapps/integrationAccountAssembly.js +1 -1
  41. package/mssql/managedInstanceActiveDirectoryAdministrator.d.ts +1 -1
  42. package/mssql/managedInstanceActiveDirectoryAdministrator.js +1 -1
  43. package/nginx/certificate.d.ts +1 -1
  44. package/nginx/certificate.js +1 -1
  45. package/package.json +1 -1
  46. package/signalr/serviceCustomCertificate.d.ts +1 -1
  47. package/signalr/serviceCustomCertificate.js +1 -1
  48. package/signalr/serviceCustomDomain.d.ts +1 -1
  49. package/signalr/serviceCustomDomain.js +1 -1
  50. package/types/input.d.ts +108 -0
  51. package/types/output.d.ts +249 -0
@@ -21,7 +21,7 @@ import * as pulumi from "@pulumi/pulumi";
21
21
  * const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
22
22
  * apiManagementName: exampleService.name,
23
23
  * resourceGroupName: exampleResourceGroup.name,
24
- * data: Buffer.from(fs.readFileSync("example.pfx", 'binary')).toString('base64'),
24
+ * data: fs.readFileSync("example.pfx", { encoding: "base64" }),
25
25
  * });
26
26
  * ```
27
27
  * ### With Key Vault Certificate)
@@ -59,7 +59,7 @@ import * as pulumi from "@pulumi/pulumi";
59
59
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
60
60
  * keyVaultId: exampleKeyVault.id,
61
61
  * certificate: {
62
- * contents: Buffer.from(fs.readFileSync("example_cert.pfx", 'binary')).toString('base64'),
62
+ * contents: fs.readFileSync("example_cert.pfx", { encoding: "base64" }),
63
63
  * password: "terraform",
64
64
  * },
65
65
  * certificatePolicy: {
@@ -27,7 +27,7 @@ const utilities = require("../utilities");
27
27
  * const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
28
28
  * apiManagementName: exampleService.name,
29
29
  * resourceGroupName: exampleResourceGroup.name,
30
- * data: Buffer.from(fs.readFileSync("example.pfx", 'binary')).toString('base64'),
30
+ * data: fs.readFileSync("example.pfx", { encoding: "base64" }),
31
31
  * });
32
32
  * ```
33
33
  * ### With Key Vault Certificate)
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
65
65
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
66
66
  * keyVaultId: exampleKeyVault.id,
67
67
  * certificate: {
68
- * contents: Buffer.from(fs.readFileSync("example_cert.pfx", 'binary')).toString('base64'),
68
+ * contents: fs.readFileSync("example_cert.pfx", { encoding: "base64" }),
69
69
  * password: "terraform",
70
70
  * },
71
71
  * certificatePolicy: {
@@ -30,7 +30,7 @@ import * as pulumi from "@pulumi/pulumi";
30
30
  * const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
31
31
  * apiManagementName: exampleService.name,
32
32
  * resourceGroupName: exampleResourceGroup.name,
33
- * data: Buffer.from(fs.readFileSync("example.pfx", 'binary')).toString('base64'),
33
+ * data: fs.readFileSync("example.pfx", { encoding: "base64" }),
34
34
  * });
35
35
  * const exampleGatewayCertificateAuthority = new azure.apimanagement.GatewayCertificateAuthority("exampleGatewayCertificateAuthority", {
36
36
  * apiManagementId: exampleService.id,
@@ -36,7 +36,7 @@ const utilities = require("../utilities");
36
36
  * const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
37
37
  * apiManagementName: exampleService.name,
38
38
  * resourceGroupName: exampleResourceGroup.name,
39
- * data: Buffer.from(fs.readFileSync("example.pfx", 'binary')).toString('base64'),
39
+ * data: fs.readFileSync("example.pfx", { encoding: "base64" }),
40
40
  * });
41
41
  * const exampleGatewayCertificateAuthority = new azure.apimanagement.GatewayCertificateAuthority("exampleGatewayCertificateAuthority", {
42
42
  * apiManagementId: exampleService.id,
@@ -30,7 +30,7 @@ import * as pulumi from "@pulumi/pulumi";
30
30
  * const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
31
31
  * apiManagementName: exampleService.name,
32
32
  * resourceGroupName: exampleResourceGroup.name,
33
- * data: Buffer.from(fs.readFileSync("example.pfx", 'binary')).toString('base64'),
33
+ * data: fs.readFileSync("example.pfx", { encoding: "base64" }),
34
34
  * });
35
35
  * const exampleGatewayHostNameConfiguration = new azure.apimanagement.GatewayHostNameConfiguration("exampleGatewayHostNameConfiguration", {
36
36
  * apiManagementId: exampleService.id,
@@ -36,7 +36,7 @@ const utilities = require("../utilities");
36
36
  * const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
37
37
  * apiManagementName: exampleService.name,
38
38
  * resourceGroupName: exampleResourceGroup.name,
39
- * data: Buffer.from(fs.readFileSync("example.pfx", 'binary')).toString('base64'),
39
+ * data: fs.readFileSync("example.pfx", { encoding: "base64" }),
40
40
  * });
41
41
  * const exampleGatewayHostNameConfiguration = new azure.apimanagement.GatewayHostNameConfiguration("exampleGatewayHostNameConfiguration", {
42
42
  * apiManagementId: exampleService.id,
@@ -15,7 +15,7 @@ import * as pulumi from "@pulumi/pulumi";
15
15
  * const exampleCertificate = new azure.appservice.Certificate("exampleCertificate", {
16
16
  * resourceGroupName: exampleResourceGroup.name,
17
17
  * location: exampleResourceGroup.location,
18
- * pfxBlob: Buffer.from(fs.readFileSync("certificate.pfx", 'binary')).toString('base64'),
18
+ * pfxBlob: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
19
19
  * password: "password123!",
20
20
  * });
21
21
  * ```
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
21
21
  * const exampleCertificate = new azure.appservice.Certificate("exampleCertificate", {
22
22
  * resourceGroupName: exampleResourceGroup.name,
23
23
  * location: exampleResourceGroup.location,
24
- * pfxBlob: Buffer.from(fs.readFileSync("certificate.pfx", 'binary')).toString('base64'),
24
+ * pfxBlob: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
25
25
  * password: "password123!",
26
26
  * });
27
27
  * ```
@@ -28,7 +28,7 @@ import * as pulumi from "@pulumi/pulumi";
28
28
  * appServiceName: exampleAppService.name,
29
29
  * certificateName: "example-public-certificate",
30
30
  * certificateLocation: "Unknown",
31
- * blob: Buffer.from(fs.readFileSync("app_service_public_certificate.cer", 'binary')).toString('base64'),
31
+ * blob: fs.readFileSync("app_service_public_certificate.cer", { encoding: "base64" }),
32
32
  * });
33
33
  * ```
34
34
  *
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
34
34
  * appServiceName: exampleAppService.name,
35
35
  * certificateName: "example-public-certificate",
36
36
  * certificateLocation: "Unknown",
37
- * blob: Buffer.from(fs.readFileSync("app_service_public_certificate.cer", 'binary')).toString('base64'),
37
+ * blob: fs.readFileSync("app_service_public_certificate.cer", { encoding: "base64" }),
38
38
  * });
39
39
  * ```
40
40
  *
@@ -17,7 +17,7 @@ import * as outputs from "../types/output";
17
17
  * const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
18
18
  * resourceGroupName: exampleResourceGroup.name,
19
19
  * location: "West Europe",
20
- * agentPublicKeyCertificate: Buffer.from(fs.readFileSync("testdata/public.cer", 'binary')).toString('base64'),
20
+ * agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
21
21
  * identity: {
22
22
  * type: "SystemAssigned",
23
23
  * },
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
21
21
  * const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
22
22
  * resourceGroupName: exampleResourceGroup.name,
23
23
  * location: "West Europe",
24
- * agentPublicKeyCertificate: Buffer.from(fs.readFileSync("testdata/public.cer", 'binary')).toString('base64'),
24
+ * agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
25
25
  * identity: {
26
26
  * type: "SystemAssigned",
27
27
  * },
@@ -15,7 +15,7 @@ import * as outputs from "../types/output";
15
15
  * const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
16
16
  * resourceGroupName: exampleResourceGroup.name,
17
17
  * location: "West Europe",
18
- * agentPublicKeyCertificate: Buffer.from(fs.readFileSync("testdata/public.cer", 'binary')).toString('base64'),
18
+ * agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
19
19
  * identity: {
20
20
  * type: "SystemAssigned",
21
21
  * },
@@ -19,7 +19,7 @@ const utilities = require("../utilities");
19
19
  * const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
20
20
  * resourceGroupName: exampleResourceGroup.name,
21
21
  * location: "West Europe",
22
- * agentPublicKeyCertificate: Buffer.from(fs.readFileSync("testdata/public.cer", 'binary')).toString('base64'),
22
+ * agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
23
23
  * identity: {
24
24
  * type: "SystemAssigned",
25
25
  * },
@@ -15,7 +15,7 @@ import * as outputs from "../types/output";
15
15
  * const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
16
16
  * resourceGroupName: exampleResourceGroup.name,
17
17
  * location: "West Europe",
18
- * agentPublicKeyCertificate: Buffer.from(fs.readFileSync("testdata/public.cer", 'binary')).toString('base64'),
18
+ * agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
19
19
  * identity: {
20
20
  * type: "SystemAssigned",
21
21
  * },
@@ -19,7 +19,7 @@ const utilities = require("../utilities");
19
19
  * const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
20
20
  * resourceGroupName: exampleResourceGroup.name,
21
21
  * location: "West Europe",
22
- * agentPublicKeyCertificate: Buffer.from(fs.readFileSync("testdata/public.cer", 'binary')).toString('base64'),
22
+ * agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
23
23
  * identity: {
24
24
  * type: "SystemAssigned",
25
25
  * },
@@ -19,7 +19,7 @@ import * as pulumi from "@pulumi/pulumi";
19
19
  * resourceGroupName: exampleResourceGroup.name,
20
20
  * automationAccountName: exampleAccount.name,
21
21
  * description: "This is an example certificate",
22
- * base64: Buffer.from(fs.readFileSync("certificate.pfx", 'binary')).toString('base64'),
22
+ * base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
23
23
  * exportable: true,
24
24
  * });
25
25
  * ```
@@ -25,7 +25,7 @@ const utilities = require("../utilities");
25
25
  * resourceGroupName: exampleResourceGroup.name,
26
26
  * automationAccountName: exampleAccount.name,
27
27
  * description: "This is an example certificate",
28
- * base64: Buffer.from(fs.readFileSync("certificate.pfx", 'binary')).toString('base64'),
28
+ * base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
29
29
  * exportable: true,
30
30
  * });
31
31
  * ```
@@ -19,7 +19,7 @@ import * as pulumi from "@pulumi/pulumi";
19
19
  * const exampleCertificate = new azure.automation.Certificate("exampleCertificate", {
20
20
  * resourceGroupName: exampleResourceGroup.name,
21
21
  * automationAccountName: exampleAccount.name,
22
- * base64: Buffer.from(fs.readFileSync("certificate.pfx", 'binary')).toString('base64'),
22
+ * base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
23
23
  * });
24
24
  * const exampleConnectionCertificate = new azure.automation.ConnectionCertificate("exampleConnectionCertificate", {
25
25
  * resourceGroupName: exampleResourceGroup.name,
@@ -25,7 +25,7 @@ const utilities = require("../utilities");
25
25
  * const exampleCertificate = new azure.automation.Certificate("exampleCertificate", {
26
26
  * resourceGroupName: exampleResourceGroup.name,
27
27
  * automationAccountName: exampleAccount.name,
28
- * base64: Buffer.from(fs.readFileSync("certificate.pfx", 'binary')).toString('base64'),
28
+ * base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
29
29
  * });
30
30
  * const exampleConnectionCertificate = new azure.automation.ConnectionCertificate("exampleConnectionCertificate", {
31
31
  * resourceGroupName: exampleResourceGroup.name,
@@ -29,7 +29,7 @@ import * as pulumi from "@pulumi/pulumi";
29
29
  * const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
30
30
  * resourceGroupName: exampleResourceGroup.name,
31
31
  * accountName: exampleBatch / accountAccount.name,
32
- * certificate: Buffer.from(fs.readFileSync("certificate.pfx", 'binary')).toString('base64'),
32
+ * certificate: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
33
33
  * format: "Pfx",
34
34
  * password: "password",
35
35
  * thumbprint: "42C107874FD0E4A9583292A2F1098E8FE4B2EDDA",
@@ -35,7 +35,7 @@ const utilities = require("../utilities");
35
35
  * const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
36
36
  * resourceGroupName: exampleResourceGroup.name,
37
37
  * accountName: exampleBatch / accountAccount.name,
38
- * certificate: Buffer.from(fs.readFileSync("certificate.pfx", 'binary')).toString('base64'),
38
+ * certificate: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
39
39
  * format: "Pfx",
40
40
  * password: "password",
41
41
  * thumbprint: "42C107874FD0E4A9583292A2F1098E8FE4B2EDDA",
package/batch/pool.d.ts CHANGED
@@ -31,7 +31,7 @@ import * as outputs from "../types/output";
31
31
  * const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
32
32
  * resourceGroupName: exampleResourceGroup.name,
33
33
  * accountName: exampleBatch / accountAccount.name,
34
- * certificate: Buffer.from(fs.readFileSync("certificate.cer", 'binary')).toString('base64'),
34
+ * certificate: fs.readFileSync("certificate.cer", { encoding: "base64" }),
35
35
  * format: "Cer",
36
36
  * thumbprint: "312d31a79fa0cef49c00f769afc2b73e9f4edf34",
37
37
  * thumbprintAlgorithm: "SHA1",
package/batch/pool.js CHANGED
@@ -35,7 +35,7 @@ const utilities = require("../utilities");
35
35
  * const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
36
36
  * resourceGroupName: exampleResourceGroup.name,
37
37
  * accountName: exampleBatch / accountAccount.name,
38
- * certificate: Buffer.from(fs.readFileSync("certificate.cer", 'binary')).toString('base64'),
38
+ * certificate: fs.readFileSync("certificate.cer", { encoding: "base64" }),
39
39
  * format: "Cer",
40
40
  * thumbprint: "312d31a79fa0cef49c00f769afc2b73e9f4edf34",
41
41
  * thumbprintAlgorithm: "SHA1",
@@ -50,7 +50,7 @@ import * as outputs from "../types/output";
50
50
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
51
51
  * keyVaultId: exampleKeyVault.id,
52
52
  * certificate: {
53
- * contents: Buffer.from(fs.readFileSync("my-certificate.pfx", 'binary')).toString('base64'),
53
+ * contents: fs.readFileSync("my-certificate.pfx", { encoding: "base64" }),
54
54
  * },
55
55
  * });
56
56
  * const exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile("exampleFrontdoorProfile", {
@@ -54,7 +54,7 @@ const utilities = require("../utilities");
54
54
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
55
55
  * keyVaultId: exampleKeyVault.id,
56
56
  * certificate: {
57
- * contents: Buffer.from(fs.readFileSync("my-certificate.pfx", 'binary')).toString('base64'),
57
+ * contents: fs.readFileSync("my-certificate.pfx", { encoding: "base64" }),
58
58
  * },
59
59
  * });
60
60
  * const exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile("exampleFrontdoorProfile", {
package/config/vars.d.ts CHANGED
@@ -35,9 +35,6 @@ export declare const clientSecretFilePath: string | undefined;
35
35
  * This will disable the x-ms-correlation-request-id header.
36
36
  */
37
37
  export declare const disableCorrelationRequestId: boolean | undefined;
38
- /**
39
- * This will disable the Terraform Partner ID which is used if a custom `partner_id` isn't specified.
40
- */
41
38
  export declare const disableTerraformPartnerId: boolean | undefined;
42
39
  /**
43
40
  * The Cloud Environment which should be used. Possible values are public, usgovernment, and china. Defaults to public.
@@ -1 +1 @@
1
- {"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAG5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAW,oBAAoB,CAAC,CAAC;IAC9D,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;IACrD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,uBAAuB,EAAE;IACpD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;IACxC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,sBAAsB,EAAE;IACnD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;IAChD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,6BAA6B,EAAE;IAC1D,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,6BAA6B,CAAC,CAAC;IACtE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,2BAA2B,CAAC,CAAC;IACpE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,aAAa,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,mBAAmB,EAAE,iBAAiB,CAAC,IAAI,QAAQ,CAAC,CAAC;IACjH,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA0B,UAAU,CAAC,CAAC;IACnE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,mCAAI,SAAS,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;IACxE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,mCAAI,SAAS,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;IACrF,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;IACvC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,gBAAgB,EAAE;IAC7C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;IAC1C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,0BAA0B,EAAE;IACvD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,0BAA0B,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,gCAAgC,CAAC,IAAI,KAAK,CAAC,CAAC;IAC3I,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,mBAAmB,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,yBAAyB,CAAC,IAAI,KAAK,CAAC,CAAC;IAC7H,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,gBAAgB,EAAE;IAC7C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,gBAAgB,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,qBAAqB,CAAC,IAAI,EAAE,CAAC,CAAC;IAC7F,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,wBAAwB,EAAE;IACrD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,wBAAwB,CAAC,CAAC;IACjE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;IACrC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,QAAQ,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;IACrC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,QAAQ,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,SAAS,CAAC,CAAC;IAClD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC"}
1
+ {"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAG5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAW,oBAAoB,CAAC,CAAC;IAC9D,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;IACrD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,uBAAuB,EAAE;IACpD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;IACxC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,sBAAsB,EAAE;IACnD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;IAChD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,6BAA6B,EAAE;IAC1D,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,6BAA6B,CAAC,CAAC;IACtE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,2BAA2B,CAAC,CAAC;IACpE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,aAAa,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,mBAAmB,EAAE,iBAAiB,CAAC,IAAI,QAAQ,CAAC,CAAC;IACjH,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA0B,UAAU,CAAC,CAAC;IACnE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,mCAAI,SAAS,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;IACxE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,mCAAI,SAAS,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;IACrF,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;IACvC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,gBAAgB,EAAE;IAC7C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;IAC1C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,0BAA0B,EAAE;IACvD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,0BAA0B,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,gCAAgC,CAAC,IAAI,KAAK,CAAC,CAAC;IAC3I,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,mBAAmB,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,yBAAyB,CAAC,IAAI,KAAK,CAAC,CAAC;IAC7H,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,gBAAgB,EAAE;IAC7C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,gBAAgB,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,qBAAqB,CAAC,IAAI,EAAE,CAAC,CAAC;IAC7F,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,wBAAwB,EAAE;IACrD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,wBAAwB,CAAC,CAAC;IACjE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;IACrC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,QAAQ,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;IACrC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,QAAQ,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,SAAS,CAAC,CAAC;IAClD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC"}
@@ -22,7 +22,7 @@ import * as pulumi from "@pulumi/pulumi";
22
22
  * resourceGroupName: exampleResourceGroup.name,
23
23
  * iothubName: exampleIoTHub.name,
24
24
  * isVerified: true,
25
- * certificateContent: Buffer.from(fs.readFileSync("example.cer", 'binary')).toString('base64'),
25
+ * certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
26
26
  * });
27
27
  * ```
28
28
  *
@@ -28,7 +28,7 @@ const utilities = require("../utilities");
28
28
  * resourceGroupName: exampleResourceGroup.name,
29
29
  * iothubName: exampleIoTHub.name,
30
30
  * isVerified: true,
31
- * certificateContent: Buffer.from(fs.readFileSync("example.cer", 'binary')).toString('base64'),
31
+ * certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
32
32
  * });
33
33
  * ```
34
34
  *
@@ -21,7 +21,7 @@ import * as pulumi from "@pulumi/pulumi";
21
21
  * const exampleIotHubCertificate = new azure.iot.IotHubCertificate("exampleIotHubCertificate", {
22
22
  * resourceGroupName: exampleResourceGroup.name,
23
23
  * iotDpsName: exampleIotHubDps.name,
24
- * certificateContent: Buffer.from(fs.readFileSync("example.cer", 'binary')).toString('base64'),
24
+ * certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
25
25
  * });
26
26
  * ```
27
27
  *
@@ -27,7 +27,7 @@ const utilities = require("../utilities");
27
27
  * const exampleIotHubCertificate = new azure.iot.IotHubCertificate("exampleIotHubCertificate", {
28
28
  * resourceGroupName: exampleResourceGroup.name,
29
29
  * iotDpsName: exampleIotHubDps.name,
30
- * certificateContent: Buffer.from(fs.readFileSync("example.cer", 'binary')).toString('base64'),
30
+ * certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
31
31
  * });
32
32
  * ```
33
33
  *
@@ -76,7 +76,7 @@ import * as outputs from "../types/output";
76
76
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
77
77
  * keyVaultId: exampleKeyVault.id,
78
78
  * certificate: {
79
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
79
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
80
80
  * password: "",
81
81
  * },
82
82
  * });
@@ -80,7 +80,7 @@ const utilities = require("../utilities");
80
80
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
81
81
  * keyVaultId: exampleKeyVault.id,
82
82
  * certificate: {
83
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
83
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
84
84
  * password: "",
85
85
  * },
86
86
  * });
@@ -76,7 +76,7 @@ import * as outputs from "../types/output";
76
76
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
77
77
  * keyVaultId: exampleKeyVault.id,
78
78
  * certificate: {
79
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
79
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
80
80
  * password: "",
81
81
  * },
82
82
  * });
@@ -80,7 +80,7 @@ const utilities = require("../utilities");
80
80
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
81
81
  * keyVaultId: exampleKeyVault.id,
82
82
  * certificate: {
83
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
83
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
84
84
  * password: "",
85
85
  * },
86
86
  * });
package/lab/user.d.ts CHANGED
@@ -35,7 +35,7 @@ import * as pulumi from "@pulumi/pulumi";
35
35
  * });
36
36
  * const exampleUser = new azure.lab.User("exampleUser", {
37
37
  * labId: exampleLab.id,
38
- * email: "terraform-acctest@hashicorp.com",
38
+ * email: "terraform-acctest@example.com",
39
39
  * });
40
40
  * ```
41
41
  *
package/lab/user.js CHANGED
@@ -41,7 +41,7 @@ const utilities = require("../utilities");
41
41
  * });
42
42
  * const exampleUser = new azure.lab.User("exampleUser", {
43
43
  * labId: exampleLab.id,
44
- * email: "terraform-acctest@hashicorp.com",
44
+ * email: "terraform-acctest@example.com",
45
45
  * });
46
46
  * ```
47
47
  *
@@ -19,7 +19,7 @@ import * as pulumi from "@pulumi/pulumi";
19
19
  * resourceGroupName: exampleResourceGroup.name,
20
20
  * integrationAccountName: exampleIntegrationAccount.name,
21
21
  * assemblyName: "TestAssembly",
22
- * content: Buffer.from(fs.readFileSync("testdata/log4net.dll", 'binary')).toString('base64'),
22
+ * content: fs.readFileSync("testdata/log4net.dll", { encoding: "base64" }),
23
23
  * });
24
24
  * ```
25
25
  *
@@ -25,7 +25,7 @@ const utilities = require("../utilities");
25
25
  * resourceGroupName: exampleResourceGroup.name,
26
26
  * integrationAccountName: exampleIntegrationAccount.name,
27
27
  * assemblyName: "TestAssembly",
28
- * content: Buffer.from(fs.readFileSync("testdata/log4net.dll", 'binary')).toString('base64'),
28
+ * content: fs.readFileSync("testdata/log4net.dll", { encoding: "base64" }),
29
29
  * });
30
30
  * ```
31
31
  *
@@ -41,7 +41,7 @@ import * as pulumi from "@pulumi/pulumi";
41
41
  * memberObjectId: exampleManagedInstance.identity.apply(identity => identity?.principalId),
42
42
  * });
43
43
  * const admin = new azuread.User("admin", {
44
- * userPrincipalName: "ms.admin@hashicorp.com",
44
+ * userPrincipalName: "ms.admin@example.com",
45
45
  * displayName: "Ms Admin",
46
46
  * mailNickname: "ms.admin",
47
47
  * password: "SecretP@sswd99!",
@@ -47,7 +47,7 @@ const utilities = require("../utilities");
47
47
  * memberObjectId: exampleManagedInstance.identity.apply(identity => identity?.principalId),
48
48
  * });
49
49
  * const admin = new azuread.User("admin", {
50
- * userPrincipalName: "ms.admin@hashicorp.com",
50
+ * userPrincipalName: "ms.admin@example.com",
51
51
  * displayName: "Ms Admin",
52
52
  * mailNickname: "ms.admin",
53
53
  * password: "SecretP@sswd99!",
@@ -77,7 +77,7 @@ import * as pulumi from "@pulumi/pulumi";
77
77
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
78
78
  * keyVaultId: exampleKeyVault.id,
79
79
  * certificate: {
80
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
80
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
81
81
  * password: "",
82
82
  * },
83
83
  * });
@@ -83,7 +83,7 @@ const utilities = require("../utilities");
83
83
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
84
84
  * keyVaultId: exampleKeyVault.id,
85
85
  * certificate: {
86
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
86
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
87
87
  * password: "",
88
88
  * },
89
89
  * });
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/azure",
3
- "version": "v5.64.0",
3
+ "version": "v5.65.0-alpha.1706814605+165269e2",
4
4
  "description": "A Pulumi package for creating and managing Microsoft Azure cloud resources, based on the Terraform azurerm provider. We recommend using the [Azure Native provider](https://github.com/pulumi/pulumi-azure-native) to provision Azure infrastructure. Azure Native provides complete coverage of Azure resources and same-day access to new resources and resource updates.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -59,7 +59,7 @@ import * as pulumi from "@pulumi/pulumi";
59
59
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
60
60
  * keyVaultId: exampleKeyVault.id,
61
61
  * certificate: {
62
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
62
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
63
63
  * password: "",
64
64
  * },
65
65
  * });
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
65
65
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
66
66
  * keyVaultId: exampleKeyVault.id,
67
67
  * certificate: {
68
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
68
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
69
69
  * password: "",
70
70
  * },
71
71
  * });
@@ -59,7 +59,7 @@ import * as pulumi from "@pulumi/pulumi";
59
59
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
60
60
  * keyVaultId: exampleKeyVault.id,
61
61
  * certificate: {
62
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
62
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
63
63
  * password: "",
64
64
  * },
65
65
  * });
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
65
65
  * const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
66
66
  * keyVaultId: exampleKeyVault.id,
67
67
  * certificate: {
68
- * contents: Buffer.from(fs.readFileSync("certificate-to-import.pfx", 'binary')).toString('base64'),
68
+ * contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
69
69
  * password: "",
70
70
  * },
71
71
  * });