@pulumi/azure 5.65.0-alpha.1706746797 → 5.65.0-alpha.1706814605
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/apimanagement/certificate.d.ts +2 -2
- package/apimanagement/certificate.js +2 -2
- package/apimanagement/gatewayCertificateAuthority.d.ts +1 -1
- package/apimanagement/gatewayCertificateAuthority.js +1 -1
- package/apimanagement/gatewayHostNameConfiguration.d.ts +1 -1
- package/apimanagement/gatewayHostNameConfiguration.js +1 -1
- package/appservice/certificate.d.ts +1 -1
- package/appservice/certificate.js +1 -1
- package/appservice/publicCertificate.d.ts +1 -1
- package/appservice/publicCertificate.js +1 -1
- package/arckubernetes/cluster.d.ts +1 -1
- package/arckubernetes/cluster.js +1 -1
- package/arckubernetes/clusterExtension.d.ts +1 -1
- package/arckubernetes/clusterExtension.js +1 -1
- package/arckubernetes/fluxConfiguration.d.ts +1 -1
- package/arckubernetes/fluxConfiguration.js +1 -1
- package/automation/certificate.d.ts +1 -1
- package/automation/certificate.js +1 -1
- package/automation/connectionCertificate.d.ts +1 -1
- package/automation/connectionCertificate.js +1 -1
- package/batch/certificate.d.ts +1 -1
- package/batch/certificate.js +1 -1
- package/batch/pool.d.ts +1 -1
- package/batch/pool.js +1 -1
- package/cdn/frontdoorSecret.d.ts +1 -1
- package/cdn/frontdoorSecret.js +1 -1
- package/config/vars.d.ts +0 -3
- package/config/vars.js.map +1 -1
- package/iot/certificate.d.ts +1 -1
- package/iot/certificate.js +1 -1
- package/iot/iotHubCertificate.d.ts +1 -1
- package/iot/iotHubCertificate.js +1 -1
- package/keyvault/certifiate.d.ts +1 -1
- package/keyvault/certifiate.js +1 -1
- package/keyvault/certificate.d.ts +1 -1
- package/keyvault/certificate.js +1 -1
- package/lab/user.d.ts +1 -1
- package/lab/user.js +1 -1
- package/logicapps/integrationAccountAssembly.d.ts +1 -1
- package/logicapps/integrationAccountAssembly.js +1 -1
- package/mssql/managedInstanceActiveDirectoryAdministrator.d.ts +1 -1
- package/mssql/managedInstanceActiveDirectoryAdministrator.js +1 -1
- package/nginx/certificate.d.ts +1 -1
- package/nginx/certificate.js +1 -1
- package/package.json +1 -1
- package/signalr/serviceCustomCertificate.d.ts +1 -1
- package/signalr/serviceCustomCertificate.js +1 -1
- package/signalr/serviceCustomDomain.d.ts +1 -1
- package/signalr/serviceCustomDomain.js +1 -1
- package/types/input.d.ts +108 -0
- package/types/output.d.ts +249 -0
|
@@ -21,7 +21,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
21
21
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
22
22
|
* apiManagementName: exampleService.name,
|
|
23
23
|
* resourceGroupName: exampleResourceGroup.name,
|
|
24
|
-
* data:
|
|
24
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
25
25
|
* });
|
|
26
26
|
* ```
|
|
27
27
|
* ### With Key Vault Certificate)
|
|
@@ -59,7 +59,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
59
59
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
60
60
|
* keyVaultId: exampleKeyVault.id,
|
|
61
61
|
* certificate: {
|
|
62
|
-
* contents:
|
|
62
|
+
* contents: fs.readFileSync("example_cert.pfx", { encoding: "base64" }),
|
|
63
63
|
* password: "terraform",
|
|
64
64
|
* },
|
|
65
65
|
* certificatePolicy: {
|
|
@@ -27,7 +27,7 @@ const utilities = require("../utilities");
|
|
|
27
27
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
28
28
|
* apiManagementName: exampleService.name,
|
|
29
29
|
* resourceGroupName: exampleResourceGroup.name,
|
|
30
|
-
* data:
|
|
30
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
31
31
|
* });
|
|
32
32
|
* ```
|
|
33
33
|
* ### With Key Vault Certificate)
|
|
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
|
|
|
65
65
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
66
66
|
* keyVaultId: exampleKeyVault.id,
|
|
67
67
|
* certificate: {
|
|
68
|
-
* contents:
|
|
68
|
+
* contents: fs.readFileSync("example_cert.pfx", { encoding: "base64" }),
|
|
69
69
|
* password: "terraform",
|
|
70
70
|
* },
|
|
71
71
|
* certificatePolicy: {
|
|
@@ -30,7 +30,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
30
30
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
31
31
|
* apiManagementName: exampleService.name,
|
|
32
32
|
* resourceGroupName: exampleResourceGroup.name,
|
|
33
|
-
* data:
|
|
33
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
34
34
|
* });
|
|
35
35
|
* const exampleGatewayCertificateAuthority = new azure.apimanagement.GatewayCertificateAuthority("exampleGatewayCertificateAuthority", {
|
|
36
36
|
* apiManagementId: exampleService.id,
|
|
@@ -36,7 +36,7 @@ const utilities = require("../utilities");
|
|
|
36
36
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
37
37
|
* apiManagementName: exampleService.name,
|
|
38
38
|
* resourceGroupName: exampleResourceGroup.name,
|
|
39
|
-
* data:
|
|
39
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
40
40
|
* });
|
|
41
41
|
* const exampleGatewayCertificateAuthority = new azure.apimanagement.GatewayCertificateAuthority("exampleGatewayCertificateAuthority", {
|
|
42
42
|
* apiManagementId: exampleService.id,
|
|
@@ -30,7 +30,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
30
30
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
31
31
|
* apiManagementName: exampleService.name,
|
|
32
32
|
* resourceGroupName: exampleResourceGroup.name,
|
|
33
|
-
* data:
|
|
33
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
34
34
|
* });
|
|
35
35
|
* const exampleGatewayHostNameConfiguration = new azure.apimanagement.GatewayHostNameConfiguration("exampleGatewayHostNameConfiguration", {
|
|
36
36
|
* apiManagementId: exampleService.id,
|
|
@@ -36,7 +36,7 @@ const utilities = require("../utilities");
|
|
|
36
36
|
* const exampleCertificate = new azure.apimanagement.Certificate("exampleCertificate", {
|
|
37
37
|
* apiManagementName: exampleService.name,
|
|
38
38
|
* resourceGroupName: exampleResourceGroup.name,
|
|
39
|
-
* data:
|
|
39
|
+
* data: fs.readFileSync("example.pfx", { encoding: "base64" }),
|
|
40
40
|
* });
|
|
41
41
|
* const exampleGatewayHostNameConfiguration = new azure.apimanagement.GatewayHostNameConfiguration("exampleGatewayHostNameConfiguration", {
|
|
42
42
|
* apiManagementId: exampleService.id,
|
|
@@ -15,7 +15,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
15
15
|
* const exampleCertificate = new azure.appservice.Certificate("exampleCertificate", {
|
|
16
16
|
* resourceGroupName: exampleResourceGroup.name,
|
|
17
17
|
* location: exampleResourceGroup.location,
|
|
18
|
-
* pfxBlob:
|
|
18
|
+
* pfxBlob: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
19
19
|
* password: "password123!",
|
|
20
20
|
* });
|
|
21
21
|
* ```
|
|
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
|
|
|
21
21
|
* const exampleCertificate = new azure.appservice.Certificate("exampleCertificate", {
|
|
22
22
|
* resourceGroupName: exampleResourceGroup.name,
|
|
23
23
|
* location: exampleResourceGroup.location,
|
|
24
|
-
* pfxBlob:
|
|
24
|
+
* pfxBlob: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
25
25
|
* password: "password123!",
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
|
@@ -28,7 +28,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
28
28
|
* appServiceName: exampleAppService.name,
|
|
29
29
|
* certificateName: "example-public-certificate",
|
|
30
30
|
* certificateLocation: "Unknown",
|
|
31
|
-
* blob:
|
|
31
|
+
* blob: fs.readFileSync("app_service_public_certificate.cer", { encoding: "base64" }),
|
|
32
32
|
* });
|
|
33
33
|
* ```
|
|
34
34
|
*
|
|
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
|
|
|
34
34
|
* appServiceName: exampleAppService.name,
|
|
35
35
|
* certificateName: "example-public-certificate",
|
|
36
36
|
* certificateLocation: "Unknown",
|
|
37
|
-
* blob:
|
|
37
|
+
* blob: fs.readFileSync("app_service_public_certificate.cer", { encoding: "base64" }),
|
|
38
38
|
* });
|
|
39
39
|
* ```
|
|
40
40
|
*
|
|
@@ -17,7 +17,7 @@ import * as outputs from "../types/output";
|
|
|
17
17
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
18
18
|
* resourceGroupName: exampleResourceGroup.name,
|
|
19
19
|
* location: "West Europe",
|
|
20
|
-
* agentPublicKeyCertificate:
|
|
20
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
21
21
|
* identity: {
|
|
22
22
|
* type: "SystemAssigned",
|
|
23
23
|
* },
|
package/arckubernetes/cluster.js
CHANGED
|
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
|
|
|
21
21
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
22
22
|
* resourceGroupName: exampleResourceGroup.name,
|
|
23
23
|
* location: "West Europe",
|
|
24
|
-
* agentPublicKeyCertificate:
|
|
24
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
25
25
|
* identity: {
|
|
26
26
|
* type: "SystemAssigned",
|
|
27
27
|
* },
|
|
@@ -15,7 +15,7 @@ import * as outputs from "../types/output";
|
|
|
15
15
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
16
16
|
* resourceGroupName: exampleResourceGroup.name,
|
|
17
17
|
* location: "West Europe",
|
|
18
|
-
* agentPublicKeyCertificate:
|
|
18
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
19
19
|
* identity: {
|
|
20
20
|
* type: "SystemAssigned",
|
|
21
21
|
* },
|
|
@@ -19,7 +19,7 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
20
20
|
* resourceGroupName: exampleResourceGroup.name,
|
|
21
21
|
* location: "West Europe",
|
|
22
|
-
* agentPublicKeyCertificate:
|
|
22
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
23
23
|
* identity: {
|
|
24
24
|
* type: "SystemAssigned",
|
|
25
25
|
* },
|
|
@@ -15,7 +15,7 @@ import * as outputs from "../types/output";
|
|
|
15
15
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
16
16
|
* resourceGroupName: exampleResourceGroup.name,
|
|
17
17
|
* location: "West Europe",
|
|
18
|
-
* agentPublicKeyCertificate:
|
|
18
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
19
19
|
* identity: {
|
|
20
20
|
* type: "SystemAssigned",
|
|
21
21
|
* },
|
|
@@ -19,7 +19,7 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* const exampleCluster = new azure.arckubernetes.Cluster("exampleCluster", {
|
|
20
20
|
* resourceGroupName: exampleResourceGroup.name,
|
|
21
21
|
* location: "West Europe",
|
|
22
|
-
* agentPublicKeyCertificate:
|
|
22
|
+
* agentPublicKeyCertificate: fs.readFileSync("testdata/public.cer", { encoding: "base64" }),
|
|
23
23
|
* identity: {
|
|
24
24
|
* type: "SystemAssigned",
|
|
25
25
|
* },
|
|
@@ -19,7 +19,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
19
|
* resourceGroupName: exampleResourceGroup.name,
|
|
20
20
|
* automationAccountName: exampleAccount.name,
|
|
21
21
|
* description: "This is an example certificate",
|
|
22
|
-
* base64:
|
|
22
|
+
* base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
23
23
|
* exportable: true,
|
|
24
24
|
* });
|
|
25
25
|
* ```
|
|
@@ -25,7 +25,7 @@ const utilities = require("../utilities");
|
|
|
25
25
|
* resourceGroupName: exampleResourceGroup.name,
|
|
26
26
|
* automationAccountName: exampleAccount.name,
|
|
27
27
|
* description: "This is an example certificate",
|
|
28
|
-
* base64:
|
|
28
|
+
* base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
29
29
|
* exportable: true,
|
|
30
30
|
* });
|
|
31
31
|
* ```
|
|
@@ -19,7 +19,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
19
|
* const exampleCertificate = new azure.automation.Certificate("exampleCertificate", {
|
|
20
20
|
* resourceGroupName: exampleResourceGroup.name,
|
|
21
21
|
* automationAccountName: exampleAccount.name,
|
|
22
|
-
* base64:
|
|
22
|
+
* base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
23
23
|
* });
|
|
24
24
|
* const exampleConnectionCertificate = new azure.automation.ConnectionCertificate("exampleConnectionCertificate", {
|
|
25
25
|
* resourceGroupName: exampleResourceGroup.name,
|
|
@@ -25,7 +25,7 @@ const utilities = require("../utilities");
|
|
|
25
25
|
* const exampleCertificate = new azure.automation.Certificate("exampleCertificate", {
|
|
26
26
|
* resourceGroupName: exampleResourceGroup.name,
|
|
27
27
|
* automationAccountName: exampleAccount.name,
|
|
28
|
-
* base64:
|
|
28
|
+
* base64: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
29
29
|
* });
|
|
30
30
|
* const exampleConnectionCertificate = new azure.automation.ConnectionCertificate("exampleConnectionCertificate", {
|
|
31
31
|
* resourceGroupName: exampleResourceGroup.name,
|
package/batch/certificate.d.ts
CHANGED
|
@@ -29,7 +29,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
29
29
|
* const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
|
|
30
30
|
* resourceGroupName: exampleResourceGroup.name,
|
|
31
31
|
* accountName: exampleBatch / accountAccount.name,
|
|
32
|
-
* certificate:
|
|
32
|
+
* certificate: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
33
33
|
* format: "Pfx",
|
|
34
34
|
* password: "password",
|
|
35
35
|
* thumbprint: "42C107874FD0E4A9583292A2F1098E8FE4B2EDDA",
|
package/batch/certificate.js
CHANGED
|
@@ -35,7 +35,7 @@ const utilities = require("../utilities");
|
|
|
35
35
|
* const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
|
|
36
36
|
* resourceGroupName: exampleResourceGroup.name,
|
|
37
37
|
* accountName: exampleBatch / accountAccount.name,
|
|
38
|
-
* certificate:
|
|
38
|
+
* certificate: fs.readFileSync("certificate.pfx", { encoding: "base64" }),
|
|
39
39
|
* format: "Pfx",
|
|
40
40
|
* password: "password",
|
|
41
41
|
* thumbprint: "42C107874FD0E4A9583292A2F1098E8FE4B2EDDA",
|
package/batch/pool.d.ts
CHANGED
|
@@ -31,7 +31,7 @@ import * as outputs from "../types/output";
|
|
|
31
31
|
* const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
|
|
32
32
|
* resourceGroupName: exampleResourceGroup.name,
|
|
33
33
|
* accountName: exampleBatch / accountAccount.name,
|
|
34
|
-
* certificate:
|
|
34
|
+
* certificate: fs.readFileSync("certificate.cer", { encoding: "base64" }),
|
|
35
35
|
* format: "Cer",
|
|
36
36
|
* thumbprint: "312d31a79fa0cef49c00f769afc2b73e9f4edf34",
|
|
37
37
|
* thumbprintAlgorithm: "SHA1",
|
package/batch/pool.js
CHANGED
|
@@ -35,7 +35,7 @@ const utilities = require("../utilities");
|
|
|
35
35
|
* const exampleCertificate = new azure.batch.Certificate("exampleCertificate", {
|
|
36
36
|
* resourceGroupName: exampleResourceGroup.name,
|
|
37
37
|
* accountName: exampleBatch / accountAccount.name,
|
|
38
|
-
* certificate:
|
|
38
|
+
* certificate: fs.readFileSync("certificate.cer", { encoding: "base64" }),
|
|
39
39
|
* format: "Cer",
|
|
40
40
|
* thumbprint: "312d31a79fa0cef49c00f769afc2b73e9f4edf34",
|
|
41
41
|
* thumbprintAlgorithm: "SHA1",
|
package/cdn/frontdoorSecret.d.ts
CHANGED
|
@@ -50,7 +50,7 @@ import * as outputs from "../types/output";
|
|
|
50
50
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
51
51
|
* keyVaultId: exampleKeyVault.id,
|
|
52
52
|
* certificate: {
|
|
53
|
-
* contents:
|
|
53
|
+
* contents: fs.readFileSync("my-certificate.pfx", { encoding: "base64" }),
|
|
54
54
|
* },
|
|
55
55
|
* });
|
|
56
56
|
* const exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile("exampleFrontdoorProfile", {
|
package/cdn/frontdoorSecret.js
CHANGED
|
@@ -54,7 +54,7 @@ const utilities = require("../utilities");
|
|
|
54
54
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
55
55
|
* keyVaultId: exampleKeyVault.id,
|
|
56
56
|
* certificate: {
|
|
57
|
-
* contents:
|
|
57
|
+
* contents: fs.readFileSync("my-certificate.pfx", { encoding: "base64" }),
|
|
58
58
|
* },
|
|
59
59
|
* });
|
|
60
60
|
* const exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile("exampleFrontdoorProfile", {
|
package/config/vars.d.ts
CHANGED
|
@@ -35,9 +35,6 @@ export declare const clientSecretFilePath: string | undefined;
|
|
|
35
35
|
* This will disable the x-ms-correlation-request-id header.
|
|
36
36
|
*/
|
|
37
37
|
export declare const disableCorrelationRequestId: boolean | undefined;
|
|
38
|
-
/**
|
|
39
|
-
* This will disable the Terraform Partner ID which is used if a custom `partner_id` isn't specified.
|
|
40
|
-
*/
|
|
41
38
|
export declare const disableTerraformPartnerId: boolean | undefined;
|
|
42
39
|
/**
|
|
43
40
|
* The Cloud Environment which should be used. Possible values are public, usgovernment, and china. Defaults to public.
|
package/config/vars.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAG5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAW,oBAAoB,CAAC,CAAC;IAC9D,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;IACrD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,uBAAuB,EAAE;IACpD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;IACxC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,sBAAsB,EAAE;IACnD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;IAChD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,6BAA6B,EAAE;IAC1D,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,6BAA6B,CAAC,CAAC;IACtE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;
|
|
1
|
+
{"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAG5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAW,oBAAoB,CAAC,CAAC;IAC9D,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;IACrD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,uBAAuB,EAAE;IACpD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,uBAAuB,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;IACxC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,sBAAsB,EAAE;IACnD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;IAChD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,6BAA6B,EAAE;IAC1D,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,6BAA6B,CAAC,CAAC;IACtE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,2BAA2B,EAAE;IACxD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,2BAA2B,CAAC,CAAC;IACpE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,aAAa,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,mBAAmB,EAAE,iBAAiB,CAAC,IAAI,QAAQ,CAAC,CAAC;IACjH,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA0B,UAAU,CAAC,CAAC;IACnE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAGH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,mCAAI,SAAS,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;IACxE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,cAAc,EAAE;IAC3C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,cAAc,CAAC,mCAAI,SAAS,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC;IACrF,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;IACvC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,kBAAkB,EAAE;IAC/C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAC5C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,gBAAgB,EAAE;IAC7C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;IAC1C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,mBAAmB,CAAC,CAAC;IAC7C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAOH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,0BAA0B,EAAE;IACvD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,0BAA0B,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,gCAAgC,CAAC,IAAI,KAAK,CAAC,CAAC;IAC3I,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,mBAAmB,EAAE;IAChD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,mBAAmB,CAAC,mCAAI,CAAC,SAAS,CAAC,aAAa,CAAC,yBAAyB,CAAC,IAAI,KAAK,CAAC,CAAC;IAC7H,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,gBAAgB,EAAE;IAC7C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,GAAG,CAAC,gBAAgB,CAAC,mCAAI,CAAC,SAAS,CAAC,MAAM,CAAC,qBAAqB,CAAC,IAAI,EAAE,CAAC,CAAC;IAC7F,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,UAAU,EAAE;IACvC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;IACpC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,wBAAwB,EAAE;IACrD,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,wBAAwB,CAAC,CAAC;IACjE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;IACrC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,QAAQ,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;IACrC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,QAAQ,CAAC,CAAC;IACjD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,SAAS,CAAC,CAAC;IAClD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC"}
|
package/iot/certificate.d.ts
CHANGED
|
@@ -22,7 +22,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
22
22
|
* resourceGroupName: exampleResourceGroup.name,
|
|
23
23
|
* iothubName: exampleIoTHub.name,
|
|
24
24
|
* isVerified: true,
|
|
25
|
-
* certificateContent:
|
|
25
|
+
* certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
|
28
28
|
*
|
package/iot/certificate.js
CHANGED
|
@@ -28,7 +28,7 @@ const utilities = require("../utilities");
|
|
|
28
28
|
* resourceGroupName: exampleResourceGroup.name,
|
|
29
29
|
* iothubName: exampleIoTHub.name,
|
|
30
30
|
* isVerified: true,
|
|
31
|
-
* certificateContent:
|
|
31
|
+
* certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
|
|
32
32
|
* });
|
|
33
33
|
* ```
|
|
34
34
|
*
|
|
@@ -21,7 +21,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
21
21
|
* const exampleIotHubCertificate = new azure.iot.IotHubCertificate("exampleIotHubCertificate", {
|
|
22
22
|
* resourceGroupName: exampleResourceGroup.name,
|
|
23
23
|
* iotDpsName: exampleIotHubDps.name,
|
|
24
|
-
* certificateContent:
|
|
24
|
+
* certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
|
|
25
25
|
* });
|
|
26
26
|
* ```
|
|
27
27
|
*
|
package/iot/iotHubCertificate.js
CHANGED
|
@@ -27,7 +27,7 @@ const utilities = require("../utilities");
|
|
|
27
27
|
* const exampleIotHubCertificate = new azure.iot.IotHubCertificate("exampleIotHubCertificate", {
|
|
28
28
|
* resourceGroupName: exampleResourceGroup.name,
|
|
29
29
|
* iotDpsName: exampleIotHubDps.name,
|
|
30
|
-
* certificateContent:
|
|
30
|
+
* certificateContent: fs.readFileSync("example.cer", { encoding: "base64" }),
|
|
31
31
|
* });
|
|
32
32
|
* ```
|
|
33
33
|
*
|
package/keyvault/certifiate.d.ts
CHANGED
|
@@ -76,7 +76,7 @@ import * as outputs from "../types/output";
|
|
|
76
76
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
77
77
|
* keyVaultId: exampleKeyVault.id,
|
|
78
78
|
* certificate: {
|
|
79
|
-
* contents:
|
|
79
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
80
80
|
* password: "",
|
|
81
81
|
* },
|
|
82
82
|
* });
|
package/keyvault/certifiate.js
CHANGED
|
@@ -80,7 +80,7 @@ const utilities = require("../utilities");
|
|
|
80
80
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
81
81
|
* keyVaultId: exampleKeyVault.id,
|
|
82
82
|
* certificate: {
|
|
83
|
-
* contents:
|
|
83
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
84
84
|
* password: "",
|
|
85
85
|
* },
|
|
86
86
|
* });
|
|
@@ -76,7 +76,7 @@ import * as outputs from "../types/output";
|
|
|
76
76
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
77
77
|
* keyVaultId: exampleKeyVault.id,
|
|
78
78
|
* certificate: {
|
|
79
|
-
* contents:
|
|
79
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
80
80
|
* password: "",
|
|
81
81
|
* },
|
|
82
82
|
* });
|
package/keyvault/certificate.js
CHANGED
|
@@ -80,7 +80,7 @@ const utilities = require("../utilities");
|
|
|
80
80
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
81
81
|
* keyVaultId: exampleKeyVault.id,
|
|
82
82
|
* certificate: {
|
|
83
|
-
* contents:
|
|
83
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
84
84
|
* password: "",
|
|
85
85
|
* },
|
|
86
86
|
* });
|
package/lab/user.d.ts
CHANGED
package/lab/user.js
CHANGED
|
@@ -19,7 +19,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
19
|
* resourceGroupName: exampleResourceGroup.name,
|
|
20
20
|
* integrationAccountName: exampleIntegrationAccount.name,
|
|
21
21
|
* assemblyName: "TestAssembly",
|
|
22
|
-
* content:
|
|
22
|
+
* content: fs.readFileSync("testdata/log4net.dll", { encoding: "base64" }),
|
|
23
23
|
* });
|
|
24
24
|
* ```
|
|
25
25
|
*
|
|
@@ -25,7 +25,7 @@ const utilities = require("../utilities");
|
|
|
25
25
|
* resourceGroupName: exampleResourceGroup.name,
|
|
26
26
|
* integrationAccountName: exampleIntegrationAccount.name,
|
|
27
27
|
* assemblyName: "TestAssembly",
|
|
28
|
-
* content:
|
|
28
|
+
* content: fs.readFileSync("testdata/log4net.dll", { encoding: "base64" }),
|
|
29
29
|
* });
|
|
30
30
|
* ```
|
|
31
31
|
*
|
|
@@ -41,7 +41,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
41
41
|
* memberObjectId: exampleManagedInstance.identity.apply(identity => identity?.principalId),
|
|
42
42
|
* });
|
|
43
43
|
* const admin = new azuread.User("admin", {
|
|
44
|
-
* userPrincipalName: "ms.admin@
|
|
44
|
+
* userPrincipalName: "ms.admin@example.com",
|
|
45
45
|
* displayName: "Ms Admin",
|
|
46
46
|
* mailNickname: "ms.admin",
|
|
47
47
|
* password: "SecretP@sswd99!",
|
|
@@ -47,7 +47,7 @@ const utilities = require("../utilities");
|
|
|
47
47
|
* memberObjectId: exampleManagedInstance.identity.apply(identity => identity?.principalId),
|
|
48
48
|
* });
|
|
49
49
|
* const admin = new azuread.User("admin", {
|
|
50
|
-
* userPrincipalName: "ms.admin@
|
|
50
|
+
* userPrincipalName: "ms.admin@example.com",
|
|
51
51
|
* displayName: "Ms Admin",
|
|
52
52
|
* mailNickname: "ms.admin",
|
|
53
53
|
* password: "SecretP@sswd99!",
|
package/nginx/certificate.d.ts
CHANGED
|
@@ -77,7 +77,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
77
77
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
78
78
|
* keyVaultId: exampleKeyVault.id,
|
|
79
79
|
* certificate: {
|
|
80
|
-
* contents:
|
|
80
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
81
81
|
* password: "",
|
|
82
82
|
* },
|
|
83
83
|
* });
|
package/nginx/certificate.js
CHANGED
|
@@ -83,7 +83,7 @@ const utilities = require("../utilities");
|
|
|
83
83
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
84
84
|
* keyVaultId: exampleKeyVault.id,
|
|
85
85
|
* certificate: {
|
|
86
|
-
* contents:
|
|
86
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
87
87
|
* password: "",
|
|
88
88
|
* },
|
|
89
89
|
* });
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/azure",
|
|
3
|
-
"version": "v5.65.0-alpha.
|
|
3
|
+
"version": "v5.65.0-alpha.1706814605+165269e2",
|
|
4
4
|
"description": "A Pulumi package for creating and managing Microsoft Azure cloud resources, based on the Terraform azurerm provider. We recommend using the [Azure Native provider](https://github.com/pulumi/pulumi-azure-native) to provision Azure infrastructure. Azure Native provides complete coverage of Azure resources and same-day access to new resources and resource updates.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -59,7 +59,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
59
59
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
60
60
|
* keyVaultId: exampleKeyVault.id,
|
|
61
61
|
* certificate: {
|
|
62
|
-
* contents:
|
|
62
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
63
63
|
* password: "",
|
|
64
64
|
* },
|
|
65
65
|
* });
|
|
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
|
|
|
65
65
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
66
66
|
* keyVaultId: exampleKeyVault.id,
|
|
67
67
|
* certificate: {
|
|
68
|
-
* contents:
|
|
68
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
69
69
|
* password: "",
|
|
70
70
|
* },
|
|
71
71
|
* });
|
|
@@ -59,7 +59,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
59
59
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
60
60
|
* keyVaultId: exampleKeyVault.id,
|
|
61
61
|
* certificate: {
|
|
62
|
-
* contents:
|
|
62
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
63
63
|
* password: "",
|
|
64
64
|
* },
|
|
65
65
|
* });
|
|
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
|
|
|
65
65
|
* const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
|
|
66
66
|
* keyVaultId: exampleKeyVault.id,
|
|
67
67
|
* certificate: {
|
|
68
|
-
* contents:
|
|
68
|
+
* contents: fs.readFileSync("certificate-to-import.pfx", { encoding: "base64" }),
|
|
69
69
|
* password: "",
|
|
70
70
|
* },
|
|
71
71
|
* });
|