@pulumi/azure 6.12.0-alpha.1732687902 → 6.12.0-alpha.1733131988
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/containerservice/registryTask.d.ts +6 -0
- package/containerservice/registryTask.js.map +1 -1
- package/databricks/getWorkspace.d.ts +4 -0
- package/databricks/getWorkspace.js.map +1 -1
- package/databricks/workspace.d.ts +12 -0
- package/databricks/workspace.js +2 -0
- package/databricks/workspace.js.map +1 -1
- package/eventhub/eventHub.d.ts +21 -10
- package/eventhub/eventHub.js +3 -8
- package/eventhub/eventHub.js.map +1 -1
- package/logicapps/getStandard.d.ts +80 -7
- package/logicapps/getStandard.js +0 -2
- package/logicapps/getStandard.js.map +1 -1
- package/logicapps/standard.d.ts +27 -9
- package/logicapps/standard.js +2 -0
- package/logicapps/standard.js.map +1 -1
- package/mssql/getManagedDatabase.d.ts +67 -0
- package/mssql/getManagedDatabase.js +30 -0
- package/mssql/getManagedDatabase.js.map +1 -0
- package/mssql/index.d.ts +3 -0
- package/mssql/index.js +4 -1
- package/mssql/index.js.map +1 -1
- package/mssql/serverTransparentDataEncryption.d.ts +1 -1
- package/mssql/serverTransparentDataEncryption.js +1 -1
- package/oracle/autonomousDatabase.d.ts +45 -45
- package/oracle/cloudVmCluster.d.ts +81 -81
- package/oracle/exadataInfrastructure.d.ts +27 -27
- package/package.json +2 -2
- package/search/getService.d.ts +4 -0
- package/search/getService.js.map +1 -1
- package/search/service.d.ts +8 -0
- package/search/service.js +2 -0
- package/search/service.js.map +1 -1
- package/types/input.d.ts +317 -23
- package/types/output.d.ts +249 -27
package/types/input.d.ts
CHANGED
|
@@ -24347,7 +24347,7 @@ export declare namespace containerservice {
|
|
|
24347
24347
|
}
|
|
24348
24348
|
interface RegistryTaskAgentSetting {
|
|
24349
24349
|
/**
|
|
24350
|
-
* The number of cores required for the Container Registry Task.
|
|
24350
|
+
* The number of cores required for the Container Registry Task. Possible value is `2`.
|
|
24351
24351
|
*/
|
|
24352
24352
|
cpu: pulumi.Input<number>;
|
|
24353
24353
|
}
|
|
@@ -25813,6 +25813,32 @@ export declare namespace databricks {
|
|
|
25813
25813
|
*/
|
|
25814
25814
|
vnetAddressPrefix?: pulumi.Input<string>;
|
|
25815
25815
|
}
|
|
25816
|
+
interface WorkspaceEnhancedSecurityCompliance {
|
|
25817
|
+
/**
|
|
25818
|
+
* Enables automatic cluster updates for this workspace. Defaults to `false`.
|
|
25819
|
+
*/
|
|
25820
|
+
automaticClusterUpdateEnabled?: pulumi.Input<boolean>;
|
|
25821
|
+
/**
|
|
25822
|
+
* Enables compliance security profile for this workspace. Defaults to `false`.
|
|
25823
|
+
*
|
|
25824
|
+
* > **Note:** Changing the value of `complianceSecurityProfileEnabled` from `true` to `false` forces a replacement of the Databricks workspace.
|
|
25825
|
+
*
|
|
25826
|
+
* > **Note:** The attributes `automaticClusterUpdateEnabled` and `enhancedSecurityMonitoringEnabled` must be set to `true` in order to set `complianceSecurityProfileEnabled` to `true`.
|
|
25827
|
+
*/
|
|
25828
|
+
complianceSecurityProfileEnabled?: pulumi.Input<boolean>;
|
|
25829
|
+
/**
|
|
25830
|
+
* A list of standards to enforce on this workspace. Possible values include `HIPAA` and `PCI_DSS`.
|
|
25831
|
+
*
|
|
25832
|
+
* > **Note:** `complianceSecurityProfileEnabled` must be set to `true` in order to use `complianceSecurityProfileStandards`.
|
|
25833
|
+
*
|
|
25834
|
+
* > **Note:** Removing a standard from the `complianceSecurityProfileStandards` list forces a replacement of the Databricks workspace.
|
|
25835
|
+
*/
|
|
25836
|
+
complianceSecurityProfileStandards?: pulumi.Input<pulumi.Input<string>[]>;
|
|
25837
|
+
/**
|
|
25838
|
+
* Enables enhanced security monitoring for this workspace. Defaults to `false`.
|
|
25839
|
+
*/
|
|
25840
|
+
enhancedSecurityMonitoringEnabled?: pulumi.Input<boolean>;
|
|
25841
|
+
}
|
|
25816
25842
|
interface WorkspaceManagedDiskIdentity {
|
|
25817
25843
|
/**
|
|
25818
25844
|
* The principal UUID for the internal databricks storage account needed to provide access to the workspace for enabling Customer Managed Keys.
|
|
@@ -35172,131 +35198,395 @@ export declare namespace logicapps {
|
|
|
35172
35198
|
actionResult: pulumi.Input<string>;
|
|
35173
35199
|
}
|
|
35174
35200
|
interface GetStandardSiteConfig {
|
|
35201
|
+
/**
|
|
35202
|
+
* Should the Logic App be loaded at all times?
|
|
35203
|
+
*/
|
|
35175
35204
|
alwaysOn?: boolean;
|
|
35205
|
+
/**
|
|
35206
|
+
* The number of workers this Logic App can scale out to. Only applicable to apps on the Consumption and Premium plan.
|
|
35207
|
+
*/
|
|
35176
35208
|
appScaleLimit?: number;
|
|
35209
|
+
/**
|
|
35210
|
+
* The Auto-swap slot name.
|
|
35211
|
+
*/
|
|
35177
35212
|
autoSwapSlotName?: string;
|
|
35213
|
+
/**
|
|
35214
|
+
* A `cors` block as defined below.
|
|
35215
|
+
*/
|
|
35178
35216
|
cors?: inputs.logicapps.GetStandardSiteConfigCors;
|
|
35217
|
+
/**
|
|
35218
|
+
* The version of the .NET framework's CLR used in this Logic App.
|
|
35219
|
+
*/
|
|
35179
35220
|
dotnetFrameworkVersion?: string;
|
|
35221
|
+
/**
|
|
35222
|
+
* The number of minimum instances for this Logic App Only affects apps on the Premium plan.
|
|
35223
|
+
*/
|
|
35180
35224
|
elasticInstanceMinimum?: number;
|
|
35225
|
+
/**
|
|
35226
|
+
* The state of FTP / FTPS service for this Logic App.
|
|
35227
|
+
*/
|
|
35181
35228
|
ftpsState?: string;
|
|
35229
|
+
/**
|
|
35230
|
+
* Path which will be checked for this Logic App health.
|
|
35231
|
+
*/
|
|
35182
35232
|
healthCheckPath?: string;
|
|
35233
|
+
/**
|
|
35234
|
+
* Specifies whether the HTTP2 protocol should be enabled.
|
|
35235
|
+
*/
|
|
35183
35236
|
http2Enabled?: boolean;
|
|
35237
|
+
/**
|
|
35238
|
+
* A list of `ipRestriction` objects representing IP restrictions as defined below.
|
|
35239
|
+
*/
|
|
35184
35240
|
ipRestrictions?: inputs.logicapps.GetStandardSiteConfigIpRestriction[];
|
|
35241
|
+
/**
|
|
35242
|
+
* Linux App Framework and version for the Logic App.
|
|
35243
|
+
*/
|
|
35185
35244
|
linuxFxVersion?: string;
|
|
35245
|
+
/**
|
|
35246
|
+
* The minimum supported TLS version for the Logic App.
|
|
35247
|
+
*/
|
|
35186
35248
|
minTlsVersion?: string;
|
|
35249
|
+
/**
|
|
35250
|
+
* The number of pre-warmed instances for this Logic App Only affects apps on the Premium plan.
|
|
35251
|
+
*/
|
|
35187
35252
|
preWarmedInstanceCount?: number;
|
|
35253
|
+
/**
|
|
35254
|
+
* @deprecated the `site_config.public_network_access_enabled` property has been superseded by the `publicNetworkAccess` property and will be removed in v5.0 of the AzureRM Provider.
|
|
35255
|
+
*/
|
|
35188
35256
|
publicNetworkAccessEnabled?: boolean;
|
|
35257
|
+
/**
|
|
35258
|
+
* Should Runtime Scale Monitoring be enabled?. Only applicable to apps on the Premium plan.
|
|
35259
|
+
*/
|
|
35189
35260
|
runtimeScaleMonitoringEnabled?: boolean;
|
|
35261
|
+
/**
|
|
35262
|
+
* A list of `scmIpRestriction` objects representing SCM IP restrictions as defined below.
|
|
35263
|
+
*/
|
|
35190
35264
|
scmIpRestrictions?: inputs.logicapps.GetStandardSiteConfigScmIpRestriction[];
|
|
35265
|
+
/**
|
|
35266
|
+
* The minimum version of TLS required for SSL requests to the SCM site.
|
|
35267
|
+
*/
|
|
35191
35268
|
scmMinTlsVersion?: string;
|
|
35269
|
+
/**
|
|
35270
|
+
* The type of Source Control used by the Logic App in use by the Windows Function App.
|
|
35271
|
+
*/
|
|
35192
35272
|
scmType?: string;
|
|
35273
|
+
/**
|
|
35274
|
+
* Should the Logic App `ipRestriction` configuration be used for the SCM too.
|
|
35275
|
+
*/
|
|
35193
35276
|
scmUseMainIpRestriction?: boolean;
|
|
35277
|
+
/**
|
|
35278
|
+
* Should the Logic App run in 32 bit mode, rather than 64 bit mode?
|
|
35279
|
+
*/
|
|
35194
35280
|
use32BitWorkerProcess?: boolean;
|
|
35281
|
+
/**
|
|
35282
|
+
* Should all outbound traffic to have Virtual Network Security Groups and User Defined Routes applied.
|
|
35283
|
+
*/
|
|
35195
35284
|
vnetRouteAllEnabled?: boolean;
|
|
35285
|
+
/**
|
|
35286
|
+
* Should WebSockets be enabled?
|
|
35287
|
+
*/
|
|
35196
35288
|
websocketsEnabled?: boolean;
|
|
35197
35289
|
}
|
|
35198
35290
|
interface GetStandardSiteConfigArgs {
|
|
35291
|
+
/**
|
|
35292
|
+
* Should the Logic App be loaded at all times?
|
|
35293
|
+
*/
|
|
35199
35294
|
alwaysOn?: pulumi.Input<boolean>;
|
|
35295
|
+
/**
|
|
35296
|
+
* The number of workers this Logic App can scale out to. Only applicable to apps on the Consumption and Premium plan.
|
|
35297
|
+
*/
|
|
35200
35298
|
appScaleLimit?: pulumi.Input<number>;
|
|
35299
|
+
/**
|
|
35300
|
+
* The Auto-swap slot name.
|
|
35301
|
+
*/
|
|
35201
35302
|
autoSwapSlotName?: pulumi.Input<string>;
|
|
35303
|
+
/**
|
|
35304
|
+
* A `cors` block as defined below.
|
|
35305
|
+
*/
|
|
35202
35306
|
cors?: pulumi.Input<inputs.logicapps.GetStandardSiteConfigCorsArgs>;
|
|
35307
|
+
/**
|
|
35308
|
+
* The version of the .NET framework's CLR used in this Logic App.
|
|
35309
|
+
*/
|
|
35203
35310
|
dotnetFrameworkVersion?: pulumi.Input<string>;
|
|
35311
|
+
/**
|
|
35312
|
+
* The number of minimum instances for this Logic App Only affects apps on the Premium plan.
|
|
35313
|
+
*/
|
|
35204
35314
|
elasticInstanceMinimum?: pulumi.Input<number>;
|
|
35315
|
+
/**
|
|
35316
|
+
* The state of FTP / FTPS service for this Logic App.
|
|
35317
|
+
*/
|
|
35205
35318
|
ftpsState?: pulumi.Input<string>;
|
|
35319
|
+
/**
|
|
35320
|
+
* Path which will be checked for this Logic App health.
|
|
35321
|
+
*/
|
|
35206
35322
|
healthCheckPath?: pulumi.Input<string>;
|
|
35323
|
+
/**
|
|
35324
|
+
* Specifies whether the HTTP2 protocol should be enabled.
|
|
35325
|
+
*/
|
|
35207
35326
|
http2Enabled?: pulumi.Input<boolean>;
|
|
35327
|
+
/**
|
|
35328
|
+
* A list of `ipRestriction` objects representing IP restrictions as defined below.
|
|
35329
|
+
*/
|
|
35208
35330
|
ipRestrictions?: pulumi.Input<pulumi.Input<inputs.logicapps.GetStandardSiteConfigIpRestrictionArgs>[]>;
|
|
35331
|
+
/**
|
|
35332
|
+
* Linux App Framework and version for the Logic App.
|
|
35333
|
+
*/
|
|
35209
35334
|
linuxFxVersion?: pulumi.Input<string>;
|
|
35335
|
+
/**
|
|
35336
|
+
* The minimum supported TLS version for the Logic App.
|
|
35337
|
+
*/
|
|
35210
35338
|
minTlsVersion?: pulumi.Input<string>;
|
|
35339
|
+
/**
|
|
35340
|
+
* The number of pre-warmed instances for this Logic App Only affects apps on the Premium plan.
|
|
35341
|
+
*/
|
|
35211
35342
|
preWarmedInstanceCount?: pulumi.Input<number>;
|
|
35343
|
+
/**
|
|
35344
|
+
* @deprecated the `site_config.public_network_access_enabled` property has been superseded by the `publicNetworkAccess` property and will be removed in v5.0 of the AzureRM Provider.
|
|
35345
|
+
*/
|
|
35212
35346
|
publicNetworkAccessEnabled?: pulumi.Input<boolean>;
|
|
35347
|
+
/**
|
|
35348
|
+
* Should Runtime Scale Monitoring be enabled?. Only applicable to apps on the Premium plan.
|
|
35349
|
+
*/
|
|
35213
35350
|
runtimeScaleMonitoringEnabled?: pulumi.Input<boolean>;
|
|
35351
|
+
/**
|
|
35352
|
+
* A list of `scmIpRestriction` objects representing SCM IP restrictions as defined below.
|
|
35353
|
+
*/
|
|
35214
35354
|
scmIpRestrictions?: pulumi.Input<pulumi.Input<inputs.logicapps.GetStandardSiteConfigScmIpRestrictionArgs>[]>;
|
|
35355
|
+
/**
|
|
35356
|
+
* The minimum version of TLS required for SSL requests to the SCM site.
|
|
35357
|
+
*/
|
|
35215
35358
|
scmMinTlsVersion?: pulumi.Input<string>;
|
|
35359
|
+
/**
|
|
35360
|
+
* The type of Source Control used by the Logic App in use by the Windows Function App.
|
|
35361
|
+
*/
|
|
35216
35362
|
scmType?: pulumi.Input<string>;
|
|
35363
|
+
/**
|
|
35364
|
+
* Should the Logic App `ipRestriction` configuration be used for the SCM too.
|
|
35365
|
+
*/
|
|
35217
35366
|
scmUseMainIpRestriction?: pulumi.Input<boolean>;
|
|
35367
|
+
/**
|
|
35368
|
+
* Should the Logic App run in 32 bit mode, rather than 64 bit mode?
|
|
35369
|
+
*/
|
|
35218
35370
|
use32BitWorkerProcess?: pulumi.Input<boolean>;
|
|
35371
|
+
/**
|
|
35372
|
+
* Should all outbound traffic to have Virtual Network Security Groups and User Defined Routes applied.
|
|
35373
|
+
*/
|
|
35219
35374
|
vnetRouteAllEnabled?: pulumi.Input<boolean>;
|
|
35375
|
+
/**
|
|
35376
|
+
* Should WebSockets be enabled?
|
|
35377
|
+
*/
|
|
35220
35378
|
websocketsEnabled?: pulumi.Input<boolean>;
|
|
35221
35379
|
}
|
|
35222
35380
|
interface GetStandardSiteConfigCors {
|
|
35381
|
+
/**
|
|
35382
|
+
* A list of origins which should be able to make cross-origin calls.
|
|
35383
|
+
*/
|
|
35223
35384
|
allowedOrigins: string[];
|
|
35385
|
+
/**
|
|
35386
|
+
* Are credentials supported?
|
|
35387
|
+
*/
|
|
35224
35388
|
supportCredentials?: boolean;
|
|
35225
35389
|
}
|
|
35226
35390
|
interface GetStandardSiteConfigCorsArgs {
|
|
35391
|
+
/**
|
|
35392
|
+
* A list of origins which should be able to make cross-origin calls.
|
|
35393
|
+
*/
|
|
35227
35394
|
allowedOrigins: pulumi.Input<pulumi.Input<string>[]>;
|
|
35395
|
+
/**
|
|
35396
|
+
* Are credentials supported?
|
|
35397
|
+
*/
|
|
35228
35398
|
supportCredentials?: pulumi.Input<boolean>;
|
|
35229
35399
|
}
|
|
35230
35400
|
interface GetStandardSiteConfigIpRestriction {
|
|
35401
|
+
/**
|
|
35402
|
+
* Does this restriction `Allow` or `Deny` access for this IP range.
|
|
35403
|
+
*/
|
|
35231
35404
|
action?: string;
|
|
35405
|
+
/**
|
|
35406
|
+
* The `headers` block for this specific `ipRestriction` as defined below.
|
|
35407
|
+
*/
|
|
35232
35408
|
headers?: inputs.logicapps.GetStandardSiteConfigIpRestrictionHeaders;
|
|
35409
|
+
/**
|
|
35410
|
+
* The IP Address used for this IP Restriction in CIDR notation.
|
|
35411
|
+
*/
|
|
35233
35412
|
ipAddress?: string;
|
|
35234
35413
|
/**
|
|
35235
35414
|
* The name of this Logic App.
|
|
35236
35415
|
*/
|
|
35237
35416
|
name?: string;
|
|
35417
|
+
/**
|
|
35418
|
+
* The priority for this IP Restriction. Restrictions are enforced in priority order.
|
|
35419
|
+
*/
|
|
35238
35420
|
priority?: number;
|
|
35421
|
+
/**
|
|
35422
|
+
* The Service Tag used for this IP Restriction.
|
|
35423
|
+
*/
|
|
35239
35424
|
serviceTag?: string;
|
|
35425
|
+
/**
|
|
35426
|
+
* The Virtual Network Subnet ID used for this IP Restriction.
|
|
35427
|
+
*/
|
|
35240
35428
|
virtualNetworkSubnetId?: string;
|
|
35241
35429
|
}
|
|
35242
35430
|
interface GetStandardSiteConfigIpRestrictionArgs {
|
|
35431
|
+
/**
|
|
35432
|
+
* Does this restriction `Allow` or `Deny` access for this IP range.
|
|
35433
|
+
*/
|
|
35243
35434
|
action?: pulumi.Input<string>;
|
|
35435
|
+
/**
|
|
35436
|
+
* The `headers` block for this specific `ipRestriction` as defined below.
|
|
35437
|
+
*/
|
|
35244
35438
|
headers?: pulumi.Input<inputs.logicapps.GetStandardSiteConfigIpRestrictionHeadersArgs>;
|
|
35439
|
+
/**
|
|
35440
|
+
* The IP Address used for this IP Restriction in CIDR notation.
|
|
35441
|
+
*/
|
|
35245
35442
|
ipAddress?: pulumi.Input<string>;
|
|
35246
35443
|
/**
|
|
35247
35444
|
* The name of this Logic App.
|
|
35248
35445
|
*/
|
|
35249
35446
|
name?: pulumi.Input<string>;
|
|
35447
|
+
/**
|
|
35448
|
+
* The priority for this IP Restriction. Restrictions are enforced in priority order.
|
|
35449
|
+
*/
|
|
35250
35450
|
priority?: pulumi.Input<number>;
|
|
35451
|
+
/**
|
|
35452
|
+
* The Service Tag used for this IP Restriction.
|
|
35453
|
+
*/
|
|
35251
35454
|
serviceTag?: pulumi.Input<string>;
|
|
35455
|
+
/**
|
|
35456
|
+
* The Virtual Network Subnet ID used for this IP Restriction.
|
|
35457
|
+
*/
|
|
35252
35458
|
virtualNetworkSubnetId?: pulumi.Input<string>;
|
|
35253
35459
|
}
|
|
35254
35460
|
interface GetStandardSiteConfigIpRestrictionHeaders {
|
|
35461
|
+
/**
|
|
35462
|
+
* A list of allowed Azure FrontDoor IDs in UUID notation.
|
|
35463
|
+
*/
|
|
35255
35464
|
xAzureFdids?: string[];
|
|
35465
|
+
/**
|
|
35466
|
+
* A list to allow the Azure FrontDoor health probe header.
|
|
35467
|
+
*/
|
|
35256
35468
|
xFdHealthProbe?: string;
|
|
35469
|
+
/**
|
|
35470
|
+
* A list of allowed 'X-Forwarded-For' IPs in CIDR notation.
|
|
35471
|
+
*/
|
|
35257
35472
|
xForwardedFors?: string[];
|
|
35473
|
+
/**
|
|
35474
|
+
* A list of allowed 'X-Forwarded-Host' domains.
|
|
35475
|
+
*/
|
|
35258
35476
|
xForwardedHosts?: string[];
|
|
35259
35477
|
}
|
|
35260
35478
|
interface GetStandardSiteConfigIpRestrictionHeadersArgs {
|
|
35479
|
+
/**
|
|
35480
|
+
* A list of allowed Azure FrontDoor IDs in UUID notation.
|
|
35481
|
+
*/
|
|
35261
35482
|
xAzureFdids?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35483
|
+
/**
|
|
35484
|
+
* A list to allow the Azure FrontDoor health probe header.
|
|
35485
|
+
*/
|
|
35262
35486
|
xFdHealthProbe?: pulumi.Input<string>;
|
|
35487
|
+
/**
|
|
35488
|
+
* A list of allowed 'X-Forwarded-For' IPs in CIDR notation.
|
|
35489
|
+
*/
|
|
35263
35490
|
xForwardedFors?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35491
|
+
/**
|
|
35492
|
+
* A list of allowed 'X-Forwarded-Host' domains.
|
|
35493
|
+
*/
|
|
35264
35494
|
xForwardedHosts?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35265
35495
|
}
|
|
35266
35496
|
interface GetStandardSiteConfigScmIpRestriction {
|
|
35497
|
+
/**
|
|
35498
|
+
* Does this restriction `Allow` or `Deny` access for this IP range.
|
|
35499
|
+
*/
|
|
35267
35500
|
action?: string;
|
|
35501
|
+
/**
|
|
35502
|
+
* The `headers` block for this specific `ipRestriction` as defined below.
|
|
35503
|
+
*/
|
|
35268
35504
|
headers?: inputs.logicapps.GetStandardSiteConfigScmIpRestrictionHeaders;
|
|
35505
|
+
/**
|
|
35506
|
+
* The IP Address used for this IP Restriction in CIDR notation.
|
|
35507
|
+
*/
|
|
35269
35508
|
ipAddress?: string;
|
|
35270
35509
|
/**
|
|
35271
35510
|
* The name of this Logic App.
|
|
35272
35511
|
*/
|
|
35273
35512
|
name?: string;
|
|
35513
|
+
/**
|
|
35514
|
+
* The priority for this IP Restriction. Restrictions are enforced in priority order.
|
|
35515
|
+
*/
|
|
35274
35516
|
priority?: number;
|
|
35517
|
+
/**
|
|
35518
|
+
* The Service Tag used for this IP Restriction.
|
|
35519
|
+
*/
|
|
35275
35520
|
serviceTag?: string;
|
|
35521
|
+
/**
|
|
35522
|
+
* The Virtual Network Subnet ID used for this IP Restriction.
|
|
35523
|
+
*/
|
|
35276
35524
|
virtualNetworkSubnetId?: string;
|
|
35277
35525
|
}
|
|
35278
35526
|
interface GetStandardSiteConfigScmIpRestrictionArgs {
|
|
35527
|
+
/**
|
|
35528
|
+
* Does this restriction `Allow` or `Deny` access for this IP range.
|
|
35529
|
+
*/
|
|
35279
35530
|
action?: pulumi.Input<string>;
|
|
35531
|
+
/**
|
|
35532
|
+
* The `headers` block for this specific `ipRestriction` as defined below.
|
|
35533
|
+
*/
|
|
35280
35534
|
headers?: pulumi.Input<inputs.logicapps.GetStandardSiteConfigScmIpRestrictionHeadersArgs>;
|
|
35535
|
+
/**
|
|
35536
|
+
* The IP Address used for this IP Restriction in CIDR notation.
|
|
35537
|
+
*/
|
|
35281
35538
|
ipAddress?: pulumi.Input<string>;
|
|
35282
35539
|
/**
|
|
35283
35540
|
* The name of this Logic App.
|
|
35284
35541
|
*/
|
|
35285
35542
|
name?: pulumi.Input<string>;
|
|
35543
|
+
/**
|
|
35544
|
+
* The priority for this IP Restriction. Restrictions are enforced in priority order.
|
|
35545
|
+
*/
|
|
35286
35546
|
priority?: pulumi.Input<number>;
|
|
35547
|
+
/**
|
|
35548
|
+
* The Service Tag used for this IP Restriction.
|
|
35549
|
+
*/
|
|
35287
35550
|
serviceTag?: pulumi.Input<string>;
|
|
35551
|
+
/**
|
|
35552
|
+
* The Virtual Network Subnet ID used for this IP Restriction.
|
|
35553
|
+
*/
|
|
35288
35554
|
virtualNetworkSubnetId?: pulumi.Input<string>;
|
|
35289
35555
|
}
|
|
35290
35556
|
interface GetStandardSiteConfigScmIpRestrictionHeaders {
|
|
35557
|
+
/**
|
|
35558
|
+
* A list of allowed Azure FrontDoor IDs in UUID notation.
|
|
35559
|
+
*/
|
|
35291
35560
|
xAzureFdids?: string[];
|
|
35561
|
+
/**
|
|
35562
|
+
* A list to allow the Azure FrontDoor health probe header.
|
|
35563
|
+
*/
|
|
35292
35564
|
xFdHealthProbe?: string;
|
|
35565
|
+
/**
|
|
35566
|
+
* A list of allowed 'X-Forwarded-For' IPs in CIDR notation.
|
|
35567
|
+
*/
|
|
35293
35568
|
xForwardedFors?: string[];
|
|
35569
|
+
/**
|
|
35570
|
+
* A list of allowed 'X-Forwarded-Host' domains.
|
|
35571
|
+
*/
|
|
35294
35572
|
xForwardedHosts?: string[];
|
|
35295
35573
|
}
|
|
35296
35574
|
interface GetStandardSiteConfigScmIpRestrictionHeadersArgs {
|
|
35575
|
+
/**
|
|
35576
|
+
* A list of allowed Azure FrontDoor IDs in UUID notation.
|
|
35577
|
+
*/
|
|
35297
35578
|
xAzureFdids?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35579
|
+
/**
|
|
35580
|
+
* A list to allow the Azure FrontDoor health probe header.
|
|
35581
|
+
*/
|
|
35298
35582
|
xFdHealthProbe?: pulumi.Input<string>;
|
|
35583
|
+
/**
|
|
35584
|
+
* A list of allowed 'X-Forwarded-For' IPs in CIDR notation.
|
|
35585
|
+
*/
|
|
35299
35586
|
xForwardedFors?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35587
|
+
/**
|
|
35588
|
+
* A list of allowed 'X-Forwarded-Host' domains.
|
|
35589
|
+
*/
|
|
35300
35590
|
xForwardedHosts?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35301
35591
|
}
|
|
35302
35592
|
interface IntegrationAccountAgreementGuestIdentity {
|
|
@@ -35477,7 +35767,7 @@ export declare namespace logicapps {
|
|
|
35477
35767
|
*/
|
|
35478
35768
|
elasticInstanceMinimum?: pulumi.Input<number>;
|
|
35479
35769
|
/**
|
|
35480
|
-
* State of FTP / FTPS service for this Logic App Possible values include: `AllAllowed`, `FtpsOnly` and `Disabled`. Defaults to `AllAllowed`.
|
|
35770
|
+
* State of FTP / FTPS service for this Logic App. Possible values include: `AllAllowed`, `FtpsOnly` and `Disabled`. Defaults to `AllAllowed`.
|
|
35481
35771
|
*/
|
|
35482
35772
|
ftpsState?: pulumi.Input<string>;
|
|
35483
35773
|
/**
|
|
@@ -35485,7 +35775,7 @@ export declare namespace logicapps {
|
|
|
35485
35775
|
*/
|
|
35486
35776
|
healthCheckPath?: pulumi.Input<string>;
|
|
35487
35777
|
/**
|
|
35488
|
-
* Specifies whether
|
|
35778
|
+
* Specifies whether the HTTP2 protocol should be enabled. Defaults to `false`.
|
|
35489
35779
|
*/
|
|
35490
35780
|
http2Enabled?: pulumi.Input<boolean>;
|
|
35491
35781
|
/**
|
|
@@ -35495,11 +35785,11 @@ export declare namespace logicapps {
|
|
|
35495
35785
|
*/
|
|
35496
35786
|
ipRestrictions?: pulumi.Input<pulumi.Input<inputs.logicapps.StandardSiteConfigIpRestriction>[]>;
|
|
35497
35787
|
/**
|
|
35498
|
-
* Linux App Framework and version for the
|
|
35788
|
+
* Linux App Framework and version for the App Service, e.g. `DOCKER|(golang:latest)`. Setting this value will also set the `kind` of application deployed to `functionapp,linux,container,workflowapp`
|
|
35499
35789
|
*/
|
|
35500
35790
|
linuxFxVersion?: pulumi.Input<string>;
|
|
35501
35791
|
/**
|
|
35502
|
-
* The minimum supported TLS version for the Logic App Possible values are `1.0`, `1.1`, and `1.2`. Defaults to `1.2` for new Logic Apps.
|
|
35792
|
+
* The minimum supported TLS version for the Logic App. Possible values are `1.0`, `1.1`, and `1.2`. Defaults to `1.2` for new Logic Apps.
|
|
35503
35793
|
*/
|
|
35504
35794
|
minTlsVersion?: pulumi.Input<string>;
|
|
35505
35795
|
/**
|
|
@@ -35507,7 +35797,7 @@ export declare namespace logicapps {
|
|
|
35507
35797
|
*/
|
|
35508
35798
|
preWarmedInstanceCount?: pulumi.Input<number>;
|
|
35509
35799
|
/**
|
|
35510
|
-
*
|
|
35800
|
+
* @deprecated the `site_config.public_network_access_enabled` property has been superseded by the `publicNetworkAccess` property and will be removed in v5.0 of the AzureRM Provider.
|
|
35511
35801
|
*/
|
|
35512
35802
|
publicNetworkAccessEnabled?: pulumi.Input<boolean>;
|
|
35513
35803
|
/**
|
|
@@ -35595,11 +35885,11 @@ export declare namespace logicapps {
|
|
|
35595
35885
|
*/
|
|
35596
35886
|
xAzureFdids?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35597
35887
|
/**
|
|
35598
|
-
* A list to allow the Azure FrontDoor health probe header. Only allowed value is
|
|
35888
|
+
* A list to allow the Azure FrontDoor health probe header. Only allowed value is `1`.
|
|
35599
35889
|
*/
|
|
35600
35890
|
xFdHealthProbe?: pulumi.Input<string>;
|
|
35601
35891
|
/**
|
|
35602
|
-
* A list of allowed 'X-Forwarded-For' IPs in CIDR notation with a maximum of 8
|
|
35892
|
+
* A list of allowed 'X-Forwarded-For' IPs in CIDR notation with a maximum of 8.
|
|
35603
35893
|
*/
|
|
35604
35894
|
xForwardedFors?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35605
35895
|
/**
|
|
@@ -35625,7 +35915,7 @@ export declare namespace logicapps {
|
|
|
35625
35915
|
*/
|
|
35626
35916
|
name?: pulumi.Input<string>;
|
|
35627
35917
|
/**
|
|
35628
|
-
* The priority for this IP Restriction. Restrictions are enforced in priority order. By default, the priority is set to 65000 if not specified.
|
|
35918
|
+
* The priority for this IP Restriction. Restrictions are enforced in priority order. By default, the priority is set to `65000` if not specified.
|
|
35629
35919
|
*/
|
|
35630
35920
|
priority?: pulumi.Input<number>;
|
|
35631
35921
|
/**
|
|
@@ -35645,11 +35935,11 @@ export declare namespace logicapps {
|
|
|
35645
35935
|
*/
|
|
35646
35936
|
xAzureFdids?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35647
35937
|
/**
|
|
35648
|
-
* A list to allow the Azure FrontDoor health probe header. Only allowed value is
|
|
35938
|
+
* A list to allow the Azure FrontDoor health probe header. Only allowed value is `1`.
|
|
35649
35939
|
*/
|
|
35650
35940
|
xFdHealthProbe?: pulumi.Input<string>;
|
|
35651
35941
|
/**
|
|
35652
|
-
* A list of allowed 'X-Forwarded-For' IPs in CIDR notation with a maximum of 8
|
|
35942
|
+
* A list of allowed 'X-Forwarded-For' IPs in CIDR notation with a maximum of 8.
|
|
35653
35943
|
*/
|
|
35654
35944
|
xForwardedFors?: pulumi.Input<pulumi.Input<string>[]>;
|
|
35655
35945
|
/**
|
|
@@ -35663,7 +35953,7 @@ export declare namespace logicapps {
|
|
|
35663
35953
|
*/
|
|
35664
35954
|
password?: pulumi.Input<string>;
|
|
35665
35955
|
/**
|
|
35666
|
-
* The username which can be used to publish to this App Service
|
|
35956
|
+
* The username which can be used to publish to this App Service.
|
|
35667
35957
|
*/
|
|
35668
35958
|
username?: pulumi.Input<string>;
|
|
35669
35959
|
}
|
|
@@ -43098,45 +43388,45 @@ export declare namespace operationalinsights {
|
|
|
43098
43388
|
export declare namespace oracle {
|
|
43099
43389
|
interface CloudVmClusterDataCollectionOptions {
|
|
43100
43390
|
/**
|
|
43101
|
-
* Indicates whether diagnostic collection is enabled for the VM Cluster/Cloud VM Cluster/VMBM DBCS. Enabling diagnostic collection allows you to receive Events service notifications for guest VM issues. Diagnostic collection also allows Oracle to provide enhanced service and proactive support for your Exadata system. You can enable diagnostic collection during VM Cluster/Cloud VM Cluster provisioning. You can also disable or enable it at any time using the `UpdateVmCluster` or `updateCloudVmCluster` API.
|
|
43391
|
+
* Indicates whether diagnostic collection is enabled for the VM Cluster/Cloud VM Cluster/VMBM DBCS. Enabling diagnostic collection allows you to receive Events service notifications for guest VM issues. Diagnostic collection also allows Oracle to provide enhanced service and proactive support for your Exadata system. You can enable diagnostic collection during VM Cluster/Cloud VM Cluster provisioning. You can also disable or enable it at any time using the `UpdateVmCluster` or `updateCloudVmCluster` API. Changing this forces a new Cloud VM Cluster to be created.
|
|
43102
43392
|
*/
|
|
43103
43393
|
diagnosticsEventsEnabled?: pulumi.Input<boolean>;
|
|
43104
43394
|
/**
|
|
43105
|
-
* Indicates whether health monitoring is enabled for the VM Cluster / Cloud VM Cluster / VMBM DBCS. Enabling health monitoring allows Oracle to collect diagnostic data and share it with its operations and support personnel. You may also receive notifications for some events. Collecting health diagnostics enables Oracle to provide proactive support and enhanced service for your system. Optionally enable health monitoring while provisioning a system. You can also disable or enable health monitoring anytime using the `UpdateVmCluster`, `UpdateCloudVmCluster` or `updateDbsystem` API.
|
|
43395
|
+
* Indicates whether health monitoring is enabled for the VM Cluster / Cloud VM Cluster / VMBM DBCS. Enabling health monitoring allows Oracle to collect diagnostic data and share it with its operations and support personnel. You may also receive notifications for some events. Collecting health diagnostics enables Oracle to provide proactive support and enhanced service for your system. Optionally enable health monitoring while provisioning a system. You can also disable or enable health monitoring anytime using the `UpdateVmCluster`, `UpdateCloudVmCluster` or `updateDbsystem` API. Changing this forces a new Cloud VM Cluster to be created.
|
|
43106
43396
|
*/
|
|
43107
43397
|
healthMonitoringEnabled?: pulumi.Input<boolean>;
|
|
43108
43398
|
/**
|
|
43109
|
-
* Indicates whether incident logs and trace collection are enabled for the VM Cluster / Cloud VM Cluster / VMBM DBCS. Enabling incident logs collection allows Oracle to receive Events service notifications for guest VM issues, collect incident logs and traces, and use them to diagnose issues and resolve them. Optionally enable incident logs collection while provisioning a system. You can also disable or enable incident logs collection anytime using the `UpdateVmCluster`, `updateCloudVmCluster` or `updateDbsystem` API.
|
|
43399
|
+
* Indicates whether incident logs and trace collection are enabled for the VM Cluster / Cloud VM Cluster / VMBM DBCS. Enabling incident logs collection allows Oracle to receive Events service notifications for guest VM issues, collect incident logs and traces, and use them to diagnose issues and resolve them. Optionally enable incident logs collection while provisioning a system. You can also disable or enable incident logs collection anytime using the `UpdateVmCluster`, `updateCloudVmCluster` or `updateDbsystem` API. Changing this forces a new Cloud VM Cluster to be created.
|
|
43110
43400
|
*/
|
|
43111
43401
|
incidentLogsEnabled?: pulumi.Input<boolean>;
|
|
43112
43402
|
}
|
|
43113
43403
|
interface ExadataInfrastructureMaintenanceWindow {
|
|
43114
43404
|
/**
|
|
43115
|
-
* Days during the week when maintenance should be performed. Valid values are: `0` - represents time slot `0:00 - 3:59 UTC - 4` - represents time slot `4:00 - 7:59 UTC - 8` - represents time slot 8:00 - 11:59 UTC - 12 - represents time slot 12:00 - 15:59 UTC - 16 - represents time slot 16:00 - 19:59 UTC - 20 - represents time slot `20:00 - 23:59 UTC
|
|
43405
|
+
* Days during the week when maintenance should be performed. Valid values are: `0` - represents time slot `0:00 - 3:59 UTC - 4` - represents time slot `4:00 - 7:59 UTC - 8` - represents time slot 8:00 - 11:59 UTC - 12 - represents time slot 12:00 - 15:59 UTC - 16 - represents time slot 16:00 - 19:59 UTC - 20 - represents time slot `20:00 - 23:59 UTC`. Changing this forces a new Cloud Exadata Infrastructure to be created.
|
|
43116
43406
|
*/
|
|
43117
43407
|
daysOfWeeks?: pulumi.Input<pulumi.Input<string>[]>;
|
|
43118
43408
|
/**
|
|
43119
|
-
* The window of hours during the day when maintenance should be performed. The window is a 4 hour slot.
|
|
43409
|
+
* The window of hours during the day when maintenance should be performed. The window is a 4 hour slot. Changing this forces a new Cloud Exadata Infrastructure to be created.
|
|
43120
43410
|
*/
|
|
43121
43411
|
hoursOfDays?: pulumi.Input<pulumi.Input<number>[]>;
|
|
43122
43412
|
/**
|
|
43123
|
-
* Lead time window allows user to set a lead time to prepare for a down time. The lead time is in weeks and valid value is between `1` to `4`.
|
|
43413
|
+
* Lead time window allows user to set a lead time to prepare for a down time. The lead time is in weeks and valid value is between `1` to `4`. Changing this forces a new Cloud Exadata Infrastructure to be created.
|
|
43124
43414
|
*/
|
|
43125
43415
|
leadTimeInWeeks?: pulumi.Input<number>;
|
|
43126
43416
|
/**
|
|
43127
|
-
* Months during the year when maintenance should be performed.
|
|
43417
|
+
* Months during the year when maintenance should be performed. Changing this forces a new Cloud Exadata Infrastructure to be created.
|
|
43128
43418
|
*/
|
|
43129
43419
|
months?: pulumi.Input<pulumi.Input<string>[]>;
|
|
43130
43420
|
/**
|
|
43131
|
-
* Cloud Exadata Infrastructure node patching method, either `ROLLING` or `NONROLLING`. Default value is `ROLLING`. IMPORTANT: Non-rolling infrastructure patching involves system down time. See [Oracle-Managed Infrastructure Maintenance Updates](https://docs.cloud.oracle.com/iaas/Content/Database/Concepts/examaintenance.htm#Oracle) for more information.
|
|
43421
|
+
* Cloud Exadata Infrastructure node patching method, either `ROLLING` or `NONROLLING`. Default value is `ROLLING`. IMPORTANT: Non-rolling infrastructure patching involves system down time. See [Oracle-Managed Infrastructure Maintenance Updates](https://docs.cloud.oracle.com/iaas/Content/Database/Concepts/examaintenance.htm#Oracle) for more information. Changing this forces a new Cloud Exadata Infrastructure to be created.
|
|
43132
43422
|
*/
|
|
43133
43423
|
patchingMode?: pulumi.Input<string>;
|
|
43134
43424
|
/**
|
|
43135
|
-
* The maintenance window scheduling preference.
|
|
43425
|
+
* The maintenance window scheduling preference. Changing this forces a new Cloud Exadata Infrastructure to be created.
|
|
43136
43426
|
*/
|
|
43137
43427
|
preference?: pulumi.Input<string>;
|
|
43138
43428
|
/**
|
|
43139
|
-
* Weeks during the month when maintenance should be performed. Weeks start on the 1st, 8th, 15th, and 22nd days of the month, and have a duration of 7 days. Weeks start and end based on calendar dates, not days of the week. For example, to allow maintenance during the 2nd week of the month (from the 8th day to the 14th day of the month), use the value 2. Maintenance cannot be scheduled for the fifth week of months that contain more than 28 days. Note that this parameter works in conjunction with the daysOfWeek and hoursOfDay parameters to allow you to specify specific days of the week and hours that maintenance will be performed.
|
|
43429
|
+
* Weeks during the month when maintenance should be performed. Weeks start on the 1st, 8th, 15th, and 22nd days of the month, and have a duration of 7 days. Weeks start and end based on calendar dates, not days of the week. For example, to allow maintenance during the 2nd week of the month (from the 8th day to the 14th day of the month), use the value 2. Maintenance cannot be scheduled for the fifth week of months that contain more than 28 days. Note that this parameter works in conjunction with the daysOfWeek and hoursOfDay parameters to allow you to specify specific days of the week and hours that maintenance will be performed. Changing this forces a new Cloud Exadata Infrastructure to be created.
|
|
43140
43430
|
*/
|
|
43141
43431
|
weeksOfMonths?: pulumi.Input<pulumi.Input<number>[]>;
|
|
43142
43432
|
}
|
|
@@ -44724,6 +45014,10 @@ export declare namespace role {
|
|
|
44724
45014
|
}
|
|
44725
45015
|
export declare namespace search {
|
|
44726
45016
|
interface ServiceIdentity {
|
|
45017
|
+
/**
|
|
45018
|
+
* Specifies the list of User Assigned Managed Service Identity IDs which should be assigned to this Search Service.
|
|
45019
|
+
*/
|
|
45020
|
+
identityIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
44727
45021
|
/**
|
|
44728
45022
|
* The Principal ID associated with this Managed Service Identity.
|
|
44729
45023
|
*/
|
|
@@ -44733,7 +45027,7 @@ export declare namespace search {
|
|
|
44733
45027
|
*/
|
|
44734
45028
|
tenantId?: pulumi.Input<string>;
|
|
44735
45029
|
/**
|
|
44736
|
-
* Specifies the type of Managed Service Identity that should be configured on this Search Service.
|
|
45030
|
+
* Specifies the type of Managed Service Identity that should be configured on this Search Service. Possible values are `SystemAssigned`, `UserAssigned`, and `SystemAssigned, UserAssigned`.
|
|
44737
45031
|
*/
|
|
44738
45032
|
type: pulumi.Input<string>;
|
|
44739
45033
|
}
|