@pulumi/azure 6.29.0-alpha.1762841784 → 6.29.0-alpha.1763187052
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/apimanagement/apiOperationPolicy.d.ts +1 -1
- package/apimanagement/apiOperationPolicy.js +1 -1
- package/apimanagement/apiPolicy.d.ts +1 -1
- package/apimanagement/apiPolicy.js +1 -1
- package/apimanagement/apiTagDescription.d.ts +41 -0
- package/apimanagement/apiTagDescription.js +41 -0
- package/apimanagement/apiTagDescription.js.map +1 -1
- package/apimanagement/emailTemplate.d.ts +2 -2
- package/apimanagement/emailTemplate.js +2 -2
- package/apimanagement/getUser.d.ts +42 -0
- package/apimanagement/getUser.js +42 -0
- package/apimanagement/getUser.js.map +1 -1
- package/apimanagement/productPolicy.d.ts +1 -1
- package/apimanagement/productPolicy.js +1 -1
- package/apimanagement/redisCache.d.ts +37 -0
- package/apimanagement/redisCache.js +37 -0
- package/apimanagement/redisCache.js.map +1 -1
- package/apimanagement/workspacePolicy.d.ts +1 -1
- package/apimanagement/workspacePolicy.js +1 -1
- package/appinsights/webTest.d.ts +2 -2
- package/appinsights/webTest.js +2 -2
- package/appplatform/springCloudAppRedisAssociation.d.ts +36 -0
- package/appplatform/springCloudAppRedisAssociation.js +36 -0
- package/appplatform/springCloudAppRedisAssociation.js.map +1 -1
- package/appplatform/springCloudCertificate.d.ts +0 -99
- package/appplatform/springCloudCertificate.js +0 -99
- package/appplatform/springCloudCertificate.js.map +1 -1
- package/appplatform/springCloudConnection.d.ts +64 -0
- package/appplatform/springCloudConnection.js +64 -0
- package/appplatform/springCloudConnection.js.map +1 -1
- package/appservice/activeSlot.d.ts +1 -1
- package/appservice/activeSlot.js +1 -1
- package/appservice/appConnection.d.ts +69 -0
- package/appservice/appConnection.js +69 -0
- package/appservice/appConnection.js.map +1 -1
- package/appservice/connection.d.ts +61 -0
- package/appservice/connection.js +61 -0
- package/appservice/connection.js.map +1 -1
- package/appservice/customHostnameBinding.d.ts +2 -2
- package/appservice/customHostnameBinding.js +2 -2
- package/appservice/slot.d.ts +4 -4
- package/appservice/slot.js +4 -4
- package/appservice/webAppActiveSlot.d.ts +32 -0
- package/appservice/webAppActiveSlot.js +32 -0
- package/appservice/webAppActiveSlot.js.map +1 -1
- package/automation/dscNodeConfiguration.d.ts +15 -15
- package/automation/dscNodeConfiguration.js +15 -15
- package/automation/getVariableObject.d.ts +34 -0
- package/automation/getVariableObject.js +34 -0
- package/automation/getVariableObject.js.map +1 -1
- package/blueprint/assignment.d.ts +4 -4
- package/blueprint/assignment.js +4 -4
- package/cdn/endpointCustomDomain.d.ts +1 -1
- package/cdn/endpointCustomDomain.js +1 -1
- package/cdn/frontdoorSecret.d.ts +0 -72
- package/cdn/frontdoorSecret.js +0 -72
- package/cdn/frontdoorSecret.js.map +1 -1
- package/compute/extension.d.ts +1 -1
- package/compute/extension.js +1 -1
- package/containerapp/customDomain.d.ts +81 -0
- package/containerapp/customDomain.js +81 -0
- package/containerapp/customDomain.js.map +1 -1
- package/containerservice/tokenPassword.d.ts +42 -0
- package/containerservice/tokenPassword.js +42 -0
- package/containerservice/tokenPassword.js.map +1 -1
- package/core/getResourceGroupTemplateDeployment.d.ts +34 -0
- package/core/getResourceGroupTemplateDeployment.js +34 -0
- package/core/getResourceGroupTemplateDeployment.js.map +1 -1
- package/core/getSubscriptionTemplateDeployment.d.ts +32 -0
- package/core/getSubscriptionTemplateDeployment.js +32 -0
- package/core/getSubscriptionTemplateDeployment.js.map +1 -1
- package/core/getTenantTemplateDeployment.d.ts +32 -0
- package/core/getTenantTemplateDeployment.js +32 -0
- package/core/getTenantTemplateDeployment.js.map +1 -1
- package/core/resourceDeploymentScriptAzureCli.d.ts +1 -1
- package/core/resourceDeploymentScriptAzureCli.js +1 -1
- package/core/resourceGroupPolicyAssignment.d.ts +4 -4
- package/core/resourceGroupPolicyAssignment.js +4 -4
- package/core/resourceGroupPolicyRemediation.d.ts +6 -6
- package/core/resourceGroupPolicyRemediation.js +6 -6
- package/core/resourceGroupTemplateDeployment.d.ts +75 -0
- package/core/resourceGroupTemplateDeployment.js +75 -0
- package/core/resourceGroupTemplateDeployment.js.map +1 -1
- package/core/subscriptionTemplateDeployment.d.ts +10 -10
- package/core/subscriptionTemplateDeployment.js +10 -10
- package/cosmosdb/account.d.ts +2 -2
- package/cosmosdb/account.js +2 -2
- package/cosmosdb/cassandraCluster.d.ts +0 -49
- package/cosmosdb/cassandraCluster.js +0 -49
- package/cosmosdb/cassandraCluster.js.map +1 -1
- package/cosmosdb/cassandraDatacenter.d.ts +0 -59
- package/cosmosdb/cassandraDatacenter.js +0 -59
- package/cosmosdb/cassandraDatacenter.js.map +1 -1
- package/cosmosdb/sqlFunction.d.ts +28 -0
- package/cosmosdb/sqlFunction.js +28 -0
- package/cosmosdb/sqlFunction.js.map +1 -1
- package/cosmosdb/sqlStoredProcedure.d.ts +31 -0
- package/cosmosdb/sqlStoredProcedure.js +31 -0
- package/cosmosdb/sqlStoredProcedure.js.map +1 -1
- package/cosmosdb/sqlTrigger.d.ts +30 -0
- package/cosmosdb/sqlTrigger.js +30 -0
- package/cosmosdb/sqlTrigger.js.map +1 -1
- package/datafactory/customDataset.d.ts +18 -18
- package/datafactory/customDataset.js +18 -18
- package/datafactory/dataFlow.d.ts +1 -1
- package/datafactory/dataFlow.js +1 -1
- package/datafactory/flowletDataFlow.d.ts +1 -1
- package/datafactory/flowletDataFlow.js +1 -1
- package/datafactory/linkedCustomService.d.ts +1 -1
- package/datafactory/linkedCustomService.js +1 -1
- package/datafactory/pipeline.d.ts +7 -7
- package/datafactory/pipeline.js +7 -7
- package/dataprotection/backupPolicyKubernetesCluster.d.ts +42 -0
- package/dataprotection/backupPolicyKubernetesCluster.js +42 -0
- package/dataprotection/backupPolicyKubernetesCluster.js.map +1 -1
- package/datashare/datasetBlobStorage.d.ts +0 -66
- package/datashare/datasetBlobStorage.js +0 -66
- package/datashare/datasetBlobStorage.js.map +1 -1
- package/datashare/datasetDataLakeGen2.d.ts +0 -62
- package/datashare/datasetDataLakeGen2.js +0 -62
- package/datashare/datasetDataLakeGen2.js.map +1 -1
- package/desktopvirtualization/scalingPlan.d.ts +0 -103
- package/desktopvirtualization/scalingPlan.js +0 -103
- package/desktopvirtualization/scalingPlan.js.map +1 -1
- package/desktopvirtualization/scalingPlanHostPoolAssociation.d.ts +0 -79
- package/desktopvirtualization/scalingPlanHostPoolAssociation.js +0 -79
- package/desktopvirtualization/scalingPlanHostPoolAssociation.js.map +1 -1
- package/dynatrace/monitor.d.ts +33 -0
- package/dynatrace/monitor.js +33 -0
- package/dynatrace/monitor.js.map +1 -1
- package/dynatrace/tagRules.d.ts +54 -0
- package/dynatrace/tagRules.js +54 -0
- package/dynatrace/tagRules.js.map +1 -1
- package/eventhub/queueAuthorizationRule.d.ts +31 -0
- package/eventhub/queueAuthorizationRule.js +31 -0
- package/eventhub/queueAuthorizationRule.js.map +1 -1
- package/eventhub/subscriptionRule.d.ts +76 -0
- package/eventhub/subscriptionRule.js +76 -0
- package/eventhub/subscriptionRule.js.map +1 -1
- package/hpc/cacheBlobTarget.d.ts +0 -71
- package/hpc/cacheBlobTarget.js +0 -71
- package/hpc/cacheBlobTarget.js.map +1 -1
- package/iot/endpointCosmosdbAccount.d.ts +58 -0
- package/iot/endpointCosmosdbAccount.js +58 -0
- package/iot/endpointCosmosdbAccount.js.map +1 -1
- package/iot/endpointServicebusQueue.d.ts +46 -0
- package/iot/endpointServicebusQueue.js +46 -0
- package/iot/endpointServicebusQueue.js.map +1 -1
- package/keyvault/accessPolicy.d.ts +0 -42
- package/keyvault/accessPolicy.js +0 -42
- package/keyvault/accessPolicy.js.map +1 -1
- package/keyvault/getCertificates.d.ts +36 -0
- package/keyvault/getCertificates.js +36 -0
- package/keyvault/getCertificates.js.map +1 -1
- package/keyvault/getSecrets.d.ts +36 -0
- package/keyvault/getSecrets.js +36 -0
- package/keyvault/getSecrets.js.map +1 -1
- package/keyvault/managedHardwareSecurityModuleKey.d.ts +52 -0
- package/keyvault/managedHardwareSecurityModuleKey.js +52 -0
- package/keyvault/managedHardwareSecurityModuleKey.js.map +1 -1
- package/keyvault/managedHardwareSecurityModuleRoleAssignment.d.ts +19 -0
- package/keyvault/managedHardwareSecurityModuleRoleAssignment.js +19 -0
- package/keyvault/managedHardwareSecurityModuleRoleAssignment.js.map +1 -1
- package/keyvault/managedHardwareSecurityModuleRoleDefinition.d.ts +31 -0
- package/keyvault/managedHardwareSecurityModuleRoleDefinition.js +31 -0
- package/keyvault/managedHardwareSecurityModuleRoleDefinition.js.map +1 -1
- package/keyvault/managedStorageAccount.d.ts +0 -64
- package/keyvault/managedStorageAccount.js +0 -64
- package/keyvault/managedStorageAccount.js.map +1 -1
- package/kusto/clusterPrincipalAssignment.d.ts +38 -0
- package/kusto/clusterPrincipalAssignment.js +38 -0
- package/kusto/clusterPrincipalAssignment.js.map +1 -1
- package/kusto/cosmosdbDataConnection.d.ts +102 -0
- package/kusto/cosmosdbDataConnection.js +102 -0
- package/kusto/cosmosdbDataConnection.js.map +1 -1
- package/logicapps/actionCustom.d.ts +8 -8
- package/logicapps/actionCustom.js +8 -8
- package/logicapps/integrationAccountSession.d.ts +1 -1
- package/logicapps/integrationAccountSession.js +1 -1
- package/logicapps/triggerCustom.d.ts +4 -4
- package/logicapps/triggerCustom.js +4 -4
- package/logicapps/triggerHttpRequest.d.ts +4 -4
- package/logicapps/triggerHttpRequest.js +4 -4
- package/machinelearning/workspace.d.ts +0 -167
- package/machinelearning/workspace.js +0 -167
- package/machinelearning/workspace.js.map +1 -1
- package/managedlustre/fileSystem.d.ts +35 -0
- package/managedlustre/fileSystem.js +35 -0
- package/managedlustre/fileSystem.js.map +1 -1
- package/management/getGroupTemplateDeployment.d.ts +34 -0
- package/management/getGroupTemplateDeployment.js +34 -0
- package/management/getGroupTemplateDeployment.js.map +1 -1
- package/management/groupPolicySetDefinition.d.ts +7 -7
- package/management/groupPolicySetDefinition.js +7 -7
- package/management/groupTemplateDeployment.d.ts +24 -24
- package/management/groupTemplateDeployment.js +24 -24
- package/management/privateLinkAssociation.d.ts +2 -2
- package/management/privateLinkAssociation.js +2 -2
- package/mobile/networkAttachedDataNetwork.d.ts +79 -0
- package/mobile/networkAttachedDataNetwork.js +79 -0
- package/mobile/networkAttachedDataNetwork.js.map +1 -1
- package/mobile/networkPacketCoreDataPlane.d.ts +50 -0
- package/mobile/networkPacketCoreDataPlane.js +50 -0
- package/mobile/networkPacketCoreDataPlane.js.map +1 -1
- package/monitoring/alertPrometheusRuleGroup.d.ts +2 -2
- package/monitoring/alertPrometheusRuleGroup.js +2 -2
- package/monitoring/scheduledQueryRulesAlert.d.ts +94 -0
- package/monitoring/scheduledQueryRulesAlert.js +94 -0
- package/monitoring/scheduledQueryRulesAlert.js.map +1 -1
- package/mssql/managedInstanceSecurityAlertPolicy.d.ts +197 -0
- package/mssql/managedInstanceSecurityAlertPolicy.js +197 -0
- package/mssql/managedInstanceSecurityAlertPolicy.js.map +1 -1
- package/mssql/managedInstanceStartStopSchedule.d.ts +203 -0
- package/mssql/managedInstanceStartStopSchedule.js +203 -0
- package/mssql/managedInstanceStartStopSchedule.js.map +1 -1
- package/mssql/serverExtendedAuditingPolicy.d.ts +90 -0
- package/mssql/serverExtendedAuditingPolicy.js +90 -0
- package/mssql/serverExtendedAuditingPolicy.js.map +1 -1
- package/mssql/serverMicrosoftSupportAuditingPolicy.d.ts +88 -0
- package/mssql/serverMicrosoftSupportAuditingPolicy.js +88 -0
- package/mssql/serverMicrosoftSupportAuditingPolicy.js.map +1 -1
- package/mssql/virtualMachineAvailabilityGroupListener.d.ts +84 -0
- package/mssql/virtualMachineAvailabilityGroupListener.js +84 -0
- package/mssql/virtualMachineAvailabilityGroupListener.js.map +1 -1
- package/netapp/volumeGroupSapHana.d.ts +1 -1
- package/netapp/volumeGroupSapHana.js +1 -1
- package/network/getVirtualWan.d.ts +56 -0
- package/network/getVirtualWan.js +56 -0
- package/network/getVirtualWan.js.map +1 -1
- package/network/networkInterfaceApplicationGatewayBackendAddressPoolAssociation.d.ts +110 -0
- package/network/networkInterfaceApplicationGatewayBackendAddressPoolAssociation.js +110 -0
- package/network/networkInterfaceApplicationGatewayBackendAddressPoolAssociation.js.map +1 -1
- package/network/trafficManagerProfile.d.ts +2 -2
- package/network/trafficManagerProfile.js +2 -2
- package/network/virtualNetworkDnsServers.d.ts +28 -0
- package/network/virtualNetworkDnsServers.js +28 -0
- package/network/virtualNetworkDnsServers.js.map +1 -1
- package/network/virtualNetworkPeering.d.ts +60 -0
- package/network/virtualNetworkPeering.js +60 -0
- package/network/virtualNetworkPeering.js.map +1 -1
- package/nginx/configuration.d.ts +2 -2
- package/nginx/configuration.js +2 -2
- package/operationalinsights/analyticsSolution.d.ts +3 -3
- package/operationalinsights/analyticsSolution.js +3 -3
- package/oracle/autonomousDatabase.d.ts +27 -0
- package/oracle/autonomousDatabase.js +27 -0
- package/oracle/autonomousDatabase.js.map +1 -1
- package/oracle/autonomousDatabaseBackup.d.ts +21 -0
- package/oracle/autonomousDatabaseBackup.js +21 -0
- package/oracle/autonomousDatabaseBackup.js.map +1 -1
- package/package.json +2 -2
- package/pim/roleManagementPolicy.d.ts +0 -56
- package/pim/roleManagementPolicy.js +0 -56
- package/pim/roleManagementPolicy.js.map +1 -1
- package/policy/definition.d.ts +7 -7
- package/policy/definition.js +7 -7
- package/policy/policySetDefinition.d.ts +7 -7
- package/policy/policySetDefinition.js +7 -7
- package/postgresql/flexibleServerActiveDirectoryAdministrator.d.ts +0 -47
- package/postgresql/flexibleServerActiveDirectoryAdministrator.js +0 -47
- package/postgresql/flexibleServerActiveDirectoryAdministrator.js.map +1 -1
- package/privatedns/linkService.d.ts +64 -0
- package/privatedns/linkService.js +64 -0
- package/privatedns/linkService.js.map +1 -1
- package/privatelink/applicationSecurityGroupAssociation.d.ts +81 -0
- package/privatelink/applicationSecurityGroupAssociation.js +81 -0
- package/privatelink/applicationSecurityGroupAssociation.js.map +1 -1
- package/privatelink/endpoint.d.ts +69 -0
- package/privatelink/endpoint.js +69 -0
- package/privatelink/endpoint.js.map +1 -1
- package/qumulo/fileSystem.d.ts +42 -0
- package/qumulo/fileSystem.js +42 -0
- package/qumulo/fileSystem.js.map +1 -1
- package/redhatopenshift/cluster.d.ts +0 -103
- package/redhatopenshift/cluster.js +0 -103
- package/redhatopenshift/cluster.js.map +1 -1
- package/redis/cacheAccessPolicy.d.ts +29 -0
- package/redis/cacheAccessPolicy.js +29 -0
- package/redis/cacheAccessPolicy.js.map +1 -1
- package/redis/cacheAccessPolicyAssignment.d.ts +32 -0
- package/redis/cacheAccessPolicyAssignment.js +32 -0
- package/redis/cacheAccessPolicyAssignment.js.map +1 -1
- package/redis/firewallRule.d.ts +38 -0
- package/redis/firewallRule.js +38 -0
- package/redis/firewallRule.js.map +1 -1
- package/redis/linkedServer.d.ts +49 -0
- package/redis/linkedServer.js +49 -0
- package/redis/linkedServer.js.map +1 -1
- package/sentinel/alertRuleNrt.d.ts +2 -2
- package/sentinel/alertRuleNrt.js +2 -2
- package/sentinel/alertRuleScheduled.d.ts +2 -2
- package/sentinel/alertRuleScheduled.js +2 -2
- package/sentinel/metadata.d.ts +2 -2
- package/sentinel/metadata.js +2 -2
- package/servicebus/queueAuthorizationRule.d.ts +31 -0
- package/servicebus/queueAuthorizationRule.js +31 -0
- package/servicebus/queueAuthorizationRule.js.map +1 -1
- package/servicebus/subscriptionRule.d.ts +76 -0
- package/servicebus/subscriptionRule.js +76 -0
- package/servicebus/subscriptionRule.js.map +1 -1
- package/signalr/serviceNetworkAcl.d.ts +55 -0
- package/signalr/serviceNetworkAcl.js +55 -0
- package/signalr/serviceNetworkAcl.js.map +1 -1
- package/stack/hciCluster.d.ts +0 -36
- package/stack/hciCluster.js +0 -36
- package/stack/hciCluster.js.map +1 -1
- package/stack/hciLogicalNetwork.d.ts +33 -0
- package/stack/hciLogicalNetwork.js +33 -0
- package/stack/hciLogicalNetwork.js.map +1 -1
- package/stack/hciMarketplaceGalleryImage.d.ts +0 -48
- package/stack/hciMarketplaceGalleryImage.js +0 -48
- package/stack/hciMarketplaceGalleryImage.js.map +1 -1
- package/stack/hciNetworkInterface.d.ts +48 -0
- package/stack/hciNetworkInterface.js +48 -0
- package/stack/hciNetworkInterface.js.map +1 -1
- package/streamanalytics/outputCosmosdb.d.ts +51 -0
- package/streamanalytics/outputCosmosdb.js +51 -0
- package/streamanalytics/outputCosmosdb.js.map +1 -1
- package/streamanalytics/outputServiceBusQueue.d.ts +38 -0
- package/streamanalytics/outputServiceBusQueue.js +38 -0
- package/streamanalytics/outputServiceBusQueue.js.map +1 -1
- package/streamanalytics/outputServicebusTopic.d.ts +42 -0
- package/streamanalytics/outputServicebusTopic.js +42 -0
- package/streamanalytics/outputServicebusTopic.js.map +1 -1
- package/synapse/linkedService.d.ts +1 -1
- package/synapse/linkedService.js +1 -1
- package/synapse/sqlPoolSecurityAlertPolicy.d.ts +66 -0
- package/synapse/sqlPoolSecurityAlertPolicy.js +66 -0
- package/synapse/sqlPoolSecurityAlertPolicy.js.map +1 -1
- package/synapse/sqlPoolVulnerabilityAssessment.d.ts +82 -0
- package/synapse/sqlPoolVulnerabilityAssessment.js +82 -0
- package/synapse/sqlPoolVulnerabilityAssessment.js.map +1 -1
- package/synapse/workspaceSecurityAlertPolicy.d.ts +60 -0
- package/synapse/workspaceSecurityAlertPolicy.js +60 -0
- package/synapse/workspaceSecurityAlertPolicy.js.map +1 -1
- package/synapse/workspaceVulnerabilityAssessment.d.ts +76 -0
- package/synapse/workspaceVulnerabilityAssessment.js +76 -0
- package/synapse/workspaceVulnerabilityAssessment.js.map +1 -1
- package/trafficmanager/profile.d.ts +2 -2
- package/trafficmanager/profile.js +2 -2
- package/webpubsub/networkAcl.d.ts +58 -0
- package/webpubsub/networkAcl.js +58 -0
- package/webpubsub/networkAcl.js.map +1 -1
- package/webpubsub/socketio.d.ts +25 -0
- package/webpubsub/socketio.js +25 -0
- package/webpubsub/socketio.js.map +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getCertificates.js","sourceRoot":"","sources":["../../keyvault/getCertificates.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"getCertificates.js","sourceRoot":"","sources":["../../keyvault/getCertificates.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,eAAe,CAAC,IAAyB,EAAE,IAA2B;IAClF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gDAAgD,EAAE;QAC3E,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,YAAY,EAAE,IAAI,CAAC,UAAU;KAChC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,0CAMC;AAwCD;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,qBAAqB,CAAC,IAA+B,EAAE,IAAiC;IACpG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,gDAAgD,EAAE;QACjF,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,YAAY,EAAE,IAAI,CAAC,UAAU;KAChC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,sDAMC"}
|
package/keyvault/getSecrets.d.ts
CHANGED
|
@@ -2,6 +2,24 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as outputs from "../types/output";
|
|
3
3
|
/**
|
|
4
4
|
* Use this data source to retrieve a list of secret names from an existing Key Vault Secret.
|
|
5
|
+
*
|
|
6
|
+
* ## Example Usage
|
|
7
|
+
*
|
|
8
|
+
* ```typescript
|
|
9
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
10
|
+
* import * as azure from "@pulumi/azure";
|
|
11
|
+
* import * as std from "@pulumi/std";
|
|
12
|
+
*
|
|
13
|
+
* const example = azure.keyvault.getSecrets({
|
|
14
|
+
* keyVaultId: existing.id,
|
|
15
|
+
* });
|
|
16
|
+
* const exampleGetSecret = example.then(example => std.toset({
|
|
17
|
+
* input: example.names,
|
|
18
|
+
* })).then(invoke => .reduce((__obj, [__key, __value]) => ({ ...__obj, [__key]: azure.keyvault.getSecret({
|
|
19
|
+
* name: __key,
|
|
20
|
+
* keyVaultId: existing.id,
|
|
21
|
+
* }) })));
|
|
22
|
+
* ```
|
|
5
23
|
*/
|
|
6
24
|
export declare function getSecrets(args: GetSecretsArgs, opts?: pulumi.InvokeOptions): Promise<GetSecretsResult>;
|
|
7
25
|
/**
|
|
@@ -35,6 +53,24 @@ export interface GetSecretsResult {
|
|
|
35
53
|
}
|
|
36
54
|
/**
|
|
37
55
|
* Use this data source to retrieve a list of secret names from an existing Key Vault Secret.
|
|
56
|
+
*
|
|
57
|
+
* ## Example Usage
|
|
58
|
+
*
|
|
59
|
+
* ```typescript
|
|
60
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
61
|
+
* import * as azure from "@pulumi/azure";
|
|
62
|
+
* import * as std from "@pulumi/std";
|
|
63
|
+
*
|
|
64
|
+
* const example = azure.keyvault.getSecrets({
|
|
65
|
+
* keyVaultId: existing.id,
|
|
66
|
+
* });
|
|
67
|
+
* const exampleGetSecret = example.then(example => std.toset({
|
|
68
|
+
* input: example.names,
|
|
69
|
+
* })).then(invoke => .reduce((__obj, [__key, __value]) => ({ ...__obj, [__key]: azure.keyvault.getSecret({
|
|
70
|
+
* name: __key,
|
|
71
|
+
* keyVaultId: existing.id,
|
|
72
|
+
* }) })));
|
|
73
|
+
* ```
|
|
38
74
|
*/
|
|
39
75
|
export declare function getSecretsOutput(args: GetSecretsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecretsResult>;
|
|
40
76
|
/**
|
package/keyvault/getSecrets.js
CHANGED
|
@@ -7,6 +7,24 @@ const pulumi = require("@pulumi/pulumi");
|
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
9
|
* Use this data source to retrieve a list of secret names from an existing Key Vault Secret.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as azure from "@pulumi/azure";
|
|
16
|
+
* import * as std from "@pulumi/std";
|
|
17
|
+
*
|
|
18
|
+
* const example = azure.keyvault.getSecrets({
|
|
19
|
+
* keyVaultId: existing.id,
|
|
20
|
+
* });
|
|
21
|
+
* const exampleGetSecret = example.then(example => std.toset({
|
|
22
|
+
* input: example.names,
|
|
23
|
+
* })).then(invoke => .reduce((__obj, [__key, __value]) => ({ ...__obj, [__key]: azure.keyvault.getSecret({
|
|
24
|
+
* name: __key,
|
|
25
|
+
* keyVaultId: existing.id,
|
|
26
|
+
* }) })));
|
|
27
|
+
* ```
|
|
10
28
|
*/
|
|
11
29
|
function getSecrets(args, opts) {
|
|
12
30
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -17,6 +35,24 @@ function getSecrets(args, opts) {
|
|
|
17
35
|
exports.getSecrets = getSecrets;
|
|
18
36
|
/**
|
|
19
37
|
* Use this data source to retrieve a list of secret names from an existing Key Vault Secret.
|
|
38
|
+
*
|
|
39
|
+
* ## Example Usage
|
|
40
|
+
*
|
|
41
|
+
* ```typescript
|
|
42
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
43
|
+
* import * as azure from "@pulumi/azure";
|
|
44
|
+
* import * as std from "@pulumi/std";
|
|
45
|
+
*
|
|
46
|
+
* const example = azure.keyvault.getSecrets({
|
|
47
|
+
* keyVaultId: existing.id,
|
|
48
|
+
* });
|
|
49
|
+
* const exampleGetSecret = example.then(example => std.toset({
|
|
50
|
+
* input: example.names,
|
|
51
|
+
* })).then(invoke => .reduce((__obj, [__key, __value]) => ({ ...__obj, [__key]: azure.keyvault.getSecret({
|
|
52
|
+
* name: __key,
|
|
53
|
+
* keyVaultId: existing.id,
|
|
54
|
+
* }) })));
|
|
55
|
+
* ```
|
|
20
56
|
*/
|
|
21
57
|
function getSecretsOutput(args, opts) {
|
|
22
58
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getSecrets.js","sourceRoot":"","sources":["../../keyvault/getSecrets.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"getSecrets.js","sourceRoot":"","sources":["../../keyvault/getSecrets.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,UAAU,CAAC,IAAoB,EAAE,IAA2B;IACxE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,sCAAsC,EAAE;QACjE,YAAY,EAAE,IAAI,CAAC,UAAU;KAChC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AALD,gCAKC;AAgCD;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,gBAAgB,CAAC,IAA0B,EAAE,IAAiC;IAC1F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,sCAAsC,EAAE;QACvE,YAAY,EAAE,IAAI,CAAC,UAAU;KAChC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AALD,4CAKC"}
|
|
@@ -6,6 +6,58 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
*
|
|
7
7
|
* ## Example Usage
|
|
8
8
|
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as azure from "@pulumi/azure";
|
|
12
|
+
*
|
|
13
|
+
* const current = azure.core.getClientConfig({});
|
|
14
|
+
* const example = new azure.keyvault.ManagedHardwareSecurityModule("example", {
|
|
15
|
+
* name: "example",
|
|
16
|
+
* resourceGroupName: exampleAzurermResourceGroup.name,
|
|
17
|
+
* location: exampleAzurermResourceGroup.location,
|
|
18
|
+
* skuName: "Standard_B1",
|
|
19
|
+
* tenantId: current.then(current => current.tenantId),
|
|
20
|
+
* adminObjectIds: [current.then(current => current.objectId)],
|
|
21
|
+
* purgeProtectionEnabled: false,
|
|
22
|
+
* activeConfig: [{
|
|
23
|
+
* securityDomainCertificate: [
|
|
24
|
+
* cert[0].id,
|
|
25
|
+
* cert[1].id,
|
|
26
|
+
* cert[2].id,
|
|
27
|
+
* ],
|
|
28
|
+
* securityDomainQuorum: 2,
|
|
29
|
+
* }],
|
|
30
|
+
* });
|
|
31
|
+
* // this gives your service principal the HSM Crypto User role which lets you create and destroy hsm keys
|
|
32
|
+
* const hsm_crypto_user = new azure.keyvault.ManagedHardwareSecurityModuleRoleAssignment("hsm-crypto-user", {
|
|
33
|
+
* managedHsmId: test.id,
|
|
34
|
+
* name: "1e243909-064c-6ac3-84e9-1c8bf8d6ad22",
|
|
35
|
+
* scope: "/keys",
|
|
36
|
+
* roleDefinitionId: "/Microsoft.KeyVault/providers/Microsoft.Authorization/roleDefinitions/21dbd100-6940-42c2-9190-5d6cb909625b",
|
|
37
|
+
* principalId: current.then(current => current.objectId),
|
|
38
|
+
* });
|
|
39
|
+
* // this gives your service principal the HSM Crypto Officer role which lets you purge hsm keys
|
|
40
|
+
* const hsm_crypto_officer = new azure.keyvault.ManagedHardwareSecurityModuleRoleAssignment("hsm-crypto-officer", {
|
|
41
|
+
* managedHsmId: test.id,
|
|
42
|
+
* name: "1e243909-064c-6ac3-84e9-1c8bf8d6ad23",
|
|
43
|
+
* scope: "/keys",
|
|
44
|
+
* roleDefinitionId: "/Microsoft.KeyVault/providers/Microsoft.Authorization/roleDefinitions/515eb02d-2335-4d2d-92f2-b1cbdf9c3778",
|
|
45
|
+
* principalId: current.then(current => current.objectId),
|
|
46
|
+
* });
|
|
47
|
+
* const exampleManagedHardwareSecurityModuleKey = new azure.keyvault.ManagedHardwareSecurityModuleKey("example", {
|
|
48
|
+
* name: "example",
|
|
49
|
+
* managedHsmId: test.id,
|
|
50
|
+
* keyType: "EC-HSM",
|
|
51
|
+
* curve: "P-521",
|
|
52
|
+
* keyOpts: ["sign"],
|
|
53
|
+
* }, {
|
|
54
|
+
* dependsOn: [
|
|
55
|
+
* testAzurermKeyVaultManagedHardwareSecurityModuleRoleAssignment,
|
|
56
|
+
* test1,
|
|
57
|
+
* ],
|
|
58
|
+
* });
|
|
59
|
+
* ```
|
|
60
|
+
*
|
|
9
61
|
* ## API Providers
|
|
10
62
|
*
|
|
11
63
|
* <!-- This section is generated, changes will be overwritten -->
|
|
@@ -12,6 +12,58 @@ const utilities = require("../utilities");
|
|
|
12
12
|
*
|
|
13
13
|
* ## Example Usage
|
|
14
14
|
*
|
|
15
|
+
* ```typescript
|
|
16
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
+
* import * as azure from "@pulumi/azure";
|
|
18
|
+
*
|
|
19
|
+
* const current = azure.core.getClientConfig({});
|
|
20
|
+
* const example = new azure.keyvault.ManagedHardwareSecurityModule("example", {
|
|
21
|
+
* name: "example",
|
|
22
|
+
* resourceGroupName: exampleAzurermResourceGroup.name,
|
|
23
|
+
* location: exampleAzurermResourceGroup.location,
|
|
24
|
+
* skuName: "Standard_B1",
|
|
25
|
+
* tenantId: current.then(current => current.tenantId),
|
|
26
|
+
* adminObjectIds: [current.then(current => current.objectId)],
|
|
27
|
+
* purgeProtectionEnabled: false,
|
|
28
|
+
* activeConfig: [{
|
|
29
|
+
* securityDomainCertificate: [
|
|
30
|
+
* cert[0].id,
|
|
31
|
+
* cert[1].id,
|
|
32
|
+
* cert[2].id,
|
|
33
|
+
* ],
|
|
34
|
+
* securityDomainQuorum: 2,
|
|
35
|
+
* }],
|
|
36
|
+
* });
|
|
37
|
+
* // this gives your service principal the HSM Crypto User role which lets you create and destroy hsm keys
|
|
38
|
+
* const hsm_crypto_user = new azure.keyvault.ManagedHardwareSecurityModuleRoleAssignment("hsm-crypto-user", {
|
|
39
|
+
* managedHsmId: test.id,
|
|
40
|
+
* name: "1e243909-064c-6ac3-84e9-1c8bf8d6ad22",
|
|
41
|
+
* scope: "/keys",
|
|
42
|
+
* roleDefinitionId: "/Microsoft.KeyVault/providers/Microsoft.Authorization/roleDefinitions/21dbd100-6940-42c2-9190-5d6cb909625b",
|
|
43
|
+
* principalId: current.then(current => current.objectId),
|
|
44
|
+
* });
|
|
45
|
+
* // this gives your service principal the HSM Crypto Officer role which lets you purge hsm keys
|
|
46
|
+
* const hsm_crypto_officer = new azure.keyvault.ManagedHardwareSecurityModuleRoleAssignment("hsm-crypto-officer", {
|
|
47
|
+
* managedHsmId: test.id,
|
|
48
|
+
* name: "1e243909-064c-6ac3-84e9-1c8bf8d6ad23",
|
|
49
|
+
* scope: "/keys",
|
|
50
|
+
* roleDefinitionId: "/Microsoft.KeyVault/providers/Microsoft.Authorization/roleDefinitions/515eb02d-2335-4d2d-92f2-b1cbdf9c3778",
|
|
51
|
+
* principalId: current.then(current => current.objectId),
|
|
52
|
+
* });
|
|
53
|
+
* const exampleManagedHardwareSecurityModuleKey = new azure.keyvault.ManagedHardwareSecurityModuleKey("example", {
|
|
54
|
+
* name: "example",
|
|
55
|
+
* managedHsmId: test.id,
|
|
56
|
+
* keyType: "EC-HSM",
|
|
57
|
+
* curve: "P-521",
|
|
58
|
+
* keyOpts: ["sign"],
|
|
59
|
+
* }, {
|
|
60
|
+
* dependsOn: [
|
|
61
|
+
* testAzurermKeyVaultManagedHardwareSecurityModuleRoleAssignment,
|
|
62
|
+
* test1,
|
|
63
|
+
* ],
|
|
64
|
+
* });
|
|
65
|
+
* ```
|
|
66
|
+
*
|
|
15
67
|
* ## API Providers
|
|
16
68
|
*
|
|
17
69
|
* <!-- This section is generated, changes will be overwritten -->
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"managedHardwareSecurityModuleKey.js","sourceRoot":"","sources":["../../keyvault/managedHardwareSecurityModuleKey.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"managedHardwareSecurityModuleKey.js","sourceRoot":"","sources":["../../keyvault/managedHardwareSecurityModuleKey.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyEG;AACH,MAAa,gCAAiC,SAAQ,MAAM,CAAC,cAAc;IACvE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6C,EAAE,IAAmC;QAC3I,OAAO,IAAI,gCAAgC,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACvF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gCAAgC,CAAC,YAAY,CAAC;IACjF,CAAC;IAqDD,YAAY,IAAY,EAAE,WAA0F,EAAE,IAAmC;QACrJ,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgE,CAAC;YAC/E,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;SACtD;aAAM;YACH,MAAM,IAAI,GAAG,WAA+D,CAAC;YAC7E,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,IAAI,EAAE,YAAY,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/C,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gCAAgC,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrF,CAAC;;AAtHL,4EAuHC;AAzGG,gBAAgB;AACO,6CAAY,GAAG,kFAAkF,CAAC"}
|
|
@@ -2,6 +2,25 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* Manages a Managed Hardware Security Module Role Assignment.
|
|
4
4
|
*
|
|
5
|
+
* ## Example Usage
|
|
6
|
+
*
|
|
7
|
+
* ```typescript
|
|
8
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
+
* import * as azure from "@pulumi/azure";
|
|
10
|
+
*
|
|
11
|
+
* const user = azure.keyvault.getManagedHardwareSecurityModuleRoleDefinition({
|
|
12
|
+
* managedHsmId: exampleAzurermKeyVaultManagedHardwareSecurityModule.id,
|
|
13
|
+
* name: "21dbd100-6940-42c2-9190-5d6cb909625b",
|
|
14
|
+
* });
|
|
15
|
+
* const example = new azure.keyvault.ManagedHardwareSecurityModuleRoleAssignment("example", {
|
|
16
|
+
* name: "a9dbe818-56e7-5878-c0ce-a1477692c1d6",
|
|
17
|
+
* managedHsmId: exampleAzurermKeyVaultManagedHardwareSecurityModule.id,
|
|
18
|
+
* scope: user.then(user => user.scope),
|
|
19
|
+
* roleDefinitionId: user.then(user => user.resourceManagerId),
|
|
20
|
+
* principalId: current.objectId,
|
|
21
|
+
* });
|
|
22
|
+
* ```
|
|
23
|
+
*
|
|
5
24
|
* ## Import
|
|
6
25
|
*
|
|
7
26
|
* Managed Hardware Security Modules can be imported using the `resource id`, e.g.
|
|
@@ -8,6 +8,25 @@ const utilities = require("../utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Manages a Managed Hardware Security Module Role Assignment.
|
|
10
10
|
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as azure from "@pulumi/azure";
|
|
16
|
+
*
|
|
17
|
+
* const user = azure.keyvault.getManagedHardwareSecurityModuleRoleDefinition({
|
|
18
|
+
* managedHsmId: exampleAzurermKeyVaultManagedHardwareSecurityModule.id,
|
|
19
|
+
* name: "21dbd100-6940-42c2-9190-5d6cb909625b",
|
|
20
|
+
* });
|
|
21
|
+
* const example = new azure.keyvault.ManagedHardwareSecurityModuleRoleAssignment("example", {
|
|
22
|
+
* name: "a9dbe818-56e7-5878-c0ce-a1477692c1d6",
|
|
23
|
+
* managedHsmId: exampleAzurermKeyVaultManagedHardwareSecurityModule.id,
|
|
24
|
+
* scope: user.then(user => user.scope),
|
|
25
|
+
* roleDefinitionId: user.then(user => user.resourceManagerId),
|
|
26
|
+
* principalId: current.objectId,
|
|
27
|
+
* });
|
|
28
|
+
* ```
|
|
29
|
+
*
|
|
11
30
|
* ## Import
|
|
12
31
|
*
|
|
13
32
|
* Managed Hardware Security Modules can be imported using the `resource id`, e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"managedHardwareSecurityModuleRoleAssignment.js","sourceRoot":"","sources":["../../keyvault/managedHardwareSecurityModuleRoleAssignment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"managedHardwareSecurityModuleRoleAssignment.js","sourceRoot":"","sources":["../../keyvault/managedHardwareSecurityModuleRoleAssignment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,2CAA4C,SAAQ,MAAM,CAAC,cAAc;IAClF;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwD,EAAE,IAAmC;QACtJ,OAAO,IAAI,2CAA2C,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAClG,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,2CAA2C,CAAC,YAAY,CAAC;IAC5F,CAAC;IAoCD,YAAY,IAAY,EAAE,WAAgH,EAAE,IAAmC;QAC3K,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2E,CAAC;YAC1F,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;SAC1C;aAAM;YACH,MAAM,IAAI,GAAG,WAA0E,CAAC;YACxF,IAAI,IAAI,EAAE,YAAY,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/C,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,gBAAgB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;aACnE;YACD,IAAI,IAAI,EAAE,KAAK,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxC,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACpD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,2CAA2C,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChG,CAAC;;AAhGL,kGAiGC;AAnFG,gBAAgB;AACO,wDAAY,GAAG,wGAAwG,CAAC"}
|
|
@@ -6,6 +6,37 @@ import * as outputs from "../types/output";
|
|
|
6
6
|
*
|
|
7
7
|
* ## Example Usage
|
|
8
8
|
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as azure from "@pulumi/azure";
|
|
12
|
+
*
|
|
13
|
+
* const example = new azure.keyvault.ManagedHardwareSecurityModule("example", {
|
|
14
|
+
* name: "example",
|
|
15
|
+
* resourceGroupName: exampleAzurermResourceGroup.name,
|
|
16
|
+
* location: exampleAzurermResourceGroup.location,
|
|
17
|
+
* skuName: "Standard_B1",
|
|
18
|
+
* tenantId: current.tenantId,
|
|
19
|
+
* adminObjectIds: [current.objectId],
|
|
20
|
+
* purgeProtectionEnabled: false,
|
|
21
|
+
* activeConfig: [{
|
|
22
|
+
* securityDomainCertificate: [
|
|
23
|
+
* cert[0].id,
|
|
24
|
+
* cert[1].id,
|
|
25
|
+
* cert[2].id,
|
|
26
|
+
* ],
|
|
27
|
+
* securityDomainQuorum: 2,
|
|
28
|
+
* }],
|
|
29
|
+
* });
|
|
30
|
+
* const exampleManagedHardwareSecurityModuleRoleDefinition = new azure.keyvault.ManagedHardwareSecurityModuleRoleDefinition("example", {
|
|
31
|
+
* name: "7d206142-bf01-11ed-80bc-00155d61ee9e",
|
|
32
|
+
* managedHsmId: example.id,
|
|
33
|
+
* description: "desc foo",
|
|
34
|
+
* permissions: [{
|
|
35
|
+
* dataActions: ["Microsoft.KeyVault/managedHsm/keys/read/action"],
|
|
36
|
+
* }],
|
|
37
|
+
* });
|
|
38
|
+
* ```
|
|
39
|
+
*
|
|
9
40
|
* ## Import
|
|
10
41
|
*
|
|
11
42
|
* Key Vault Managed Hardware Security Module Role Definitions can be imported using the `resource id`, e.g.
|
|
@@ -10,6 +10,37 @@ const utilities = require("../utilities");
|
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
12
|
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as azure from "@pulumi/azure";
|
|
16
|
+
*
|
|
17
|
+
* const example = new azure.keyvault.ManagedHardwareSecurityModule("example", {
|
|
18
|
+
* name: "example",
|
|
19
|
+
* resourceGroupName: exampleAzurermResourceGroup.name,
|
|
20
|
+
* location: exampleAzurermResourceGroup.location,
|
|
21
|
+
* skuName: "Standard_B1",
|
|
22
|
+
* tenantId: current.tenantId,
|
|
23
|
+
* adminObjectIds: [current.objectId],
|
|
24
|
+
* purgeProtectionEnabled: false,
|
|
25
|
+
* activeConfig: [{
|
|
26
|
+
* securityDomainCertificate: [
|
|
27
|
+
* cert[0].id,
|
|
28
|
+
* cert[1].id,
|
|
29
|
+
* cert[2].id,
|
|
30
|
+
* ],
|
|
31
|
+
* securityDomainQuorum: 2,
|
|
32
|
+
* }],
|
|
33
|
+
* });
|
|
34
|
+
* const exampleManagedHardwareSecurityModuleRoleDefinition = new azure.keyvault.ManagedHardwareSecurityModuleRoleDefinition("example", {
|
|
35
|
+
* name: "7d206142-bf01-11ed-80bc-00155d61ee9e",
|
|
36
|
+
* managedHsmId: example.id,
|
|
37
|
+
* description: "desc foo",
|
|
38
|
+
* permissions: [{
|
|
39
|
+
* dataActions: ["Microsoft.KeyVault/managedHsm/keys/read/action"],
|
|
40
|
+
* }],
|
|
41
|
+
* });
|
|
42
|
+
* ```
|
|
43
|
+
*
|
|
13
44
|
* ## Import
|
|
14
45
|
*
|
|
15
46
|
* Key Vault Managed Hardware Security Module Role Definitions can be imported using the `resource id`, e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"managedHardwareSecurityModuleRoleDefinition.js","sourceRoot":"","sources":["../../keyvault/managedHardwareSecurityModuleRoleDefinition.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"managedHardwareSecurityModuleRoleDefinition.js","sourceRoot":"","sources":["../../keyvault/managedHardwareSecurityModuleRoleDefinition.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2CG;AACH,MAAa,2CAA4C,SAAQ,MAAM,CAAC,cAAc;IAClF;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwD,EAAE,IAAmC;QACtJ,OAAO,IAAI,2CAA2C,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAClG,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,2CAA2C,CAAC,YAAY,CAAC;IAC5F,CAAC;IAuCD,YAAY,IAAY,EAAE,WAAgH,EAAE,IAAmC;QAC3K,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2E,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;SAChD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0E,CAAC;YACxF,IAAI,IAAI,EAAE,YAAY,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/C,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAClD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,2CAA2C,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChG,CAAC;;AA5FL,kGA6FC;AA/EG,gBAAgB;AACO,wDAAY,GAAG,wGAAwG,CAAC"}
|
|
@@ -55,70 +55,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
55
55
|
* });
|
|
56
56
|
* ```
|
|
57
57
|
*
|
|
58
|
-
* ### Automatically Regenerate Storage Account Access Key)
|
|
59
|
-
*
|
|
60
|
-
* ```typescript
|
|
61
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
62
|
-
* import * as azure from "@pulumi/azure";
|
|
63
|
-
* import * as azuread from "@pulumi/azuread";
|
|
64
|
-
*
|
|
65
|
-
* const current = azure.core.getClientConfig({});
|
|
66
|
-
* const test = azuread.getServicePrincipal({
|
|
67
|
-
* applicationId: "cfa8b339-82a2-471a-a3c9-0fc0be7a4093",
|
|
68
|
-
* });
|
|
69
|
-
* const example = new azure.core.ResourceGroup("example", {
|
|
70
|
-
* name: "example-resources",
|
|
71
|
-
* location: "West Europe",
|
|
72
|
-
* });
|
|
73
|
-
* const exampleAccount = new azure.storage.Account("example", {
|
|
74
|
-
* name: "storageaccountname",
|
|
75
|
-
* resourceGroupName: example.name,
|
|
76
|
-
* location: example.location,
|
|
77
|
-
* accountTier: "Standard",
|
|
78
|
-
* accountReplicationType: "LRS",
|
|
79
|
-
* });
|
|
80
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
81
|
-
* name: "keyvaultname",
|
|
82
|
-
* location: example.location,
|
|
83
|
-
* resourceGroupName: example.name,
|
|
84
|
-
* tenantId: current.then(current => current.tenantId),
|
|
85
|
-
* skuName: "standard",
|
|
86
|
-
* accessPolicies: [{
|
|
87
|
-
* tenantId: current.then(current => current.tenantId),
|
|
88
|
-
* objectId: current.then(current => current.objectId),
|
|
89
|
-
* secretPermissions: [
|
|
90
|
-
* "Get",
|
|
91
|
-
* "Delete",
|
|
92
|
-
* ],
|
|
93
|
-
* storagePermissions: [
|
|
94
|
-
* "Get",
|
|
95
|
-
* "List",
|
|
96
|
-
* "Set",
|
|
97
|
-
* "SetSAS",
|
|
98
|
-
* "GetSAS",
|
|
99
|
-
* "DeleteSAS",
|
|
100
|
-
* "Update",
|
|
101
|
-
* "RegenerateKey",
|
|
102
|
-
* ],
|
|
103
|
-
* }],
|
|
104
|
-
* });
|
|
105
|
-
* const exampleAssignment = new azure.authorization.Assignment("example", {
|
|
106
|
-
* scope: exampleAccount.id,
|
|
107
|
-
* roleDefinitionName: "Storage Account Key Operator Service Role",
|
|
108
|
-
* principalId: test.then(test => test.id),
|
|
109
|
-
* });
|
|
110
|
-
* const exampleManagedStorageAccount = new azure.keyvault.ManagedStorageAccount("example", {
|
|
111
|
-
* name: "examplemanagedstorage",
|
|
112
|
-
* keyVaultId: exampleKeyVault.id,
|
|
113
|
-
* storageAccountId: exampleAccount.id,
|
|
114
|
-
* storageAccountKey: "key1",
|
|
115
|
-
* regenerateKeyAutomatically: true,
|
|
116
|
-
* regenerationPeriod: "P1D",
|
|
117
|
-
* }, {
|
|
118
|
-
* dependsOn: [exampleAssignment],
|
|
119
|
-
* });
|
|
120
|
-
* ```
|
|
121
|
-
*
|
|
122
58
|
* ## Import
|
|
123
59
|
*
|
|
124
60
|
* Key Vault Managed Storage Accounts can be imported using the `resource id`, e.g.
|
|
@@ -61,70 +61,6 @@ const utilities = require("../utilities");
|
|
|
61
61
|
* });
|
|
62
62
|
* ```
|
|
63
63
|
*
|
|
64
|
-
* ### Automatically Regenerate Storage Account Access Key)
|
|
65
|
-
*
|
|
66
|
-
* ```typescript
|
|
67
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
68
|
-
* import * as azure from "@pulumi/azure";
|
|
69
|
-
* import * as azuread from "@pulumi/azuread";
|
|
70
|
-
*
|
|
71
|
-
* const current = azure.core.getClientConfig({});
|
|
72
|
-
* const test = azuread.getServicePrincipal({
|
|
73
|
-
* applicationId: "cfa8b339-82a2-471a-a3c9-0fc0be7a4093",
|
|
74
|
-
* });
|
|
75
|
-
* const example = new azure.core.ResourceGroup("example", {
|
|
76
|
-
* name: "example-resources",
|
|
77
|
-
* location: "West Europe",
|
|
78
|
-
* });
|
|
79
|
-
* const exampleAccount = new azure.storage.Account("example", {
|
|
80
|
-
* name: "storageaccountname",
|
|
81
|
-
* resourceGroupName: example.name,
|
|
82
|
-
* location: example.location,
|
|
83
|
-
* accountTier: "Standard",
|
|
84
|
-
* accountReplicationType: "LRS",
|
|
85
|
-
* });
|
|
86
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
87
|
-
* name: "keyvaultname",
|
|
88
|
-
* location: example.location,
|
|
89
|
-
* resourceGroupName: example.name,
|
|
90
|
-
* tenantId: current.then(current => current.tenantId),
|
|
91
|
-
* skuName: "standard",
|
|
92
|
-
* accessPolicies: [{
|
|
93
|
-
* tenantId: current.then(current => current.tenantId),
|
|
94
|
-
* objectId: current.then(current => current.objectId),
|
|
95
|
-
* secretPermissions: [
|
|
96
|
-
* "Get",
|
|
97
|
-
* "Delete",
|
|
98
|
-
* ],
|
|
99
|
-
* storagePermissions: [
|
|
100
|
-
* "Get",
|
|
101
|
-
* "List",
|
|
102
|
-
* "Set",
|
|
103
|
-
* "SetSAS",
|
|
104
|
-
* "GetSAS",
|
|
105
|
-
* "DeleteSAS",
|
|
106
|
-
* "Update",
|
|
107
|
-
* "RegenerateKey",
|
|
108
|
-
* ],
|
|
109
|
-
* }],
|
|
110
|
-
* });
|
|
111
|
-
* const exampleAssignment = new azure.authorization.Assignment("example", {
|
|
112
|
-
* scope: exampleAccount.id,
|
|
113
|
-
* roleDefinitionName: "Storage Account Key Operator Service Role",
|
|
114
|
-
* principalId: test.then(test => test.id),
|
|
115
|
-
* });
|
|
116
|
-
* const exampleManagedStorageAccount = new azure.keyvault.ManagedStorageAccount("example", {
|
|
117
|
-
* name: "examplemanagedstorage",
|
|
118
|
-
* keyVaultId: exampleKeyVault.id,
|
|
119
|
-
* storageAccountId: exampleAccount.id,
|
|
120
|
-
* storageAccountKey: "key1",
|
|
121
|
-
* regenerateKeyAutomatically: true,
|
|
122
|
-
* regenerationPeriod: "P1D",
|
|
123
|
-
* }, {
|
|
124
|
-
* dependsOn: [exampleAssignment],
|
|
125
|
-
* });
|
|
126
|
-
* ```
|
|
127
|
-
*
|
|
128
64
|
* ## Import
|
|
129
65
|
*
|
|
130
66
|
* Key Vault Managed Storage Accounts can be imported using the `resource id`, e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"managedStorageAccount.js","sourceRoot":"","sources":["../../keyvault/managedStorageAccount.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"managedStorageAccount.js","sourceRoot":"","sources":["../../keyvault/managedStorageAccount.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+DG;AACH,MAAa,qBAAsB,SAAQ,MAAM,CAAC,cAAc;IAC5D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkC,EAAE,IAAmC;QAChI,OAAO,IAAI,qBAAqB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC5E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,qBAAqB,CAAC,YAAY,CAAC;IACtE,CAAC;IAyCD,YAAY,IAAY,EAAE,WAAoE,EAAE,IAAmC;QAC/H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqD,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,4BAA4B,CAAC,GAAG,KAAK,EAAE,0BAA0B,CAAC;YACjF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAAoD,CAAC;YAClE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,gBAAgB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;aACnE;YACD,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,4BAA4B,CAAC,GAAG,IAAI,EAAE,0BAA0B,CAAC;YAChF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;SACvC;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,qBAAqB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1E,CAAC;;AApGL,sDAqGC;AAvFG,gBAAgB;AACO,kCAAY,GAAG,4DAA4D,CAAC"}
|
|
@@ -2,6 +2,44 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* Manages a Kusto Cluster Principal Assignment.
|
|
4
4
|
*
|
|
5
|
+
* ## Example Usage
|
|
6
|
+
*
|
|
7
|
+
* ```typescript
|
|
8
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
+
* import * as azure from "@pulumi/azure";
|
|
10
|
+
*
|
|
11
|
+
* const current = azure.core.getClientConfig({});
|
|
12
|
+
* const example = new azure.core.ResourceGroup("example", {
|
|
13
|
+
* name: "KustoRG",
|
|
14
|
+
* location: "West Europe",
|
|
15
|
+
* });
|
|
16
|
+
* const exampleCluster = new azure.kusto.Cluster("example", {
|
|
17
|
+
* name: "kustocluster",
|
|
18
|
+
* location: example.location,
|
|
19
|
+
* resourceGroupName: example.name,
|
|
20
|
+
* sku: {
|
|
21
|
+
* name: "Standard_D13_v2",
|
|
22
|
+
* capacity: 2,
|
|
23
|
+
* },
|
|
24
|
+
* });
|
|
25
|
+
* const exampleClusterPrincipalAssignment = new azure.kusto.ClusterPrincipalAssignment("example", {
|
|
26
|
+
* name: "KustoPrincipalAssignment",
|
|
27
|
+
* resourceGroupName: example.name,
|
|
28
|
+
* clusterName: exampleCluster.name,
|
|
29
|
+
* tenantId: current.then(current => current.tenantId),
|
|
30
|
+
* principalId: current.then(current => current.principalId),
|
|
31
|
+
* principalType: "App",
|
|
32
|
+
* role: "AllDatabasesAdmin",
|
|
33
|
+
* });
|
|
34
|
+
* ```
|
|
35
|
+
*
|
|
36
|
+
* ## API Providers
|
|
37
|
+
*
|
|
38
|
+
* <!-- This section is generated, changes will be overwritten -->
|
|
39
|
+
* This resource uses the following Azure API Providers:
|
|
40
|
+
*
|
|
41
|
+
* * `Microsoft.Kusto` - 2024-04-13
|
|
42
|
+
*
|
|
5
43
|
* ## Import
|
|
6
44
|
*
|
|
7
45
|
* Data Explorer Cluster Principal Assignments can be imported using the `resource id`, e.g.
|
|
@@ -8,6 +8,44 @@ const utilities = require("../utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Manages a Kusto Cluster Principal Assignment.
|
|
10
10
|
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as azure from "@pulumi/azure";
|
|
16
|
+
*
|
|
17
|
+
* const current = azure.core.getClientConfig({});
|
|
18
|
+
* const example = new azure.core.ResourceGroup("example", {
|
|
19
|
+
* name: "KustoRG",
|
|
20
|
+
* location: "West Europe",
|
|
21
|
+
* });
|
|
22
|
+
* const exampleCluster = new azure.kusto.Cluster("example", {
|
|
23
|
+
* name: "kustocluster",
|
|
24
|
+
* location: example.location,
|
|
25
|
+
* resourceGroupName: example.name,
|
|
26
|
+
* sku: {
|
|
27
|
+
* name: "Standard_D13_v2",
|
|
28
|
+
* capacity: 2,
|
|
29
|
+
* },
|
|
30
|
+
* });
|
|
31
|
+
* const exampleClusterPrincipalAssignment = new azure.kusto.ClusterPrincipalAssignment("example", {
|
|
32
|
+
* name: "KustoPrincipalAssignment",
|
|
33
|
+
* resourceGroupName: example.name,
|
|
34
|
+
* clusterName: exampleCluster.name,
|
|
35
|
+
* tenantId: current.then(current => current.tenantId),
|
|
36
|
+
* principalId: current.then(current => current.principalId),
|
|
37
|
+
* principalType: "App",
|
|
38
|
+
* role: "AllDatabasesAdmin",
|
|
39
|
+
* });
|
|
40
|
+
* ```
|
|
41
|
+
*
|
|
42
|
+
* ## API Providers
|
|
43
|
+
*
|
|
44
|
+
* <!-- This section is generated, changes will be overwritten -->
|
|
45
|
+
* This resource uses the following Azure API Providers:
|
|
46
|
+
*
|
|
47
|
+
* * `Microsoft.Kusto` - 2024-04-13
|
|
48
|
+
*
|
|
11
49
|
* ## Import
|
|
12
50
|
*
|
|
13
51
|
* Data Explorer Cluster Principal Assignments can be imported using the `resource id`, e.g.
|