@pulumi/azure 6.31.0-alpha.1765395796 → 6.31.0-alpha.1765925428
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/appplatform/springCloudCertificate.d.ts +0 -99
- package/appplatform/springCloudCertificate.js +0 -99
- package/appplatform/springCloudCertificate.js.map +1 -1
- package/appservice/activeSlot.d.ts +1 -1
- package/appservice/activeSlot.js +1 -1
- package/appservice/customHostnameBinding.d.ts +2 -2
- package/appservice/customHostnameBinding.js +2 -2
- package/appservice/slot.d.ts +4 -4
- package/appservice/slot.js +4 -4
- package/cdn/frontdoorSecret.d.ts +0 -72
- package/cdn/frontdoorSecret.js +0 -72
- package/cdn/frontdoorSecret.js.map +1 -1
- package/cosmosdb/account.d.ts +2 -2
- package/cosmosdb/account.js +2 -2
- package/cosmosdb/cassandraCluster.d.ts +0 -49
- package/cosmosdb/cassandraCluster.js +0 -49
- package/cosmosdb/cassandraCluster.js.map +1 -1
- package/cosmosdb/cassandraDatacenter.d.ts +0 -59
- package/cosmosdb/cassandraDatacenter.js +0 -59
- package/cosmosdb/cassandraDatacenter.js.map +1 -1
- package/datashare/datasetBlobStorage.d.ts +0 -66
- package/datashare/datasetBlobStorage.js +0 -66
- package/datashare/datasetBlobStorage.js.map +1 -1
- package/datashare/datasetDataLakeGen2.d.ts +0 -62
- package/datashare/datasetDataLakeGen2.js +0 -62
- package/datashare/datasetDataLakeGen2.js.map +1 -1
- package/desktopvirtualization/scalingPlan.d.ts +0 -103
- package/desktopvirtualization/scalingPlan.js +0 -103
- package/desktopvirtualization/scalingPlan.js.map +1 -1
- package/desktopvirtualization/scalingPlanHostPoolAssociation.d.ts +0 -79
- package/desktopvirtualization/scalingPlanHostPoolAssociation.js +0 -79
- package/desktopvirtualization/scalingPlanHostPoolAssociation.js.map +1 -1
- package/hpc/cacheBlobNfsTarget.d.ts +0 -149
- package/hpc/cacheBlobNfsTarget.js +0 -149
- package/hpc/cacheBlobNfsTarget.js.map +1 -1
- package/hpc/cacheBlobTarget.d.ts +0 -71
- package/hpc/cacheBlobTarget.js +0 -71
- package/hpc/cacheBlobTarget.js.map +1 -1
- package/keyvault/accessPolicy.d.ts +0 -42
- package/keyvault/accessPolicy.js +0 -42
- package/keyvault/accessPolicy.js.map +1 -1
- package/keyvault/managedStorageAccount.d.ts +0 -2
- package/keyvault/managedStorageAccount.js +0 -2
- package/keyvault/managedStorageAccount.js.map +1 -1
- package/machinelearning/workspace.d.ts +0 -167
- package/machinelearning/workspace.js +0 -167
- package/machinelearning/workspace.js.map +1 -1
- package/management/privateLinkAssociation.d.ts +2 -2
- package/management/privateLinkAssociation.js +2 -2
- package/netapp/volumeGroupSapHana.d.ts +1 -1
- package/netapp/volumeGroupSapHana.js +1 -1
- package/network/trafficManagerProfile.d.ts +2 -2
- package/network/trafficManagerProfile.js +2 -2
- package/operationalinsights/analyticsSolution.d.ts +3 -3
- package/operationalinsights/analyticsSolution.js +3 -3
- package/oracle/getCloudVmCluster.d.ts +1 -1
- package/package.json +2 -2
- package/pim/roleManagementPolicy.d.ts +0 -56
- package/pim/roleManagementPolicy.js +0 -56
- package/pim/roleManagementPolicy.js.map +1 -1
- package/postgresql/flexibleServerActiveDirectoryAdministrator.d.ts +0 -47
- package/postgresql/flexibleServerActiveDirectoryAdministrator.js +0 -47
- package/postgresql/flexibleServerActiveDirectoryAdministrator.js.map +1 -1
- package/redhatopenshift/cluster.d.ts +0 -103
- package/redhatopenshift/cluster.js +0 -103
- package/redhatopenshift/cluster.js.map +1 -1
- package/redis/firewallRule.d.ts +3 -3
- package/redis/firewallRule.js +3 -3
- package/stack/hciCluster.d.ts +0 -36
- package/stack/hciCluster.js +0 -36
- package/stack/hciCluster.js.map +1 -1
- package/stack/hciMarketplaceGalleryImage.d.ts +0 -48
- package/stack/hciMarketplaceGalleryImage.js +0 -48
- package/stack/hciMarketplaceGalleryImage.js.map +1 -1
- package/trafficmanager/profile.d.ts +2 -2
- package/trafficmanager/profile.js +2 -2
- package/types/output.d.ts +3 -3
|
@@ -4,105 +4,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
4
4
|
*
|
|
5
5
|
* !> **Note:** Azure Spring Apps is now deprecated and will be retired on 2028-05-31 - as such the `azure.appplatform.SpringCloudCertificate` resource is deprecated and will be removed in a future major version of the AzureRM Provider. See https://aka.ms/asaretirement for more information.
|
|
6
6
|
*
|
|
7
|
-
* ## Example Usage
|
|
8
|
-
*
|
|
9
|
-
* ```typescript
|
|
10
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
-
* import * as azure from "@pulumi/azure";
|
|
12
|
-
* import * as azuread from "@pulumi/azuread";
|
|
13
|
-
*
|
|
14
|
-
* const exampleResourceGroup = new azure.core.ResourceGroup("example", {
|
|
15
|
-
* name: "example-resources",
|
|
16
|
-
* location: "West Europe",
|
|
17
|
-
* });
|
|
18
|
-
* const current = azure.core.getClientConfig({});
|
|
19
|
-
* const example = azuread.getServicePrincipal({
|
|
20
|
-
* displayName: "Azure Spring Cloud Resource Provider",
|
|
21
|
-
* });
|
|
22
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
23
|
-
* name: "keyvaultcertexample",
|
|
24
|
-
* location: exampleResourceGroup.location,
|
|
25
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
26
|
-
* tenantId: current.then(current => current.tenantId),
|
|
27
|
-
* skuName: "standard",
|
|
28
|
-
* accessPolicies: [
|
|
29
|
-
* {
|
|
30
|
-
* tenantId: current.then(current => current.tenantId),
|
|
31
|
-
* objectId: current.then(current => current.objectId),
|
|
32
|
-
* secretPermissions: ["Set"],
|
|
33
|
-
* certificatePermissions: [
|
|
34
|
-
* "Create",
|
|
35
|
-
* "Delete",
|
|
36
|
-
* "Get",
|
|
37
|
-
* "Update",
|
|
38
|
-
* ],
|
|
39
|
-
* },
|
|
40
|
-
* {
|
|
41
|
-
* tenantId: current.then(current => current.tenantId),
|
|
42
|
-
* objectId: example.then(example => example.objectId),
|
|
43
|
-
* secretPermissions: [
|
|
44
|
-
* "Get",
|
|
45
|
-
* "List",
|
|
46
|
-
* ],
|
|
47
|
-
* certificatePermissions: [
|
|
48
|
-
* "Get",
|
|
49
|
-
* "List",
|
|
50
|
-
* ],
|
|
51
|
-
* },
|
|
52
|
-
* ],
|
|
53
|
-
* });
|
|
54
|
-
* const exampleCertificate = new azure.keyvault.Certificate("example", {
|
|
55
|
-
* name: "cert-example",
|
|
56
|
-
* keyVaultId: exampleKeyVault.id,
|
|
57
|
-
* certificatePolicy: {
|
|
58
|
-
* issuerParameters: {
|
|
59
|
-
* name: "Self",
|
|
60
|
-
* },
|
|
61
|
-
* keyProperties: {
|
|
62
|
-
* exportable: true,
|
|
63
|
-
* keySize: 2048,
|
|
64
|
-
* keyType: "RSA",
|
|
65
|
-
* reuseKey: true,
|
|
66
|
-
* },
|
|
67
|
-
* lifetimeActions: [{
|
|
68
|
-
* action: {
|
|
69
|
-
* actionType: "AutoRenew",
|
|
70
|
-
* },
|
|
71
|
-
* trigger: {
|
|
72
|
-
* daysBeforeExpiry: 30,
|
|
73
|
-
* },
|
|
74
|
-
* }],
|
|
75
|
-
* secretProperties: {
|
|
76
|
-
* contentType: "application/x-pkcs12",
|
|
77
|
-
* },
|
|
78
|
-
* x509CertificateProperties: {
|
|
79
|
-
* keyUsages: [
|
|
80
|
-
* "cRLSign",
|
|
81
|
-
* "dataEncipherment",
|
|
82
|
-
* "digitalSignature",
|
|
83
|
-
* "keyAgreement",
|
|
84
|
-
* "keyCertSign",
|
|
85
|
-
* "keyEncipherment",
|
|
86
|
-
* ],
|
|
87
|
-
* subject: "CN=contoso.com",
|
|
88
|
-
* validityInMonths: 12,
|
|
89
|
-
* },
|
|
90
|
-
* },
|
|
91
|
-
* });
|
|
92
|
-
* const exampleSpringCloudService = new azure.appplatform.SpringCloudService("example", {
|
|
93
|
-
* name: "example-springcloud",
|
|
94
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
95
|
-
* location: exampleResourceGroup.location,
|
|
96
|
-
* });
|
|
97
|
-
* const exampleSpringCloudCertificate = new azure.appplatform.SpringCloudCertificate("example", {
|
|
98
|
-
* name: "example-scc",
|
|
99
|
-
* resourceGroupName: exampleSpringCloudService.resourceGroupName,
|
|
100
|
-
* serviceName: exampleSpringCloudService.name,
|
|
101
|
-
* keyVaultCertificateId: exampleCertificate.id,
|
|
102
|
-
* excludePrivateKey: true,
|
|
103
|
-
* });
|
|
104
|
-
* ```
|
|
105
|
-
*
|
|
106
7
|
* ## Import
|
|
107
8
|
*
|
|
108
9
|
* Spring Cloud Certificate can be imported using the `resource id`, e.g.
|
|
@@ -10,105 +10,6 @@ const utilities = require("../utilities");
|
|
|
10
10
|
*
|
|
11
11
|
* !> **Note:** Azure Spring Apps is now deprecated and will be retired on 2028-05-31 - as such the `azure.appplatform.SpringCloudCertificate` resource is deprecated and will be removed in a future major version of the AzureRM Provider. See https://aka.ms/asaretirement for more information.
|
|
12
12
|
*
|
|
13
|
-
* ## Example Usage
|
|
14
|
-
*
|
|
15
|
-
* ```typescript
|
|
16
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
-
* import * as azure from "@pulumi/azure";
|
|
18
|
-
* import * as azuread from "@pulumi/azuread";
|
|
19
|
-
*
|
|
20
|
-
* const exampleResourceGroup = new azure.core.ResourceGroup("example", {
|
|
21
|
-
* name: "example-resources",
|
|
22
|
-
* location: "West Europe",
|
|
23
|
-
* });
|
|
24
|
-
* const current = azure.core.getClientConfig({});
|
|
25
|
-
* const example = azuread.getServicePrincipal({
|
|
26
|
-
* displayName: "Azure Spring Cloud Resource Provider",
|
|
27
|
-
* });
|
|
28
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
29
|
-
* name: "keyvaultcertexample",
|
|
30
|
-
* location: exampleResourceGroup.location,
|
|
31
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
32
|
-
* tenantId: current.then(current => current.tenantId),
|
|
33
|
-
* skuName: "standard",
|
|
34
|
-
* accessPolicies: [
|
|
35
|
-
* {
|
|
36
|
-
* tenantId: current.then(current => current.tenantId),
|
|
37
|
-
* objectId: current.then(current => current.objectId),
|
|
38
|
-
* secretPermissions: ["Set"],
|
|
39
|
-
* certificatePermissions: [
|
|
40
|
-
* "Create",
|
|
41
|
-
* "Delete",
|
|
42
|
-
* "Get",
|
|
43
|
-
* "Update",
|
|
44
|
-
* ],
|
|
45
|
-
* },
|
|
46
|
-
* {
|
|
47
|
-
* tenantId: current.then(current => current.tenantId),
|
|
48
|
-
* objectId: example.then(example => example.objectId),
|
|
49
|
-
* secretPermissions: [
|
|
50
|
-
* "Get",
|
|
51
|
-
* "List",
|
|
52
|
-
* ],
|
|
53
|
-
* certificatePermissions: [
|
|
54
|
-
* "Get",
|
|
55
|
-
* "List",
|
|
56
|
-
* ],
|
|
57
|
-
* },
|
|
58
|
-
* ],
|
|
59
|
-
* });
|
|
60
|
-
* const exampleCertificate = new azure.keyvault.Certificate("example", {
|
|
61
|
-
* name: "cert-example",
|
|
62
|
-
* keyVaultId: exampleKeyVault.id,
|
|
63
|
-
* certificatePolicy: {
|
|
64
|
-
* issuerParameters: {
|
|
65
|
-
* name: "Self",
|
|
66
|
-
* },
|
|
67
|
-
* keyProperties: {
|
|
68
|
-
* exportable: true,
|
|
69
|
-
* keySize: 2048,
|
|
70
|
-
* keyType: "RSA",
|
|
71
|
-
* reuseKey: true,
|
|
72
|
-
* },
|
|
73
|
-
* lifetimeActions: [{
|
|
74
|
-
* action: {
|
|
75
|
-
* actionType: "AutoRenew",
|
|
76
|
-
* },
|
|
77
|
-
* trigger: {
|
|
78
|
-
* daysBeforeExpiry: 30,
|
|
79
|
-
* },
|
|
80
|
-
* }],
|
|
81
|
-
* secretProperties: {
|
|
82
|
-
* contentType: "application/x-pkcs12",
|
|
83
|
-
* },
|
|
84
|
-
* x509CertificateProperties: {
|
|
85
|
-
* keyUsages: [
|
|
86
|
-
* "cRLSign",
|
|
87
|
-
* "dataEncipherment",
|
|
88
|
-
* "digitalSignature",
|
|
89
|
-
* "keyAgreement",
|
|
90
|
-
* "keyCertSign",
|
|
91
|
-
* "keyEncipherment",
|
|
92
|
-
* ],
|
|
93
|
-
* subject: "CN=contoso.com",
|
|
94
|
-
* validityInMonths: 12,
|
|
95
|
-
* },
|
|
96
|
-
* },
|
|
97
|
-
* });
|
|
98
|
-
* const exampleSpringCloudService = new azure.appplatform.SpringCloudService("example", {
|
|
99
|
-
* name: "example-springcloud",
|
|
100
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
101
|
-
* location: exampleResourceGroup.location,
|
|
102
|
-
* });
|
|
103
|
-
* const exampleSpringCloudCertificate = new azure.appplatform.SpringCloudCertificate("example", {
|
|
104
|
-
* name: "example-scc",
|
|
105
|
-
* resourceGroupName: exampleSpringCloudService.resourceGroupName,
|
|
106
|
-
* serviceName: exampleSpringCloudService.name,
|
|
107
|
-
* keyVaultCertificateId: exampleCertificate.id,
|
|
108
|
-
* excludePrivateKey: true,
|
|
109
|
-
* });
|
|
110
|
-
* ```
|
|
111
|
-
*
|
|
112
13
|
* ## Import
|
|
113
14
|
*
|
|
114
15
|
* Spring Cloud Certificate can be imported using the `resource id`, e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"springCloudCertificate.js","sourceRoot":"","sources":["../../appplatform/springCloudCertificate.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"springCloudCertificate.js","sourceRoot":"","sources":["../../appplatform/springCloudCertificate.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;GAYG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAuCD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;SACpD;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACpD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AA/FL,wDAgGC;AAlFG,gBAAgB;AACO,mCAAY,GAAG,iEAAiE,CAAC"}
|
|
@@ -13,7 +13,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
* import * as azure from "@pulumi/azure";
|
|
14
14
|
* import * as random from "@pulumi/random";
|
|
15
15
|
*
|
|
16
|
-
* const server = new random.
|
|
16
|
+
* const server = new random.index.Id("server", {});
|
|
17
17
|
* const example = new azure.core.ResourceGroup("example", {});
|
|
18
18
|
* const examplePlan = new azure.appservice.Plan("example", {});
|
|
19
19
|
* const exampleAppService = new azure.appservice.AppService("example", {});
|
package/appservice/activeSlot.js
CHANGED
|
@@ -19,7 +19,7 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* import * as azure from "@pulumi/azure";
|
|
20
20
|
* import * as random from "@pulumi/random";
|
|
21
21
|
*
|
|
22
|
-
* const server = new random.
|
|
22
|
+
* const server = new random.index.Id("server", {});
|
|
23
23
|
* const example = new azure.core.ResourceGroup("example", {});
|
|
24
24
|
* const examplePlan = new azure.appservice.Plan("example", {});
|
|
25
25
|
* const exampleAppService = new azure.appservice.AppService("example", {});
|
|
@@ -9,9 +9,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
9
9
|
* import * as azure from "@pulumi/azure";
|
|
10
10
|
* import * as random from "@pulumi/random";
|
|
11
11
|
*
|
|
12
|
-
* const server = new random.
|
|
12
|
+
* const server = new random.index.Id("server", {
|
|
13
13
|
* keepers: {
|
|
14
|
-
*
|
|
14
|
+
* aziId: 1,
|
|
15
15
|
* },
|
|
16
16
|
* byteLength: 8,
|
|
17
17
|
* });
|
|
@@ -15,9 +15,9 @@ const utilities = require("../utilities");
|
|
|
15
15
|
* import * as azure from "@pulumi/azure";
|
|
16
16
|
* import * as random from "@pulumi/random";
|
|
17
17
|
*
|
|
18
|
-
* const server = new random.
|
|
18
|
+
* const server = new random.index.Id("server", {
|
|
19
19
|
* keepers: {
|
|
20
|
-
*
|
|
20
|
+
* aziId: 1,
|
|
21
21
|
* },
|
|
22
22
|
* byteLength: 8,
|
|
23
23
|
* });
|
package/appservice/slot.d.ts
CHANGED
|
@@ -17,9 +17,9 @@ import * as outputs from "../types/output";
|
|
|
17
17
|
* import * as azure from "@pulumi/azure";
|
|
18
18
|
* import * as random from "@pulumi/random";
|
|
19
19
|
*
|
|
20
|
-
* const server = new random.
|
|
20
|
+
* const server = new random.index.Id("server", {
|
|
21
21
|
* keepers: {
|
|
22
|
-
*
|
|
22
|
+
* aziId: 1,
|
|
23
23
|
* },
|
|
24
24
|
* byteLength: 8,
|
|
25
25
|
* });
|
|
@@ -80,9 +80,9 @@ import * as outputs from "../types/output";
|
|
|
80
80
|
* import * as azure from "@pulumi/azure";
|
|
81
81
|
* import * as random from "@pulumi/random";
|
|
82
82
|
*
|
|
83
|
-
* const server = new random.
|
|
83
|
+
* const server = new random.index.Id("server", {
|
|
84
84
|
* keepers: {
|
|
85
|
-
*
|
|
85
|
+
* aziId: 1,
|
|
86
86
|
* },
|
|
87
87
|
* byteLength: 8,
|
|
88
88
|
* });
|
package/appservice/slot.js
CHANGED
|
@@ -21,9 +21,9 @@ const utilities = require("../utilities");
|
|
|
21
21
|
* import * as azure from "@pulumi/azure";
|
|
22
22
|
* import * as random from "@pulumi/random";
|
|
23
23
|
*
|
|
24
|
-
* const server = new random.
|
|
24
|
+
* const server = new random.index.Id("server", {
|
|
25
25
|
* keepers: {
|
|
26
|
-
*
|
|
26
|
+
* aziId: 1,
|
|
27
27
|
* },
|
|
28
28
|
* byteLength: 8,
|
|
29
29
|
* });
|
|
@@ -84,9 +84,9 @@ const utilities = require("../utilities");
|
|
|
84
84
|
* import * as azure from "@pulumi/azure";
|
|
85
85
|
* import * as random from "@pulumi/random";
|
|
86
86
|
*
|
|
87
|
-
* const server = new random.
|
|
87
|
+
* const server = new random.index.Id("server", {
|
|
88
88
|
* keepers: {
|
|
89
|
-
*
|
|
89
|
+
* aziId: 1,
|
|
90
90
|
* },
|
|
91
91
|
* byteLength: 8,
|
|
92
92
|
* });
|
package/cdn/frontdoorSecret.d.ts
CHANGED
|
@@ -20,78 +20,6 @@ import * as outputs from "../types/output";
|
|
|
20
20
|
*
|
|
21
21
|
* -> **Note:** You only need to add the `Access Policy` for your personal AAD Object ID if you are planning to view the `secrets` via the Azure Portal.
|
|
22
22
|
*
|
|
23
|
-
* ## Example Usage
|
|
24
|
-
*
|
|
25
|
-
* ```typescript
|
|
26
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
27
|
-
* import * as azure from "@pulumi/azure";
|
|
28
|
-
* import * as azuread from "@pulumi/azuread";
|
|
29
|
-
* import * as std from "@pulumi/std";
|
|
30
|
-
*
|
|
31
|
-
* const current = azure.core.getClientConfig({});
|
|
32
|
-
* const frontdoor = azuread.getServicePrincipal({
|
|
33
|
-
* displayName: "Microsoft.AzurefrontDoor-Cdn",
|
|
34
|
-
* });
|
|
35
|
-
* const example = new azure.core.ResourceGroup("example", {
|
|
36
|
-
* name: "example-cdn-frontdoor",
|
|
37
|
-
* location: "West Europe",
|
|
38
|
-
* });
|
|
39
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
40
|
-
* name: "example-keyvault",
|
|
41
|
-
* location: example.location,
|
|
42
|
-
* resourceGroupName: example.name,
|
|
43
|
-
* tenantId: current.then(current => current.tenantId),
|
|
44
|
-
* skuName: "premium",
|
|
45
|
-
* softDeleteRetentionDays: 7,
|
|
46
|
-
* networkAcls: {
|
|
47
|
-
* defaultAction: "Deny",
|
|
48
|
-
* bypass: "AzureServices",
|
|
49
|
-
* ipRules: ["10.0.0.0/24"],
|
|
50
|
-
* },
|
|
51
|
-
* accessPolicies: [
|
|
52
|
-
* {
|
|
53
|
-
* tenantId: current.then(current => current.tenantId),
|
|
54
|
-
* objectId: frontdoor.then(frontdoor => frontdoor.objectId),
|
|
55
|
-
* secretPermissions: ["Get"],
|
|
56
|
-
* },
|
|
57
|
-
* {
|
|
58
|
-
* tenantId: current.then(current => current.tenantId),
|
|
59
|
-
* objectId: current.then(current => current.objectId),
|
|
60
|
-
* certificatePermissions: [
|
|
61
|
-
* "Get",
|
|
62
|
-
* "Import",
|
|
63
|
-
* "Delete",
|
|
64
|
-
* "Purge",
|
|
65
|
-
* ],
|
|
66
|
-
* secretPermissions: ["Get"],
|
|
67
|
-
* },
|
|
68
|
-
* ],
|
|
69
|
-
* });
|
|
70
|
-
* const exampleCertificate = new azure.keyvault.Certificate("example", {
|
|
71
|
-
* name: "example-cert",
|
|
72
|
-
* keyVaultId: exampleKeyVault.id,
|
|
73
|
-
* certificate: {
|
|
74
|
-
* contents: std.filebase64({
|
|
75
|
-
* input: "my-certificate.pfx",
|
|
76
|
-
* }).then(invoke => invoke.result),
|
|
77
|
-
* },
|
|
78
|
-
* });
|
|
79
|
-
* const exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile("example", {
|
|
80
|
-
* name: "example-cdn-profile",
|
|
81
|
-
* resourceGroupName: example.name,
|
|
82
|
-
* skuName: "Standard_AzureFrontDoor",
|
|
83
|
-
* });
|
|
84
|
-
* const exampleFrontdoorSecret = new azure.cdn.FrontdoorSecret("example", {
|
|
85
|
-
* name: "example-customer-managed-secret",
|
|
86
|
-
* cdnFrontdoorProfileId: exampleFrontdoorProfile.id,
|
|
87
|
-
* secret: {
|
|
88
|
-
* customerCertificates: [{
|
|
89
|
-
* keyVaultCertificateId: exampleCertificate.id,
|
|
90
|
-
* }],
|
|
91
|
-
* },
|
|
92
|
-
* });
|
|
93
|
-
* ```
|
|
94
|
-
*
|
|
95
23
|
* ## Import
|
|
96
24
|
*
|
|
97
25
|
* Front Door Secrets can be imported using the `resource id`, e.g.
|
package/cdn/frontdoorSecret.js
CHANGED
|
@@ -24,78 +24,6 @@ const utilities = require("../utilities");
|
|
|
24
24
|
*
|
|
25
25
|
* -> **Note:** You only need to add the `Access Policy` for your personal AAD Object ID if you are planning to view the `secrets` via the Azure Portal.
|
|
26
26
|
*
|
|
27
|
-
* ## Example Usage
|
|
28
|
-
*
|
|
29
|
-
* ```typescript
|
|
30
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
31
|
-
* import * as azure from "@pulumi/azure";
|
|
32
|
-
* import * as azuread from "@pulumi/azuread";
|
|
33
|
-
* import * as std from "@pulumi/std";
|
|
34
|
-
*
|
|
35
|
-
* const current = azure.core.getClientConfig({});
|
|
36
|
-
* const frontdoor = azuread.getServicePrincipal({
|
|
37
|
-
* displayName: "Microsoft.AzurefrontDoor-Cdn",
|
|
38
|
-
* });
|
|
39
|
-
* const example = new azure.core.ResourceGroup("example", {
|
|
40
|
-
* name: "example-cdn-frontdoor",
|
|
41
|
-
* location: "West Europe",
|
|
42
|
-
* });
|
|
43
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
44
|
-
* name: "example-keyvault",
|
|
45
|
-
* location: example.location,
|
|
46
|
-
* resourceGroupName: example.name,
|
|
47
|
-
* tenantId: current.then(current => current.tenantId),
|
|
48
|
-
* skuName: "premium",
|
|
49
|
-
* softDeleteRetentionDays: 7,
|
|
50
|
-
* networkAcls: {
|
|
51
|
-
* defaultAction: "Deny",
|
|
52
|
-
* bypass: "AzureServices",
|
|
53
|
-
* ipRules: ["10.0.0.0/24"],
|
|
54
|
-
* },
|
|
55
|
-
* accessPolicies: [
|
|
56
|
-
* {
|
|
57
|
-
* tenantId: current.then(current => current.tenantId),
|
|
58
|
-
* objectId: frontdoor.then(frontdoor => frontdoor.objectId),
|
|
59
|
-
* secretPermissions: ["Get"],
|
|
60
|
-
* },
|
|
61
|
-
* {
|
|
62
|
-
* tenantId: current.then(current => current.tenantId),
|
|
63
|
-
* objectId: current.then(current => current.objectId),
|
|
64
|
-
* certificatePermissions: [
|
|
65
|
-
* "Get",
|
|
66
|
-
* "Import",
|
|
67
|
-
* "Delete",
|
|
68
|
-
* "Purge",
|
|
69
|
-
* ],
|
|
70
|
-
* secretPermissions: ["Get"],
|
|
71
|
-
* },
|
|
72
|
-
* ],
|
|
73
|
-
* });
|
|
74
|
-
* const exampleCertificate = new azure.keyvault.Certificate("example", {
|
|
75
|
-
* name: "example-cert",
|
|
76
|
-
* keyVaultId: exampleKeyVault.id,
|
|
77
|
-
* certificate: {
|
|
78
|
-
* contents: std.filebase64({
|
|
79
|
-
* input: "my-certificate.pfx",
|
|
80
|
-
* }).then(invoke => invoke.result),
|
|
81
|
-
* },
|
|
82
|
-
* });
|
|
83
|
-
* const exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile("example", {
|
|
84
|
-
* name: "example-cdn-profile",
|
|
85
|
-
* resourceGroupName: example.name,
|
|
86
|
-
* skuName: "Standard_AzureFrontDoor",
|
|
87
|
-
* });
|
|
88
|
-
* const exampleFrontdoorSecret = new azure.cdn.FrontdoorSecret("example", {
|
|
89
|
-
* name: "example-customer-managed-secret",
|
|
90
|
-
* cdnFrontdoorProfileId: exampleFrontdoorProfile.id,
|
|
91
|
-
* secret: {
|
|
92
|
-
* customerCertificates: [{
|
|
93
|
-
* keyVaultCertificateId: exampleCertificate.id,
|
|
94
|
-
* }],
|
|
95
|
-
* },
|
|
96
|
-
* });
|
|
97
|
-
* ```
|
|
98
|
-
*
|
|
99
27
|
* ## Import
|
|
100
28
|
*
|
|
101
29
|
* Front Door Secrets can be imported using the `resource id`, e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"frontdoorSecret.js","sourceRoot":"","sources":["../../cdn/frontdoorSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"frontdoorSecret.js","sourceRoot":"","sources":["../../cdn/frontdoorSecret.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IA2BD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,EAAE,uBAAuB,CAAC;YAC3E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,IAAI,EAAE,qBAAqB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,mDAAmD,CAAC,CAAC;aACxE;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,yBAAyB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AA7EL,0CA8EC;AAhEG,gBAAgB;AACO,4BAAY,GAAG,2CAA2C,CAAC"}
|
package/cosmosdb/account.d.ts
CHANGED
|
@@ -15,12 +15,12 @@ import * as outputs from "../types/output";
|
|
|
15
15
|
* name: "sample-rg",
|
|
16
16
|
* location: "westus",
|
|
17
17
|
* });
|
|
18
|
-
* const ri = new random.
|
|
18
|
+
* const ri = new random.index.Integer("ri", {
|
|
19
19
|
* min: 10000,
|
|
20
20
|
* max: 99999,
|
|
21
21
|
* });
|
|
22
22
|
* const db = new azure.cosmosdb.Account("db", {
|
|
23
|
-
* name:
|
|
23
|
+
* name: `tfex-cosmos-db-${ri.result}`,
|
|
24
24
|
* location: example.location,
|
|
25
25
|
* resourceGroupName: example.name,
|
|
26
26
|
* offerType: "Standard",
|
package/cosmosdb/account.js
CHANGED
|
@@ -19,12 +19,12 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* name: "sample-rg",
|
|
20
20
|
* location: "westus",
|
|
21
21
|
* });
|
|
22
|
-
* const ri = new random.
|
|
22
|
+
* const ri = new random.index.Integer("ri", {
|
|
23
23
|
* min: 10000,
|
|
24
24
|
* max: 99999,
|
|
25
25
|
* });
|
|
26
26
|
* const db = new azure.cosmosdb.Account("db", {
|
|
27
|
-
* name:
|
|
27
|
+
* name: `tfex-cosmos-db-${ri.result}`,
|
|
28
28
|
* location: example.location,
|
|
29
29
|
* resourceGroupName: example.name,
|
|
30
30
|
* offerType: "Standard",
|
|
@@ -6,55 +6,6 @@ import * as outputs from "../types/output";
|
|
|
6
6
|
*
|
|
7
7
|
* > **Note:** In order for the `Azure Managed Instances for Apache Cassandra` to work properly the product requires the `Azure Cosmos DB` Application ID to be present and working in your tenant. If the `Azure Cosmos DB` Application ID is missing in your environment you will need to have an administrator of your tenant run the following command to add the `Azure Cosmos DB` Application ID to your tenant:
|
|
8
8
|
*
|
|
9
|
-
* ## Example Usage
|
|
10
|
-
*
|
|
11
|
-
* ```typescript
|
|
12
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
-
* import * as azure from "@pulumi/azure";
|
|
14
|
-
* import * as azuread from "@pulumi/azuread";
|
|
15
|
-
*
|
|
16
|
-
* const exampleResourceGroup = new azure.core.ResourceGroup("example", {
|
|
17
|
-
* name: "accexample-rg",
|
|
18
|
-
* location: "West Europe",
|
|
19
|
-
* });
|
|
20
|
-
* const exampleVirtualNetwork = new azure.network.VirtualNetwork("example", {
|
|
21
|
-
* name: "example-vnet",
|
|
22
|
-
* location: exampleResourceGroup.location,
|
|
23
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
24
|
-
* addressSpaces: ["10.0.0.0/16"],
|
|
25
|
-
* });
|
|
26
|
-
* const exampleSubnet = new azure.network.Subnet("example", {
|
|
27
|
-
* name: "example-subnet",
|
|
28
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
29
|
-
* virtualNetworkName: exampleVirtualNetwork.name,
|
|
30
|
-
* addressPrefixes: ["10.0.1.0/24"],
|
|
31
|
-
* });
|
|
32
|
-
* const example = azuread.getServicePrincipal({
|
|
33
|
-
* displayName: "Azure Cosmos DB",
|
|
34
|
-
* });
|
|
35
|
-
* const exampleAssignment = new azure.authorization.Assignment("example", {
|
|
36
|
-
* scope: exampleVirtualNetwork.id,
|
|
37
|
-
* roleDefinitionName: "Network Contributor",
|
|
38
|
-
* principalId: example.then(example => example.objectId),
|
|
39
|
-
* });
|
|
40
|
-
* const exampleCassandraCluster = new azure.cosmosdb.CassandraCluster("example", {
|
|
41
|
-
* name: "example-cluster",
|
|
42
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
43
|
-
* location: exampleResourceGroup.location,
|
|
44
|
-
* delegatedManagementSubnetId: exampleSubnet.id,
|
|
45
|
-
* defaultAdminPassword: "Password1234",
|
|
46
|
-
* }, {
|
|
47
|
-
* dependsOn: [exampleAssignment],
|
|
48
|
-
* });
|
|
49
|
-
* ```
|
|
50
|
-
*
|
|
51
|
-
* ## API Providers
|
|
52
|
-
*
|
|
53
|
-
* <!-- This section is generated, changes will be overwritten -->
|
|
54
|
-
* This resource uses the following Azure API Providers:
|
|
55
|
-
*
|
|
56
|
-
* * `Microsoft.DocumentDB` - 2023-04-15
|
|
57
|
-
*
|
|
58
9
|
* ## Import
|
|
59
10
|
*
|
|
60
11
|
* Cassandra Clusters can be imported using the `resource id`, e.g.
|
|
@@ -10,55 +10,6 @@ const utilities = require("../utilities");
|
|
|
10
10
|
*
|
|
11
11
|
* > **Note:** In order for the `Azure Managed Instances for Apache Cassandra` to work properly the product requires the `Azure Cosmos DB` Application ID to be present and working in your tenant. If the `Azure Cosmos DB` Application ID is missing in your environment you will need to have an administrator of your tenant run the following command to add the `Azure Cosmos DB` Application ID to your tenant:
|
|
12
12
|
*
|
|
13
|
-
* ## Example Usage
|
|
14
|
-
*
|
|
15
|
-
* ```typescript
|
|
16
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
-
* import * as azure from "@pulumi/azure";
|
|
18
|
-
* import * as azuread from "@pulumi/azuread";
|
|
19
|
-
*
|
|
20
|
-
* const exampleResourceGroup = new azure.core.ResourceGroup("example", {
|
|
21
|
-
* name: "accexample-rg",
|
|
22
|
-
* location: "West Europe",
|
|
23
|
-
* });
|
|
24
|
-
* const exampleVirtualNetwork = new azure.network.VirtualNetwork("example", {
|
|
25
|
-
* name: "example-vnet",
|
|
26
|
-
* location: exampleResourceGroup.location,
|
|
27
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
28
|
-
* addressSpaces: ["10.0.0.0/16"],
|
|
29
|
-
* });
|
|
30
|
-
* const exampleSubnet = new azure.network.Subnet("example", {
|
|
31
|
-
* name: "example-subnet",
|
|
32
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
33
|
-
* virtualNetworkName: exampleVirtualNetwork.name,
|
|
34
|
-
* addressPrefixes: ["10.0.1.0/24"],
|
|
35
|
-
* });
|
|
36
|
-
* const example = azuread.getServicePrincipal({
|
|
37
|
-
* displayName: "Azure Cosmos DB",
|
|
38
|
-
* });
|
|
39
|
-
* const exampleAssignment = new azure.authorization.Assignment("example", {
|
|
40
|
-
* scope: exampleVirtualNetwork.id,
|
|
41
|
-
* roleDefinitionName: "Network Contributor",
|
|
42
|
-
* principalId: example.then(example => example.objectId),
|
|
43
|
-
* });
|
|
44
|
-
* const exampleCassandraCluster = new azure.cosmosdb.CassandraCluster("example", {
|
|
45
|
-
* name: "example-cluster",
|
|
46
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
47
|
-
* location: exampleResourceGroup.location,
|
|
48
|
-
* delegatedManagementSubnetId: exampleSubnet.id,
|
|
49
|
-
* defaultAdminPassword: "Password1234",
|
|
50
|
-
* }, {
|
|
51
|
-
* dependsOn: [exampleAssignment],
|
|
52
|
-
* });
|
|
53
|
-
* ```
|
|
54
|
-
*
|
|
55
|
-
* ## API Providers
|
|
56
|
-
*
|
|
57
|
-
* <!-- This section is generated, changes will be overwritten -->
|
|
58
|
-
* This resource uses the following Azure API Providers:
|
|
59
|
-
*
|
|
60
|
-
* * `Microsoft.DocumentDB` - 2023-04-15
|
|
61
|
-
*
|
|
62
13
|
* ## Import
|
|
63
14
|
*
|
|
64
15
|
* Cassandra Clusters can be imported using the `resource id`, e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"cassandraCluster.js","sourceRoot":"","sources":["../../cosmosdb/cassandraCluster.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"cassandraCluster.js","sourceRoot":"","sources":["../../cosmosdb/cassandraCluster.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;GAYG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAqED,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,6BAA6B,CAAC,GAAG,KAAK,EAAE,2BAA2B,CAAC;YACnF,cAAc,CAAC,+BAA+B,CAAC,GAAG,KAAK,EAAE,6BAA6B,CAAC;YACvF,cAAc,CAAC,6BAA6B,CAAC,GAAG,KAAK,EAAE,2BAA2B,CAAC;YACnF,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,EAAE,mBAAmB,CAAC;YACnE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,IAAI,EAAE,oBAAoB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;aACvE;YACD,IAAI,IAAI,EAAE,2BAA2B,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9D,MAAM,IAAI,KAAK,CAAC,yDAAyD,CAAC,CAAC;aAC9E;YACD,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC3H,cAAc,CAAC,6BAA6B,CAAC,GAAG,IAAI,EAAE,2BAA2B,CAAC;YAClF,cAAc,CAAC,+BAA+B,CAAC,GAAG,IAAI,EAAE,6BAA6B,CAAC;YACtF,cAAc,CAAC,6BAA6B,CAAC,GAAG,IAAI,EAAE,2BAA2B,CAAC;YAClF,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,EAAE,mBAAmB,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,sBAAsB,CAAC,EAAE,CAAC;QACzE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAhJL,4CAiJC;AAnIG,gBAAgB;AACO,6BAAY,GAAG,kDAAkD,CAAC"}
|