@pulumi/azure 6.31.0-alpha.1765395796 → 6.31.0-alpha.1765925428
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/appplatform/springCloudCertificate.d.ts +0 -99
- package/appplatform/springCloudCertificate.js +0 -99
- package/appplatform/springCloudCertificate.js.map +1 -1
- package/appservice/activeSlot.d.ts +1 -1
- package/appservice/activeSlot.js +1 -1
- package/appservice/customHostnameBinding.d.ts +2 -2
- package/appservice/customHostnameBinding.js +2 -2
- package/appservice/slot.d.ts +4 -4
- package/appservice/slot.js +4 -4
- package/cdn/frontdoorSecret.d.ts +0 -72
- package/cdn/frontdoorSecret.js +0 -72
- package/cdn/frontdoorSecret.js.map +1 -1
- package/cosmosdb/account.d.ts +2 -2
- package/cosmosdb/account.js +2 -2
- package/cosmosdb/cassandraCluster.d.ts +0 -49
- package/cosmosdb/cassandraCluster.js +0 -49
- package/cosmosdb/cassandraCluster.js.map +1 -1
- package/cosmosdb/cassandraDatacenter.d.ts +0 -59
- package/cosmosdb/cassandraDatacenter.js +0 -59
- package/cosmosdb/cassandraDatacenter.js.map +1 -1
- package/datashare/datasetBlobStorage.d.ts +0 -66
- package/datashare/datasetBlobStorage.js +0 -66
- package/datashare/datasetBlobStorage.js.map +1 -1
- package/datashare/datasetDataLakeGen2.d.ts +0 -62
- package/datashare/datasetDataLakeGen2.js +0 -62
- package/datashare/datasetDataLakeGen2.js.map +1 -1
- package/desktopvirtualization/scalingPlan.d.ts +0 -103
- package/desktopvirtualization/scalingPlan.js +0 -103
- package/desktopvirtualization/scalingPlan.js.map +1 -1
- package/desktopvirtualization/scalingPlanHostPoolAssociation.d.ts +0 -79
- package/desktopvirtualization/scalingPlanHostPoolAssociation.js +0 -79
- package/desktopvirtualization/scalingPlanHostPoolAssociation.js.map +1 -1
- package/hpc/cacheBlobNfsTarget.d.ts +0 -149
- package/hpc/cacheBlobNfsTarget.js +0 -149
- package/hpc/cacheBlobNfsTarget.js.map +1 -1
- package/hpc/cacheBlobTarget.d.ts +0 -71
- package/hpc/cacheBlobTarget.js +0 -71
- package/hpc/cacheBlobTarget.js.map +1 -1
- package/keyvault/accessPolicy.d.ts +0 -42
- package/keyvault/accessPolicy.js +0 -42
- package/keyvault/accessPolicy.js.map +1 -1
- package/keyvault/managedStorageAccount.d.ts +0 -2
- package/keyvault/managedStorageAccount.js +0 -2
- package/keyvault/managedStorageAccount.js.map +1 -1
- package/machinelearning/workspace.d.ts +0 -167
- package/machinelearning/workspace.js +0 -167
- package/machinelearning/workspace.js.map +1 -1
- package/management/privateLinkAssociation.d.ts +2 -2
- package/management/privateLinkAssociation.js +2 -2
- package/netapp/volumeGroupSapHana.d.ts +1 -1
- package/netapp/volumeGroupSapHana.js +1 -1
- package/network/trafficManagerProfile.d.ts +2 -2
- package/network/trafficManagerProfile.js +2 -2
- package/operationalinsights/analyticsSolution.d.ts +3 -3
- package/operationalinsights/analyticsSolution.js +3 -3
- package/oracle/getCloudVmCluster.d.ts +1 -1
- package/package.json +2 -2
- package/pim/roleManagementPolicy.d.ts +0 -56
- package/pim/roleManagementPolicy.js +0 -56
- package/pim/roleManagementPolicy.js.map +1 -1
- package/postgresql/flexibleServerActiveDirectoryAdministrator.d.ts +0 -47
- package/postgresql/flexibleServerActiveDirectoryAdministrator.js +0 -47
- package/postgresql/flexibleServerActiveDirectoryAdministrator.js.map +1 -1
- package/redhatopenshift/cluster.d.ts +0 -103
- package/redhatopenshift/cluster.js +0 -103
- package/redhatopenshift/cluster.js.map +1 -1
- package/redis/firewallRule.d.ts +3 -3
- package/redis/firewallRule.js +3 -3
- package/stack/hciCluster.d.ts +0 -36
- package/stack/hciCluster.js +0 -36
- package/stack/hciCluster.js.map +1 -1
- package/stack/hciMarketplaceGalleryImage.d.ts +0 -48
- package/stack/hciMarketplaceGalleryImage.js +0 -48
- package/stack/hciMarketplaceGalleryImage.js.map +1 -1
- package/trafficmanager/profile.d.ts +2 -2
- package/trafficmanager/profile.js +2 -2
- package/types/output.d.ts +3 -3
package/hpc/cacheBlobTarget.d.ts
CHANGED
|
@@ -6,77 +6,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
*
|
|
7
7
|
* > **Note:** By request of the service team the provider no longer automatically registering the `Microsoft.StorageCache` Resource Provider for this resource. To register it you can run `az provider register --namespace 'Microsoft.StorageCache'`.
|
|
8
8
|
*
|
|
9
|
-
* ## Example Usage
|
|
10
|
-
*
|
|
11
|
-
* ```typescript
|
|
12
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
-
* import * as azure from "@pulumi/azure";
|
|
14
|
-
* import * as azuread from "@pulumi/azuread";
|
|
15
|
-
*
|
|
16
|
-
* const exampleResourceGroup = new azure.core.ResourceGroup("example", {
|
|
17
|
-
* name: "example-resources",
|
|
18
|
-
* location: "West Europe",
|
|
19
|
-
* });
|
|
20
|
-
* const exampleVirtualNetwork = new azure.network.VirtualNetwork("example", {
|
|
21
|
-
* name: "examplevn",
|
|
22
|
-
* addressSpaces: ["10.0.0.0/16"],
|
|
23
|
-
* location: exampleResourceGroup.location,
|
|
24
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
25
|
-
* });
|
|
26
|
-
* const exampleSubnet = new azure.network.Subnet("example", {
|
|
27
|
-
* name: "examplesubnet",
|
|
28
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
29
|
-
* virtualNetworkName: exampleVirtualNetwork.name,
|
|
30
|
-
* addressPrefixes: ["10.0.1.0/24"],
|
|
31
|
-
* });
|
|
32
|
-
* const exampleCache = new azure.hpc.Cache("example", {
|
|
33
|
-
* name: "examplehpccache",
|
|
34
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
35
|
-
* location: exampleResourceGroup.location,
|
|
36
|
-
* cacheSizeInGb: 3072,
|
|
37
|
-
* subnetId: exampleSubnet.id,
|
|
38
|
-
* skuName: "Standard_2G",
|
|
39
|
-
* });
|
|
40
|
-
* const exampleAccount = new azure.storage.Account("example", {
|
|
41
|
-
* name: "examplestorgaccount",
|
|
42
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
43
|
-
* location: exampleResourceGroup.location,
|
|
44
|
-
* accountTier: "Standard",
|
|
45
|
-
* accountReplicationType: "LRS",
|
|
46
|
-
* });
|
|
47
|
-
* const exampleContainer = new azure.storage.Container("example", {
|
|
48
|
-
* name: "examplestoragecontainer",
|
|
49
|
-
* storageAccountName: exampleAccount.name,
|
|
50
|
-
* });
|
|
51
|
-
* const example = azuread.getServicePrincipal({
|
|
52
|
-
* displayName: "HPC Cache Resource Provider",
|
|
53
|
-
* });
|
|
54
|
-
* const exampleStorageAccountContrib = new azure.authorization.Assignment("example_storage_account_contrib", {
|
|
55
|
-
* scope: exampleAccount.id,
|
|
56
|
-
* roleDefinitionName: "Storage Account Contributor",
|
|
57
|
-
* principalId: example.then(example => example.objectId),
|
|
58
|
-
* });
|
|
59
|
-
* const exampleStorageBlobDataContrib = new azure.authorization.Assignment("example_storage_blob_data_contrib", {
|
|
60
|
-
* scope: exampleAccount.id,
|
|
61
|
-
* roleDefinitionName: "Storage Blob Data Contributor",
|
|
62
|
-
* principalId: example.then(example => example.objectId),
|
|
63
|
-
* });
|
|
64
|
-
* const exampleCacheBlobTarget = new azure.hpc.CacheBlobTarget("example", {
|
|
65
|
-
* name: "examplehpccblobtarget",
|
|
66
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
67
|
-
* cacheName: exampleCache.name,
|
|
68
|
-
* storageContainerId: exampleContainer.id,
|
|
69
|
-
* namespacePath: "/blob_storage",
|
|
70
|
-
* });
|
|
71
|
-
* ```
|
|
72
|
-
*
|
|
73
|
-
* ## API Providers
|
|
74
|
-
*
|
|
75
|
-
* <!-- This section is generated, changes will be overwritten -->
|
|
76
|
-
* This resource uses the following Azure API Providers:
|
|
77
|
-
*
|
|
78
|
-
* * `Microsoft.StorageCache` - 2023-05-01
|
|
79
|
-
*
|
|
80
9
|
* ## Import
|
|
81
10
|
*
|
|
82
11
|
* Blob Targets within an HPC Cache can be imported using the `resource id`, e.g.
|
package/hpc/cacheBlobTarget.js
CHANGED
|
@@ -12,77 +12,6 @@ const utilities = require("../utilities");
|
|
|
12
12
|
*
|
|
13
13
|
* > **Note:** By request of the service team the provider no longer automatically registering the `Microsoft.StorageCache` Resource Provider for this resource. To register it you can run `az provider register --namespace 'Microsoft.StorageCache'`.
|
|
14
14
|
*
|
|
15
|
-
* ## Example Usage
|
|
16
|
-
*
|
|
17
|
-
* ```typescript
|
|
18
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
-
* import * as azure from "@pulumi/azure";
|
|
20
|
-
* import * as azuread from "@pulumi/azuread";
|
|
21
|
-
*
|
|
22
|
-
* const exampleResourceGroup = new azure.core.ResourceGroup("example", {
|
|
23
|
-
* name: "example-resources",
|
|
24
|
-
* location: "West Europe",
|
|
25
|
-
* });
|
|
26
|
-
* const exampleVirtualNetwork = new azure.network.VirtualNetwork("example", {
|
|
27
|
-
* name: "examplevn",
|
|
28
|
-
* addressSpaces: ["10.0.0.0/16"],
|
|
29
|
-
* location: exampleResourceGroup.location,
|
|
30
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
31
|
-
* });
|
|
32
|
-
* const exampleSubnet = new azure.network.Subnet("example", {
|
|
33
|
-
* name: "examplesubnet",
|
|
34
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
35
|
-
* virtualNetworkName: exampleVirtualNetwork.name,
|
|
36
|
-
* addressPrefixes: ["10.0.1.0/24"],
|
|
37
|
-
* });
|
|
38
|
-
* const exampleCache = new azure.hpc.Cache("example", {
|
|
39
|
-
* name: "examplehpccache",
|
|
40
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
41
|
-
* location: exampleResourceGroup.location,
|
|
42
|
-
* cacheSizeInGb: 3072,
|
|
43
|
-
* subnetId: exampleSubnet.id,
|
|
44
|
-
* skuName: "Standard_2G",
|
|
45
|
-
* });
|
|
46
|
-
* const exampleAccount = new azure.storage.Account("example", {
|
|
47
|
-
* name: "examplestorgaccount",
|
|
48
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
49
|
-
* location: exampleResourceGroup.location,
|
|
50
|
-
* accountTier: "Standard",
|
|
51
|
-
* accountReplicationType: "LRS",
|
|
52
|
-
* });
|
|
53
|
-
* const exampleContainer = new azure.storage.Container("example", {
|
|
54
|
-
* name: "examplestoragecontainer",
|
|
55
|
-
* storageAccountName: exampleAccount.name,
|
|
56
|
-
* });
|
|
57
|
-
* const example = azuread.getServicePrincipal({
|
|
58
|
-
* displayName: "HPC Cache Resource Provider",
|
|
59
|
-
* });
|
|
60
|
-
* const exampleStorageAccountContrib = new azure.authorization.Assignment("example_storage_account_contrib", {
|
|
61
|
-
* scope: exampleAccount.id,
|
|
62
|
-
* roleDefinitionName: "Storage Account Contributor",
|
|
63
|
-
* principalId: example.then(example => example.objectId),
|
|
64
|
-
* });
|
|
65
|
-
* const exampleStorageBlobDataContrib = new azure.authorization.Assignment("example_storage_blob_data_contrib", {
|
|
66
|
-
* scope: exampleAccount.id,
|
|
67
|
-
* roleDefinitionName: "Storage Blob Data Contributor",
|
|
68
|
-
* principalId: example.then(example => example.objectId),
|
|
69
|
-
* });
|
|
70
|
-
* const exampleCacheBlobTarget = new azure.hpc.CacheBlobTarget("example", {
|
|
71
|
-
* name: "examplehpccblobtarget",
|
|
72
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
73
|
-
* cacheName: exampleCache.name,
|
|
74
|
-
* storageContainerId: exampleContainer.id,
|
|
75
|
-
* namespacePath: "/blob_storage",
|
|
76
|
-
* });
|
|
77
|
-
* ```
|
|
78
|
-
*
|
|
79
|
-
* ## API Providers
|
|
80
|
-
*
|
|
81
|
-
* <!-- This section is generated, changes will be overwritten -->
|
|
82
|
-
* This resource uses the following Azure API Providers:
|
|
83
|
-
*
|
|
84
|
-
* * `Microsoft.StorageCache` - 2023-05-01
|
|
85
|
-
*
|
|
86
15
|
* ## Import
|
|
87
16
|
*
|
|
88
17
|
* Blob Targets within an HPC Cache can be imported using the `resource id`, e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"cacheBlobTarget.js","sourceRoot":"","sources":["../../hpc/cacheBlobTarget.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"cacheBlobTarget.js","sourceRoot":"","sources":["../../hpc/cacheBlobTarget.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;GAcG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAqCD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;SACpE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,IAAI,EAAE,SAAS,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5C,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,IAAI,EAAE,aAAa,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,IAAI,IAAI,EAAE,kBAAkB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAjGL,0CAkGC;AApFG,gBAAgB;AACO,4BAAY,GAAG,2CAA2C,CAAC"}
|
|
@@ -6,48 +6,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
*
|
|
7
7
|
* > **NOTE:** Azure permits a maximum of 1024 Access Policies per Key Vault - [more information can be found in this document](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault#data-plane-access-control).
|
|
8
8
|
*
|
|
9
|
-
* ## Example Usage
|
|
10
|
-
*
|
|
11
|
-
* ```typescript
|
|
12
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
-
* import * as azure from "@pulumi/azure";
|
|
14
|
-
* import * as azuread from "@pulumi/azuread";
|
|
15
|
-
*
|
|
16
|
-
* const current = azure.core.getClientConfig({});
|
|
17
|
-
* const exampleResourceGroup = new azure.core.ResourceGroup("example", {
|
|
18
|
-
* name: "example-resources",
|
|
19
|
-
* location: "West Europe",
|
|
20
|
-
* });
|
|
21
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
22
|
-
* name: "examplekeyvault",
|
|
23
|
-
* location: exampleResourceGroup.location,
|
|
24
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
25
|
-
* tenantId: current.then(current => current.tenantId),
|
|
26
|
-
* skuName: "premium",
|
|
27
|
-
* });
|
|
28
|
-
* const exampleAccessPolicy = new azure.keyvault.AccessPolicy("example", {
|
|
29
|
-
* keyVaultId: exampleKeyVault.id,
|
|
30
|
-
* tenantId: current.then(current => current.tenantId),
|
|
31
|
-
* objectId: current.then(current => current.objectId),
|
|
32
|
-
* keyPermissions: ["Get"],
|
|
33
|
-
* secretPermissions: ["Get"],
|
|
34
|
-
* });
|
|
35
|
-
* const example = azuread.getServicePrincipal({
|
|
36
|
-
* displayName: "example-app",
|
|
37
|
-
* });
|
|
38
|
-
* const example_principal = new azure.keyvault.AccessPolicy("example-principal", {
|
|
39
|
-
* keyVaultId: exampleKeyVault.id,
|
|
40
|
-
* tenantId: current.then(current => current.tenantId),
|
|
41
|
-
* objectId: example.then(example => example.objectId),
|
|
42
|
-
* keyPermissions: [
|
|
43
|
-
* "Get",
|
|
44
|
-
* "List",
|
|
45
|
-
* "Encrypt",
|
|
46
|
-
* "Decrypt",
|
|
47
|
-
* ],
|
|
48
|
-
* });
|
|
49
|
-
* ```
|
|
50
|
-
*
|
|
51
9
|
* ## Import
|
|
52
10
|
*
|
|
53
11
|
* Key Vault Access Policies can be imported using the Resource ID of the Key Vault, plus some additional metadata.
|
package/keyvault/accessPolicy.js
CHANGED
|
@@ -12,48 +12,6 @@ const utilities = require("../utilities");
|
|
|
12
12
|
*
|
|
13
13
|
* > **NOTE:** Azure permits a maximum of 1024 Access Policies per Key Vault - [more information can be found in this document](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault#data-plane-access-control).
|
|
14
14
|
*
|
|
15
|
-
* ## Example Usage
|
|
16
|
-
*
|
|
17
|
-
* ```typescript
|
|
18
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
-
* import * as azure from "@pulumi/azure";
|
|
20
|
-
* import * as azuread from "@pulumi/azuread";
|
|
21
|
-
*
|
|
22
|
-
* const current = azure.core.getClientConfig({});
|
|
23
|
-
* const exampleResourceGroup = new azure.core.ResourceGroup("example", {
|
|
24
|
-
* name: "example-resources",
|
|
25
|
-
* location: "West Europe",
|
|
26
|
-
* });
|
|
27
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
28
|
-
* name: "examplekeyvault",
|
|
29
|
-
* location: exampleResourceGroup.location,
|
|
30
|
-
* resourceGroupName: exampleResourceGroup.name,
|
|
31
|
-
* tenantId: current.then(current => current.tenantId),
|
|
32
|
-
* skuName: "premium",
|
|
33
|
-
* });
|
|
34
|
-
* const exampleAccessPolicy = new azure.keyvault.AccessPolicy("example", {
|
|
35
|
-
* keyVaultId: exampleKeyVault.id,
|
|
36
|
-
* tenantId: current.then(current => current.tenantId),
|
|
37
|
-
* objectId: current.then(current => current.objectId),
|
|
38
|
-
* keyPermissions: ["Get"],
|
|
39
|
-
* secretPermissions: ["Get"],
|
|
40
|
-
* });
|
|
41
|
-
* const example = azuread.getServicePrincipal({
|
|
42
|
-
* displayName: "example-app",
|
|
43
|
-
* });
|
|
44
|
-
* const example_principal = new azure.keyvault.AccessPolicy("example-principal", {
|
|
45
|
-
* keyVaultId: exampleKeyVault.id,
|
|
46
|
-
* tenantId: current.then(current => current.tenantId),
|
|
47
|
-
* objectId: example.then(example => example.objectId),
|
|
48
|
-
* keyPermissions: [
|
|
49
|
-
* "Get",
|
|
50
|
-
* "List",
|
|
51
|
-
* "Encrypt",
|
|
52
|
-
* "Decrypt",
|
|
53
|
-
* ],
|
|
54
|
-
* });
|
|
55
|
-
* ```
|
|
56
|
-
*
|
|
57
15
|
* ## Import
|
|
58
16
|
*
|
|
59
17
|
* Key Vault Access Policies can be imported using the Resource ID of the Key Vault, plus some additional metadata.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessPolicy.js","sourceRoot":"","sources":["../../keyvault/accessPolicy.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"accessPolicy.js","sourceRoot":"","sources":["../../keyvault/accessPolicy.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IA2CD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;SAChD;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,QAAQ,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3C,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,IAAI,EAAE,QAAQ,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3C,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAxGL,oCAyGC;AA3FG,gBAAgB;AACO,yBAAY,GAAG,0CAA0C,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"managedStorageAccount.js","sourceRoot":"","sources":["../../keyvault/managedStorageAccount.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"managedStorageAccount.js","sourceRoot":"","sources":["../../keyvault/managedStorageAccount.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+DG;AACH,MAAa,qBAAsB,SAAQ,MAAM,CAAC,cAAc;IAC5D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkC,EAAE,IAAmC;QAChI,OAAO,IAAI,qBAAqB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC5E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,qBAAqB,CAAC,YAAY,CAAC;IACtE,CAAC;IAyCD,YAAY,IAAY,EAAE,WAAoE,EAAE,IAAmC;QAC/H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqD,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,4BAA4B,CAAC,GAAG,KAAK,EAAE,0BAA0B,CAAC;YACjF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAAoD,CAAC;YAClE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,gBAAgB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;aACnE;YACD,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,4BAA4B,CAAC,GAAG,IAAI,EAAE,0BAA0B,CAAC;YAChF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;SACvC;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,qBAAqB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1E,CAAC;;AApGL,sDAqGC;AAvFG,gBAAgB;AACO,kCAAY,GAAG,4DAA4D,CAAC"}
|
|
@@ -128,173 +128,6 @@ import * as outputs from "../types/output";
|
|
|
128
128
|
* });
|
|
129
129
|
* ```
|
|
130
130
|
*
|
|
131
|
-
* ### With User Assigned Identity And Data Encryption
|
|
132
|
-
*
|
|
133
|
-
* > **Note:** The Key Vault must enable purge protection.
|
|
134
|
-
*
|
|
135
|
-
* ```typescript
|
|
136
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
137
|
-
* import * as azure from "@pulumi/azure";
|
|
138
|
-
* import * as azuread from "@pulumi/azuread";
|
|
139
|
-
*
|
|
140
|
-
* const current = azure.core.getClientConfig({});
|
|
141
|
-
* const example = new azure.core.ResourceGroup("example", {
|
|
142
|
-
* name: "example-resources",
|
|
143
|
-
* location: "West Europe",
|
|
144
|
-
* });
|
|
145
|
-
* const exampleInsights = new azure.appinsights.Insights("example", {
|
|
146
|
-
* name: "example-ai",
|
|
147
|
-
* location: example.location,
|
|
148
|
-
* resourceGroupName: example.name,
|
|
149
|
-
* applicationType: "web",
|
|
150
|
-
* });
|
|
151
|
-
* const exampleAccount = new azure.storage.Account("example", {
|
|
152
|
-
* name: "examplestorageaccount",
|
|
153
|
-
* location: example.location,
|
|
154
|
-
* resourceGroupName: example.name,
|
|
155
|
-
* accountTier: "Standard",
|
|
156
|
-
* accountReplicationType: "GRS",
|
|
157
|
-
* });
|
|
158
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
159
|
-
* name: "example-keyvalut",
|
|
160
|
-
* location: example.location,
|
|
161
|
-
* resourceGroupName: example.name,
|
|
162
|
-
* tenantId: current.then(current => current.tenantId),
|
|
163
|
-
* skuName: "premium",
|
|
164
|
-
* purgeProtectionEnabled: true,
|
|
165
|
-
* });
|
|
166
|
-
* const exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity("example", {
|
|
167
|
-
* name: "example-identity",
|
|
168
|
-
* location: example.location,
|
|
169
|
-
* resourceGroupName: example.name,
|
|
170
|
-
* });
|
|
171
|
-
* const example_identity = new azure.keyvault.AccessPolicy("example-identity", {
|
|
172
|
-
* keyVaultId: exampleKeyVault.id,
|
|
173
|
-
* tenantId: current.then(current => current.tenantId),
|
|
174
|
-
* objectId: exampleUserAssignedIdentity.principalId,
|
|
175
|
-
* keyPermissions: [
|
|
176
|
-
* "WrapKey",
|
|
177
|
-
* "UnwrapKey",
|
|
178
|
-
* "Get",
|
|
179
|
-
* "Recover",
|
|
180
|
-
* ],
|
|
181
|
-
* secretPermissions: [
|
|
182
|
-
* "Get",
|
|
183
|
-
* "List",
|
|
184
|
-
* "Set",
|
|
185
|
-
* "Delete",
|
|
186
|
-
* "Recover",
|
|
187
|
-
* "Backup",
|
|
188
|
-
* "Restore",
|
|
189
|
-
* ],
|
|
190
|
-
* });
|
|
191
|
-
* const example_sp = new azure.keyvault.AccessPolicy("example-sp", {
|
|
192
|
-
* keyVaultId: exampleKeyVault.id,
|
|
193
|
-
* tenantId: current.then(current => current.tenantId),
|
|
194
|
-
* objectId: current.then(current => current.objectId),
|
|
195
|
-
* keyPermissions: [
|
|
196
|
-
* "Get",
|
|
197
|
-
* "Create",
|
|
198
|
-
* "Recover",
|
|
199
|
-
* "Delete",
|
|
200
|
-
* "Purge",
|
|
201
|
-
* "GetRotationPolicy",
|
|
202
|
-
* ],
|
|
203
|
-
* });
|
|
204
|
-
* const test = azuread.getServicePrincipal({
|
|
205
|
-
* displayName: "Azure Cosmos DB",
|
|
206
|
-
* });
|
|
207
|
-
* const example_cosmosdb = new azure.keyvault.AccessPolicy("example-cosmosdb", {
|
|
208
|
-
* keyVaultId: exampleKeyVault.id,
|
|
209
|
-
* tenantId: current.then(current => current.tenantId),
|
|
210
|
-
* objectId: test.then(test => test.objectId),
|
|
211
|
-
* keyPermissions: [
|
|
212
|
-
* "Get",
|
|
213
|
-
* "Recover",
|
|
214
|
-
* "UnwrapKey",
|
|
215
|
-
* "WrapKey",
|
|
216
|
-
* ],
|
|
217
|
-
* }, {
|
|
218
|
-
* dependsOn: [
|
|
219
|
-
* test,
|
|
220
|
-
* current,
|
|
221
|
-
* ],
|
|
222
|
-
* });
|
|
223
|
-
* const exampleKey = new azure.keyvault.Key("example", {
|
|
224
|
-
* name: "example-keyvaultkey",
|
|
225
|
-
* keyVaultId: exampleKeyVault.id,
|
|
226
|
-
* keyType: "RSA",
|
|
227
|
-
* keySize: 2048,
|
|
228
|
-
* keyOpts: [
|
|
229
|
-
* "decrypt",
|
|
230
|
-
* "encrypt",
|
|
231
|
-
* "sign",
|
|
232
|
-
* "unwrapKey",
|
|
233
|
-
* "verify",
|
|
234
|
-
* "wrapKey",
|
|
235
|
-
* ],
|
|
236
|
-
* }, {
|
|
237
|
-
* dependsOn: [
|
|
238
|
-
* exampleKeyVault,
|
|
239
|
-
* example_sp,
|
|
240
|
-
* ],
|
|
241
|
-
* });
|
|
242
|
-
* const example_role1 = new azure.authorization.Assignment("example-role1", {
|
|
243
|
-
* scope: exampleKeyVault.id,
|
|
244
|
-
* roleDefinitionName: "Contributor",
|
|
245
|
-
* principalId: exampleUserAssignedIdentity.principalId,
|
|
246
|
-
* });
|
|
247
|
-
* const example_role2 = new azure.authorization.Assignment("example-role2", {
|
|
248
|
-
* scope: exampleAccount.id,
|
|
249
|
-
* roleDefinitionName: "Storage Blob Data Contributor",
|
|
250
|
-
* principalId: exampleUserAssignedIdentity.principalId,
|
|
251
|
-
* });
|
|
252
|
-
* const example_role3 = new azure.authorization.Assignment("example-role3", {
|
|
253
|
-
* scope: exampleAccount.id,
|
|
254
|
-
* roleDefinitionName: "Contributor",
|
|
255
|
-
* principalId: exampleUserAssignedIdentity.principalId,
|
|
256
|
-
* });
|
|
257
|
-
* const example_role4 = new azure.authorization.Assignment("example-role4", {
|
|
258
|
-
* scope: exampleInsights.id,
|
|
259
|
-
* roleDefinitionName: "Contributor",
|
|
260
|
-
* principalId: exampleUserAssignedIdentity.principalId,
|
|
261
|
-
* });
|
|
262
|
-
* const exampleWorkspace = new azure.machinelearning.Workspace("example", {
|
|
263
|
-
* name: "example-workspace",
|
|
264
|
-
* location: example.location,
|
|
265
|
-
* resourceGroupName: example.name,
|
|
266
|
-
* applicationInsightsId: exampleInsights.id,
|
|
267
|
-
* keyVaultId: exampleKeyVault.id,
|
|
268
|
-
* storageAccountId: exampleAccount.id,
|
|
269
|
-
* highBusinessImpact: true,
|
|
270
|
-
* primaryUserAssignedIdentity: exampleUserAssignedIdentity.id,
|
|
271
|
-
* identity: {
|
|
272
|
-
* type: "UserAssigned",
|
|
273
|
-
* identityIds: [exampleUserAssignedIdentity.id],
|
|
274
|
-
* },
|
|
275
|
-
* encryption: {
|
|
276
|
-
* userAssignedIdentityId: exampleUserAssignedIdentity.id,
|
|
277
|
-
* keyVaultId: exampleKeyVault.id,
|
|
278
|
-
* keyId: exampleKey.id,
|
|
279
|
-
* },
|
|
280
|
-
* }, {
|
|
281
|
-
* dependsOn: [
|
|
282
|
-
* example_role1,
|
|
283
|
-
* example_role2,
|
|
284
|
-
* example_role3,
|
|
285
|
-
* example_role4,
|
|
286
|
-
* example_cosmosdb,
|
|
287
|
-
* ],
|
|
288
|
-
* });
|
|
289
|
-
* ```
|
|
290
|
-
*
|
|
291
|
-
* ## API Providers
|
|
292
|
-
*
|
|
293
|
-
* <!-- This section is generated, changes will be overwritten -->
|
|
294
|
-
* This resource uses the following Azure API Providers:
|
|
295
|
-
*
|
|
296
|
-
* * `Microsoft.MachineLearningServices` - 2025-06-01
|
|
297
|
-
*
|
|
298
131
|
* ## Import
|
|
299
132
|
*
|
|
300
133
|
* Machine Learning Workspace can be imported using the `resource id`, e.g.
|
|
@@ -132,173 +132,6 @@ const utilities = require("../utilities");
|
|
|
132
132
|
* });
|
|
133
133
|
* ```
|
|
134
134
|
*
|
|
135
|
-
* ### With User Assigned Identity And Data Encryption
|
|
136
|
-
*
|
|
137
|
-
* > **Note:** The Key Vault must enable purge protection.
|
|
138
|
-
*
|
|
139
|
-
* ```typescript
|
|
140
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
141
|
-
* import * as azure from "@pulumi/azure";
|
|
142
|
-
* import * as azuread from "@pulumi/azuread";
|
|
143
|
-
*
|
|
144
|
-
* const current = azure.core.getClientConfig({});
|
|
145
|
-
* const example = new azure.core.ResourceGroup("example", {
|
|
146
|
-
* name: "example-resources",
|
|
147
|
-
* location: "West Europe",
|
|
148
|
-
* });
|
|
149
|
-
* const exampleInsights = new azure.appinsights.Insights("example", {
|
|
150
|
-
* name: "example-ai",
|
|
151
|
-
* location: example.location,
|
|
152
|
-
* resourceGroupName: example.name,
|
|
153
|
-
* applicationType: "web",
|
|
154
|
-
* });
|
|
155
|
-
* const exampleAccount = new azure.storage.Account("example", {
|
|
156
|
-
* name: "examplestorageaccount",
|
|
157
|
-
* location: example.location,
|
|
158
|
-
* resourceGroupName: example.name,
|
|
159
|
-
* accountTier: "Standard",
|
|
160
|
-
* accountReplicationType: "GRS",
|
|
161
|
-
* });
|
|
162
|
-
* const exampleKeyVault = new azure.keyvault.KeyVault("example", {
|
|
163
|
-
* name: "example-keyvalut",
|
|
164
|
-
* location: example.location,
|
|
165
|
-
* resourceGroupName: example.name,
|
|
166
|
-
* tenantId: current.then(current => current.tenantId),
|
|
167
|
-
* skuName: "premium",
|
|
168
|
-
* purgeProtectionEnabled: true,
|
|
169
|
-
* });
|
|
170
|
-
* const exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity("example", {
|
|
171
|
-
* name: "example-identity",
|
|
172
|
-
* location: example.location,
|
|
173
|
-
* resourceGroupName: example.name,
|
|
174
|
-
* });
|
|
175
|
-
* const example_identity = new azure.keyvault.AccessPolicy("example-identity", {
|
|
176
|
-
* keyVaultId: exampleKeyVault.id,
|
|
177
|
-
* tenantId: current.then(current => current.tenantId),
|
|
178
|
-
* objectId: exampleUserAssignedIdentity.principalId,
|
|
179
|
-
* keyPermissions: [
|
|
180
|
-
* "WrapKey",
|
|
181
|
-
* "UnwrapKey",
|
|
182
|
-
* "Get",
|
|
183
|
-
* "Recover",
|
|
184
|
-
* ],
|
|
185
|
-
* secretPermissions: [
|
|
186
|
-
* "Get",
|
|
187
|
-
* "List",
|
|
188
|
-
* "Set",
|
|
189
|
-
* "Delete",
|
|
190
|
-
* "Recover",
|
|
191
|
-
* "Backup",
|
|
192
|
-
* "Restore",
|
|
193
|
-
* ],
|
|
194
|
-
* });
|
|
195
|
-
* const example_sp = new azure.keyvault.AccessPolicy("example-sp", {
|
|
196
|
-
* keyVaultId: exampleKeyVault.id,
|
|
197
|
-
* tenantId: current.then(current => current.tenantId),
|
|
198
|
-
* objectId: current.then(current => current.objectId),
|
|
199
|
-
* keyPermissions: [
|
|
200
|
-
* "Get",
|
|
201
|
-
* "Create",
|
|
202
|
-
* "Recover",
|
|
203
|
-
* "Delete",
|
|
204
|
-
* "Purge",
|
|
205
|
-
* "GetRotationPolicy",
|
|
206
|
-
* ],
|
|
207
|
-
* });
|
|
208
|
-
* const test = azuread.getServicePrincipal({
|
|
209
|
-
* displayName: "Azure Cosmos DB",
|
|
210
|
-
* });
|
|
211
|
-
* const example_cosmosdb = new azure.keyvault.AccessPolicy("example-cosmosdb", {
|
|
212
|
-
* keyVaultId: exampleKeyVault.id,
|
|
213
|
-
* tenantId: current.then(current => current.tenantId),
|
|
214
|
-
* objectId: test.then(test => test.objectId),
|
|
215
|
-
* keyPermissions: [
|
|
216
|
-
* "Get",
|
|
217
|
-
* "Recover",
|
|
218
|
-
* "UnwrapKey",
|
|
219
|
-
* "WrapKey",
|
|
220
|
-
* ],
|
|
221
|
-
* }, {
|
|
222
|
-
* dependsOn: [
|
|
223
|
-
* test,
|
|
224
|
-
* current,
|
|
225
|
-
* ],
|
|
226
|
-
* });
|
|
227
|
-
* const exampleKey = new azure.keyvault.Key("example", {
|
|
228
|
-
* name: "example-keyvaultkey",
|
|
229
|
-
* keyVaultId: exampleKeyVault.id,
|
|
230
|
-
* keyType: "RSA",
|
|
231
|
-
* keySize: 2048,
|
|
232
|
-
* keyOpts: [
|
|
233
|
-
* "decrypt",
|
|
234
|
-
* "encrypt",
|
|
235
|
-
* "sign",
|
|
236
|
-
* "unwrapKey",
|
|
237
|
-
* "verify",
|
|
238
|
-
* "wrapKey",
|
|
239
|
-
* ],
|
|
240
|
-
* }, {
|
|
241
|
-
* dependsOn: [
|
|
242
|
-
* exampleKeyVault,
|
|
243
|
-
* example_sp,
|
|
244
|
-
* ],
|
|
245
|
-
* });
|
|
246
|
-
* const example_role1 = new azure.authorization.Assignment("example-role1", {
|
|
247
|
-
* scope: exampleKeyVault.id,
|
|
248
|
-
* roleDefinitionName: "Contributor",
|
|
249
|
-
* principalId: exampleUserAssignedIdentity.principalId,
|
|
250
|
-
* });
|
|
251
|
-
* const example_role2 = new azure.authorization.Assignment("example-role2", {
|
|
252
|
-
* scope: exampleAccount.id,
|
|
253
|
-
* roleDefinitionName: "Storage Blob Data Contributor",
|
|
254
|
-
* principalId: exampleUserAssignedIdentity.principalId,
|
|
255
|
-
* });
|
|
256
|
-
* const example_role3 = new azure.authorization.Assignment("example-role3", {
|
|
257
|
-
* scope: exampleAccount.id,
|
|
258
|
-
* roleDefinitionName: "Contributor",
|
|
259
|
-
* principalId: exampleUserAssignedIdentity.principalId,
|
|
260
|
-
* });
|
|
261
|
-
* const example_role4 = new azure.authorization.Assignment("example-role4", {
|
|
262
|
-
* scope: exampleInsights.id,
|
|
263
|
-
* roleDefinitionName: "Contributor",
|
|
264
|
-
* principalId: exampleUserAssignedIdentity.principalId,
|
|
265
|
-
* });
|
|
266
|
-
* const exampleWorkspace = new azure.machinelearning.Workspace("example", {
|
|
267
|
-
* name: "example-workspace",
|
|
268
|
-
* location: example.location,
|
|
269
|
-
* resourceGroupName: example.name,
|
|
270
|
-
* applicationInsightsId: exampleInsights.id,
|
|
271
|
-
* keyVaultId: exampleKeyVault.id,
|
|
272
|
-
* storageAccountId: exampleAccount.id,
|
|
273
|
-
* highBusinessImpact: true,
|
|
274
|
-
* primaryUserAssignedIdentity: exampleUserAssignedIdentity.id,
|
|
275
|
-
* identity: {
|
|
276
|
-
* type: "UserAssigned",
|
|
277
|
-
* identityIds: [exampleUserAssignedIdentity.id],
|
|
278
|
-
* },
|
|
279
|
-
* encryption: {
|
|
280
|
-
* userAssignedIdentityId: exampleUserAssignedIdentity.id,
|
|
281
|
-
* keyVaultId: exampleKeyVault.id,
|
|
282
|
-
* keyId: exampleKey.id,
|
|
283
|
-
* },
|
|
284
|
-
* }, {
|
|
285
|
-
* dependsOn: [
|
|
286
|
-
* example_role1,
|
|
287
|
-
* example_role2,
|
|
288
|
-
* example_role3,
|
|
289
|
-
* example_role4,
|
|
290
|
-
* example_cosmosdb,
|
|
291
|
-
* ],
|
|
292
|
-
* });
|
|
293
|
-
* ```
|
|
294
|
-
*
|
|
295
|
-
* ## API Providers
|
|
296
|
-
*
|
|
297
|
-
* <!-- This section is generated, changes will be overwritten -->
|
|
298
|
-
* This resource uses the following Azure API Providers:
|
|
299
|
-
*
|
|
300
|
-
* * `Microsoft.MachineLearningServices` - 2025-06-01
|
|
301
|
-
*
|
|
302
135
|
* ## Import
|
|
303
136
|
*
|
|
304
137
|
* Machine Learning Workspace can be imported using the `resource id`, e.g.
|