@pulumi/azure 6.31.0-alpha.1765395796 → 6.31.0-alpha.1765925428

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (77) hide show
  1. package/appplatform/springCloudCertificate.d.ts +0 -99
  2. package/appplatform/springCloudCertificate.js +0 -99
  3. package/appplatform/springCloudCertificate.js.map +1 -1
  4. package/appservice/activeSlot.d.ts +1 -1
  5. package/appservice/activeSlot.js +1 -1
  6. package/appservice/customHostnameBinding.d.ts +2 -2
  7. package/appservice/customHostnameBinding.js +2 -2
  8. package/appservice/slot.d.ts +4 -4
  9. package/appservice/slot.js +4 -4
  10. package/cdn/frontdoorSecret.d.ts +0 -72
  11. package/cdn/frontdoorSecret.js +0 -72
  12. package/cdn/frontdoorSecret.js.map +1 -1
  13. package/cosmosdb/account.d.ts +2 -2
  14. package/cosmosdb/account.js +2 -2
  15. package/cosmosdb/cassandraCluster.d.ts +0 -49
  16. package/cosmosdb/cassandraCluster.js +0 -49
  17. package/cosmosdb/cassandraCluster.js.map +1 -1
  18. package/cosmosdb/cassandraDatacenter.d.ts +0 -59
  19. package/cosmosdb/cassandraDatacenter.js +0 -59
  20. package/cosmosdb/cassandraDatacenter.js.map +1 -1
  21. package/datashare/datasetBlobStorage.d.ts +0 -66
  22. package/datashare/datasetBlobStorage.js +0 -66
  23. package/datashare/datasetBlobStorage.js.map +1 -1
  24. package/datashare/datasetDataLakeGen2.d.ts +0 -62
  25. package/datashare/datasetDataLakeGen2.js +0 -62
  26. package/datashare/datasetDataLakeGen2.js.map +1 -1
  27. package/desktopvirtualization/scalingPlan.d.ts +0 -103
  28. package/desktopvirtualization/scalingPlan.js +0 -103
  29. package/desktopvirtualization/scalingPlan.js.map +1 -1
  30. package/desktopvirtualization/scalingPlanHostPoolAssociation.d.ts +0 -79
  31. package/desktopvirtualization/scalingPlanHostPoolAssociation.js +0 -79
  32. package/desktopvirtualization/scalingPlanHostPoolAssociation.js.map +1 -1
  33. package/hpc/cacheBlobNfsTarget.d.ts +0 -149
  34. package/hpc/cacheBlobNfsTarget.js +0 -149
  35. package/hpc/cacheBlobNfsTarget.js.map +1 -1
  36. package/hpc/cacheBlobTarget.d.ts +0 -71
  37. package/hpc/cacheBlobTarget.js +0 -71
  38. package/hpc/cacheBlobTarget.js.map +1 -1
  39. package/keyvault/accessPolicy.d.ts +0 -42
  40. package/keyvault/accessPolicy.js +0 -42
  41. package/keyvault/accessPolicy.js.map +1 -1
  42. package/keyvault/managedStorageAccount.d.ts +0 -2
  43. package/keyvault/managedStorageAccount.js +0 -2
  44. package/keyvault/managedStorageAccount.js.map +1 -1
  45. package/machinelearning/workspace.d.ts +0 -167
  46. package/machinelearning/workspace.js +0 -167
  47. package/machinelearning/workspace.js.map +1 -1
  48. package/management/privateLinkAssociation.d.ts +2 -2
  49. package/management/privateLinkAssociation.js +2 -2
  50. package/netapp/volumeGroupSapHana.d.ts +1 -1
  51. package/netapp/volumeGroupSapHana.js +1 -1
  52. package/network/trafficManagerProfile.d.ts +2 -2
  53. package/network/trafficManagerProfile.js +2 -2
  54. package/operationalinsights/analyticsSolution.d.ts +3 -3
  55. package/operationalinsights/analyticsSolution.js +3 -3
  56. package/oracle/getCloudVmCluster.d.ts +1 -1
  57. package/package.json +2 -2
  58. package/pim/roleManagementPolicy.d.ts +0 -56
  59. package/pim/roleManagementPolicy.js +0 -56
  60. package/pim/roleManagementPolicy.js.map +1 -1
  61. package/postgresql/flexibleServerActiveDirectoryAdministrator.d.ts +0 -47
  62. package/postgresql/flexibleServerActiveDirectoryAdministrator.js +0 -47
  63. package/postgresql/flexibleServerActiveDirectoryAdministrator.js.map +1 -1
  64. package/redhatopenshift/cluster.d.ts +0 -103
  65. package/redhatopenshift/cluster.js +0 -103
  66. package/redhatopenshift/cluster.js.map +1 -1
  67. package/redis/firewallRule.d.ts +3 -3
  68. package/redis/firewallRule.js +3 -3
  69. package/stack/hciCluster.d.ts +0 -36
  70. package/stack/hciCluster.js +0 -36
  71. package/stack/hciCluster.js.map +1 -1
  72. package/stack/hciMarketplaceGalleryImage.d.ts +0 -48
  73. package/stack/hciMarketplaceGalleryImage.js +0 -48
  74. package/stack/hciMarketplaceGalleryImage.js.map +1 -1
  75. package/trafficmanager/profile.d.ts +2 -2
  76. package/trafficmanager/profile.js +2 -2
  77. package/types/output.d.ts +3 -3
@@ -6,77 +6,6 @@ import * as pulumi from "@pulumi/pulumi";
6
6
  *
7
7
  * > **Note:** By request of the service team the provider no longer automatically registering the `Microsoft.StorageCache` Resource Provider for this resource. To register it you can run `az provider register --namespace 'Microsoft.StorageCache'`.
8
8
  *
9
- * ## Example Usage
10
- *
11
- * ```typescript
12
- * import * as pulumi from "@pulumi/pulumi";
13
- * import * as azure from "@pulumi/azure";
14
- * import * as azuread from "@pulumi/azuread";
15
- *
16
- * const exampleResourceGroup = new azure.core.ResourceGroup("example", {
17
- * name: "example-resources",
18
- * location: "West Europe",
19
- * });
20
- * const exampleVirtualNetwork = new azure.network.VirtualNetwork("example", {
21
- * name: "examplevn",
22
- * addressSpaces: ["10.0.0.0/16"],
23
- * location: exampleResourceGroup.location,
24
- * resourceGroupName: exampleResourceGroup.name,
25
- * });
26
- * const exampleSubnet = new azure.network.Subnet("example", {
27
- * name: "examplesubnet",
28
- * resourceGroupName: exampleResourceGroup.name,
29
- * virtualNetworkName: exampleVirtualNetwork.name,
30
- * addressPrefixes: ["10.0.1.0/24"],
31
- * });
32
- * const exampleCache = new azure.hpc.Cache("example", {
33
- * name: "examplehpccache",
34
- * resourceGroupName: exampleResourceGroup.name,
35
- * location: exampleResourceGroup.location,
36
- * cacheSizeInGb: 3072,
37
- * subnetId: exampleSubnet.id,
38
- * skuName: "Standard_2G",
39
- * });
40
- * const exampleAccount = new azure.storage.Account("example", {
41
- * name: "examplestorgaccount",
42
- * resourceGroupName: exampleResourceGroup.name,
43
- * location: exampleResourceGroup.location,
44
- * accountTier: "Standard",
45
- * accountReplicationType: "LRS",
46
- * });
47
- * const exampleContainer = new azure.storage.Container("example", {
48
- * name: "examplestoragecontainer",
49
- * storageAccountName: exampleAccount.name,
50
- * });
51
- * const example = azuread.getServicePrincipal({
52
- * displayName: "HPC Cache Resource Provider",
53
- * });
54
- * const exampleStorageAccountContrib = new azure.authorization.Assignment("example_storage_account_contrib", {
55
- * scope: exampleAccount.id,
56
- * roleDefinitionName: "Storage Account Contributor",
57
- * principalId: example.then(example => example.objectId),
58
- * });
59
- * const exampleStorageBlobDataContrib = new azure.authorization.Assignment("example_storage_blob_data_contrib", {
60
- * scope: exampleAccount.id,
61
- * roleDefinitionName: "Storage Blob Data Contributor",
62
- * principalId: example.then(example => example.objectId),
63
- * });
64
- * const exampleCacheBlobTarget = new azure.hpc.CacheBlobTarget("example", {
65
- * name: "examplehpccblobtarget",
66
- * resourceGroupName: exampleResourceGroup.name,
67
- * cacheName: exampleCache.name,
68
- * storageContainerId: exampleContainer.id,
69
- * namespacePath: "/blob_storage",
70
- * });
71
- * ```
72
- *
73
- * ## API Providers
74
- *
75
- * <!-- This section is generated, changes will be overwritten -->
76
- * This resource uses the following Azure API Providers:
77
- *
78
- * * `Microsoft.StorageCache` - 2023-05-01
79
- *
80
9
  * ## Import
81
10
  *
82
11
  * Blob Targets within an HPC Cache can be imported using the `resource id`, e.g.
@@ -12,77 +12,6 @@ const utilities = require("../utilities");
12
12
  *
13
13
  * > **Note:** By request of the service team the provider no longer automatically registering the `Microsoft.StorageCache` Resource Provider for this resource. To register it you can run `az provider register --namespace 'Microsoft.StorageCache'`.
14
14
  *
15
- * ## Example Usage
16
- *
17
- * ```typescript
18
- * import * as pulumi from "@pulumi/pulumi";
19
- * import * as azure from "@pulumi/azure";
20
- * import * as azuread from "@pulumi/azuread";
21
- *
22
- * const exampleResourceGroup = new azure.core.ResourceGroup("example", {
23
- * name: "example-resources",
24
- * location: "West Europe",
25
- * });
26
- * const exampleVirtualNetwork = new azure.network.VirtualNetwork("example", {
27
- * name: "examplevn",
28
- * addressSpaces: ["10.0.0.0/16"],
29
- * location: exampleResourceGroup.location,
30
- * resourceGroupName: exampleResourceGroup.name,
31
- * });
32
- * const exampleSubnet = new azure.network.Subnet("example", {
33
- * name: "examplesubnet",
34
- * resourceGroupName: exampleResourceGroup.name,
35
- * virtualNetworkName: exampleVirtualNetwork.name,
36
- * addressPrefixes: ["10.0.1.0/24"],
37
- * });
38
- * const exampleCache = new azure.hpc.Cache("example", {
39
- * name: "examplehpccache",
40
- * resourceGroupName: exampleResourceGroup.name,
41
- * location: exampleResourceGroup.location,
42
- * cacheSizeInGb: 3072,
43
- * subnetId: exampleSubnet.id,
44
- * skuName: "Standard_2G",
45
- * });
46
- * const exampleAccount = new azure.storage.Account("example", {
47
- * name: "examplestorgaccount",
48
- * resourceGroupName: exampleResourceGroup.name,
49
- * location: exampleResourceGroup.location,
50
- * accountTier: "Standard",
51
- * accountReplicationType: "LRS",
52
- * });
53
- * const exampleContainer = new azure.storage.Container("example", {
54
- * name: "examplestoragecontainer",
55
- * storageAccountName: exampleAccount.name,
56
- * });
57
- * const example = azuread.getServicePrincipal({
58
- * displayName: "HPC Cache Resource Provider",
59
- * });
60
- * const exampleStorageAccountContrib = new azure.authorization.Assignment("example_storage_account_contrib", {
61
- * scope: exampleAccount.id,
62
- * roleDefinitionName: "Storage Account Contributor",
63
- * principalId: example.then(example => example.objectId),
64
- * });
65
- * const exampleStorageBlobDataContrib = new azure.authorization.Assignment("example_storage_blob_data_contrib", {
66
- * scope: exampleAccount.id,
67
- * roleDefinitionName: "Storage Blob Data Contributor",
68
- * principalId: example.then(example => example.objectId),
69
- * });
70
- * const exampleCacheBlobTarget = new azure.hpc.CacheBlobTarget("example", {
71
- * name: "examplehpccblobtarget",
72
- * resourceGroupName: exampleResourceGroup.name,
73
- * cacheName: exampleCache.name,
74
- * storageContainerId: exampleContainer.id,
75
- * namespacePath: "/blob_storage",
76
- * });
77
- * ```
78
- *
79
- * ## API Providers
80
- *
81
- * <!-- This section is generated, changes will be overwritten -->
82
- * This resource uses the following Azure API Providers:
83
- *
84
- * * `Microsoft.StorageCache` - 2023-05-01
85
- *
86
15
  * ## Import
87
16
  *
88
17
  * Blob Targets within an HPC Cache can be imported using the `resource id`, e.g.
@@ -1 +1 @@
1
- {"version":3,"file":"cacheBlobTarget.js","sourceRoot":"","sources":["../../hpc/cacheBlobTarget.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqFG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAqCD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;SACpE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,IAAI,EAAE,SAAS,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5C,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,IAAI,EAAE,aAAa,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,IAAI,IAAI,EAAE,kBAAkB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAjGL,0CAkGC;AApFG,gBAAgB;AACO,4BAAY,GAAG,2CAA2C,CAAC"}
1
+ {"version":3,"file":"cacheBlobTarget.js","sourceRoot":"","sources":["../../hpc/cacheBlobTarget.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;GAcG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAqCD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;SACpE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,IAAI,EAAE,SAAS,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5C,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,IAAI,EAAE,aAAa,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,IAAI,IAAI,EAAE,kBAAkB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAjGL,0CAkGC;AApFG,gBAAgB;AACO,4BAAY,GAAG,2CAA2C,CAAC"}
@@ -6,48 +6,6 @@ import * as pulumi from "@pulumi/pulumi";
6
6
  *
7
7
  * > **NOTE:** Azure permits a maximum of 1024 Access Policies per Key Vault - [more information can be found in this document](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault#data-plane-access-control).
8
8
  *
9
- * ## Example Usage
10
- *
11
- * ```typescript
12
- * import * as pulumi from "@pulumi/pulumi";
13
- * import * as azure from "@pulumi/azure";
14
- * import * as azuread from "@pulumi/azuread";
15
- *
16
- * const current = azure.core.getClientConfig({});
17
- * const exampleResourceGroup = new azure.core.ResourceGroup("example", {
18
- * name: "example-resources",
19
- * location: "West Europe",
20
- * });
21
- * const exampleKeyVault = new azure.keyvault.KeyVault("example", {
22
- * name: "examplekeyvault",
23
- * location: exampleResourceGroup.location,
24
- * resourceGroupName: exampleResourceGroup.name,
25
- * tenantId: current.then(current => current.tenantId),
26
- * skuName: "premium",
27
- * });
28
- * const exampleAccessPolicy = new azure.keyvault.AccessPolicy("example", {
29
- * keyVaultId: exampleKeyVault.id,
30
- * tenantId: current.then(current => current.tenantId),
31
- * objectId: current.then(current => current.objectId),
32
- * keyPermissions: ["Get"],
33
- * secretPermissions: ["Get"],
34
- * });
35
- * const example = azuread.getServicePrincipal({
36
- * displayName: "example-app",
37
- * });
38
- * const example_principal = new azure.keyvault.AccessPolicy("example-principal", {
39
- * keyVaultId: exampleKeyVault.id,
40
- * tenantId: current.then(current => current.tenantId),
41
- * objectId: example.then(example => example.objectId),
42
- * keyPermissions: [
43
- * "Get",
44
- * "List",
45
- * "Encrypt",
46
- * "Decrypt",
47
- * ],
48
- * });
49
- * ```
50
- *
51
9
  * ## Import
52
10
  *
53
11
  * Key Vault Access Policies can be imported using the Resource ID of the Key Vault, plus some additional metadata.
@@ -12,48 +12,6 @@ const utilities = require("../utilities");
12
12
  *
13
13
  * > **NOTE:** Azure permits a maximum of 1024 Access Policies per Key Vault - [more information can be found in this document](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault#data-plane-access-control).
14
14
  *
15
- * ## Example Usage
16
- *
17
- * ```typescript
18
- * import * as pulumi from "@pulumi/pulumi";
19
- * import * as azure from "@pulumi/azure";
20
- * import * as azuread from "@pulumi/azuread";
21
- *
22
- * const current = azure.core.getClientConfig({});
23
- * const exampleResourceGroup = new azure.core.ResourceGroup("example", {
24
- * name: "example-resources",
25
- * location: "West Europe",
26
- * });
27
- * const exampleKeyVault = new azure.keyvault.KeyVault("example", {
28
- * name: "examplekeyvault",
29
- * location: exampleResourceGroup.location,
30
- * resourceGroupName: exampleResourceGroup.name,
31
- * tenantId: current.then(current => current.tenantId),
32
- * skuName: "premium",
33
- * });
34
- * const exampleAccessPolicy = new azure.keyvault.AccessPolicy("example", {
35
- * keyVaultId: exampleKeyVault.id,
36
- * tenantId: current.then(current => current.tenantId),
37
- * objectId: current.then(current => current.objectId),
38
- * keyPermissions: ["Get"],
39
- * secretPermissions: ["Get"],
40
- * });
41
- * const example = azuread.getServicePrincipal({
42
- * displayName: "example-app",
43
- * });
44
- * const example_principal = new azure.keyvault.AccessPolicy("example-principal", {
45
- * keyVaultId: exampleKeyVault.id,
46
- * tenantId: current.then(current => current.tenantId),
47
- * objectId: example.then(example => example.objectId),
48
- * keyPermissions: [
49
- * "Get",
50
- * "List",
51
- * "Encrypt",
52
- * "Decrypt",
53
- * ],
54
- * });
55
- * ```
56
- *
57
15
  * ## Import
58
16
  *
59
17
  * Key Vault Access Policies can be imported using the Resource ID of the Key Vault, plus some additional metadata.
@@ -1 +1 @@
1
- {"version":3,"file":"accessPolicy.js","sourceRoot":"","sources":["../../keyvault/accessPolicy.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsEG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IA2CD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;SAChD;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,QAAQ,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3C,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,IAAI,EAAE,QAAQ,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3C,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAxGL,oCAyGC;AA3FG,gBAAgB;AACO,yBAAY,GAAG,0CAA0C,CAAC"}
1
+ {"version":3,"file":"accessPolicy.js","sourceRoot":"","sources":["../../keyvault/accessPolicy.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IA2CD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;SAChD;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,QAAQ,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3C,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,IAAI,EAAE,QAAQ,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3C,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAxGL,oCAyGC;AA3FG,gBAAgB;AACO,yBAAY,GAAG,0CAA0C,CAAC"}
@@ -55,8 +55,6 @@ import * as pulumi from "@pulumi/pulumi";
55
55
  * });
56
56
  * ```
57
57
  *
58
- * ### Automatically Regenerate Storage Account Access Key)
59
- *
60
58
  * ## Import
61
59
  *
62
60
  * Key Vault Managed Storage Accounts can be imported using the `resource id`, e.g.
@@ -61,8 +61,6 @@ const utilities = require("../utilities");
61
61
  * });
62
62
  * ```
63
63
  *
64
- * ### Automatically Regenerate Storage Account Access Key)
65
- *
66
64
  * ## Import
67
65
  *
68
66
  * Key Vault Managed Storage Accounts can be imported using the `resource id`, e.g.
@@ -1 +1 @@
1
- {"version":3,"file":"managedStorageAccount.js","sourceRoot":"","sources":["../../keyvault/managedStorageAccount.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiEG;AACH,MAAa,qBAAsB,SAAQ,MAAM,CAAC,cAAc;IAC5D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkC,EAAE,IAAmC;QAChI,OAAO,IAAI,qBAAqB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC5E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,qBAAqB,CAAC,YAAY,CAAC;IACtE,CAAC;IAyCD,YAAY,IAAY,EAAE,WAAoE,EAAE,IAAmC;QAC/H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqD,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,4BAA4B,CAAC,GAAG,KAAK,EAAE,0BAA0B,CAAC;YACjF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAAoD,CAAC;YAClE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,gBAAgB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;aACnE;YACD,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,4BAA4B,CAAC,GAAG,IAAI,EAAE,0BAA0B,CAAC;YAChF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;SACvC;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,qBAAqB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1E,CAAC;;AApGL,sDAqGC;AAvFG,gBAAgB;AACO,kCAAY,GAAG,4DAA4D,CAAC"}
1
+ {"version":3,"file":"managedStorageAccount.js","sourceRoot":"","sources":["../../keyvault/managedStorageAccount.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+DG;AACH,MAAa,qBAAsB,SAAQ,MAAM,CAAC,cAAc;IAC5D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkC,EAAE,IAAmC;QAChI,OAAO,IAAI,qBAAqB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC5E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,qBAAqB,CAAC,YAAY,CAAC;IACtE,CAAC;IAyCD,YAAY,IAAY,EAAE,WAAoE,EAAE,IAAmC;QAC/H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqD,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,4BAA4B,CAAC,GAAG,KAAK,EAAE,0BAA0B,CAAC;YACjF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAAoD,CAAC;YAClE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,gBAAgB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;aACnE;YACD,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,4BAA4B,CAAC,GAAG,IAAI,EAAE,0BAA0B,CAAC;YAChF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;SACvC;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,qBAAqB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1E,CAAC;;AApGL,sDAqGC;AAvFG,gBAAgB;AACO,kCAAY,GAAG,4DAA4D,CAAC"}
@@ -128,173 +128,6 @@ import * as outputs from "../types/output";
128
128
  * });
129
129
  * ```
130
130
  *
131
- * ### With User Assigned Identity And Data Encryption
132
- *
133
- * > **Note:** The Key Vault must enable purge protection.
134
- *
135
- * ```typescript
136
- * import * as pulumi from "@pulumi/pulumi";
137
- * import * as azure from "@pulumi/azure";
138
- * import * as azuread from "@pulumi/azuread";
139
- *
140
- * const current = azure.core.getClientConfig({});
141
- * const example = new azure.core.ResourceGroup("example", {
142
- * name: "example-resources",
143
- * location: "West Europe",
144
- * });
145
- * const exampleInsights = new azure.appinsights.Insights("example", {
146
- * name: "example-ai",
147
- * location: example.location,
148
- * resourceGroupName: example.name,
149
- * applicationType: "web",
150
- * });
151
- * const exampleAccount = new azure.storage.Account("example", {
152
- * name: "examplestorageaccount",
153
- * location: example.location,
154
- * resourceGroupName: example.name,
155
- * accountTier: "Standard",
156
- * accountReplicationType: "GRS",
157
- * });
158
- * const exampleKeyVault = new azure.keyvault.KeyVault("example", {
159
- * name: "example-keyvalut",
160
- * location: example.location,
161
- * resourceGroupName: example.name,
162
- * tenantId: current.then(current => current.tenantId),
163
- * skuName: "premium",
164
- * purgeProtectionEnabled: true,
165
- * });
166
- * const exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity("example", {
167
- * name: "example-identity",
168
- * location: example.location,
169
- * resourceGroupName: example.name,
170
- * });
171
- * const example_identity = new azure.keyvault.AccessPolicy("example-identity", {
172
- * keyVaultId: exampleKeyVault.id,
173
- * tenantId: current.then(current => current.tenantId),
174
- * objectId: exampleUserAssignedIdentity.principalId,
175
- * keyPermissions: [
176
- * "WrapKey",
177
- * "UnwrapKey",
178
- * "Get",
179
- * "Recover",
180
- * ],
181
- * secretPermissions: [
182
- * "Get",
183
- * "List",
184
- * "Set",
185
- * "Delete",
186
- * "Recover",
187
- * "Backup",
188
- * "Restore",
189
- * ],
190
- * });
191
- * const example_sp = new azure.keyvault.AccessPolicy("example-sp", {
192
- * keyVaultId: exampleKeyVault.id,
193
- * tenantId: current.then(current => current.tenantId),
194
- * objectId: current.then(current => current.objectId),
195
- * keyPermissions: [
196
- * "Get",
197
- * "Create",
198
- * "Recover",
199
- * "Delete",
200
- * "Purge",
201
- * "GetRotationPolicy",
202
- * ],
203
- * });
204
- * const test = azuread.getServicePrincipal({
205
- * displayName: "Azure Cosmos DB",
206
- * });
207
- * const example_cosmosdb = new azure.keyvault.AccessPolicy("example-cosmosdb", {
208
- * keyVaultId: exampleKeyVault.id,
209
- * tenantId: current.then(current => current.tenantId),
210
- * objectId: test.then(test => test.objectId),
211
- * keyPermissions: [
212
- * "Get",
213
- * "Recover",
214
- * "UnwrapKey",
215
- * "WrapKey",
216
- * ],
217
- * }, {
218
- * dependsOn: [
219
- * test,
220
- * current,
221
- * ],
222
- * });
223
- * const exampleKey = new azure.keyvault.Key("example", {
224
- * name: "example-keyvaultkey",
225
- * keyVaultId: exampleKeyVault.id,
226
- * keyType: "RSA",
227
- * keySize: 2048,
228
- * keyOpts: [
229
- * "decrypt",
230
- * "encrypt",
231
- * "sign",
232
- * "unwrapKey",
233
- * "verify",
234
- * "wrapKey",
235
- * ],
236
- * }, {
237
- * dependsOn: [
238
- * exampleKeyVault,
239
- * example_sp,
240
- * ],
241
- * });
242
- * const example_role1 = new azure.authorization.Assignment("example-role1", {
243
- * scope: exampleKeyVault.id,
244
- * roleDefinitionName: "Contributor",
245
- * principalId: exampleUserAssignedIdentity.principalId,
246
- * });
247
- * const example_role2 = new azure.authorization.Assignment("example-role2", {
248
- * scope: exampleAccount.id,
249
- * roleDefinitionName: "Storage Blob Data Contributor",
250
- * principalId: exampleUserAssignedIdentity.principalId,
251
- * });
252
- * const example_role3 = new azure.authorization.Assignment("example-role3", {
253
- * scope: exampleAccount.id,
254
- * roleDefinitionName: "Contributor",
255
- * principalId: exampleUserAssignedIdentity.principalId,
256
- * });
257
- * const example_role4 = new azure.authorization.Assignment("example-role4", {
258
- * scope: exampleInsights.id,
259
- * roleDefinitionName: "Contributor",
260
- * principalId: exampleUserAssignedIdentity.principalId,
261
- * });
262
- * const exampleWorkspace = new azure.machinelearning.Workspace("example", {
263
- * name: "example-workspace",
264
- * location: example.location,
265
- * resourceGroupName: example.name,
266
- * applicationInsightsId: exampleInsights.id,
267
- * keyVaultId: exampleKeyVault.id,
268
- * storageAccountId: exampleAccount.id,
269
- * highBusinessImpact: true,
270
- * primaryUserAssignedIdentity: exampleUserAssignedIdentity.id,
271
- * identity: {
272
- * type: "UserAssigned",
273
- * identityIds: [exampleUserAssignedIdentity.id],
274
- * },
275
- * encryption: {
276
- * userAssignedIdentityId: exampleUserAssignedIdentity.id,
277
- * keyVaultId: exampleKeyVault.id,
278
- * keyId: exampleKey.id,
279
- * },
280
- * }, {
281
- * dependsOn: [
282
- * example_role1,
283
- * example_role2,
284
- * example_role3,
285
- * example_role4,
286
- * example_cosmosdb,
287
- * ],
288
- * });
289
- * ```
290
- *
291
- * ## API Providers
292
- *
293
- * <!-- This section is generated, changes will be overwritten -->
294
- * This resource uses the following Azure API Providers:
295
- *
296
- * * `Microsoft.MachineLearningServices` - 2025-06-01
297
- *
298
131
  * ## Import
299
132
  *
300
133
  * Machine Learning Workspace can be imported using the `resource id`, e.g.
@@ -132,173 +132,6 @@ const utilities = require("../utilities");
132
132
  * });
133
133
  * ```
134
134
  *
135
- * ### With User Assigned Identity And Data Encryption
136
- *
137
- * > **Note:** The Key Vault must enable purge protection.
138
- *
139
- * ```typescript
140
- * import * as pulumi from "@pulumi/pulumi";
141
- * import * as azure from "@pulumi/azure";
142
- * import * as azuread from "@pulumi/azuread";
143
- *
144
- * const current = azure.core.getClientConfig({});
145
- * const example = new azure.core.ResourceGroup("example", {
146
- * name: "example-resources",
147
- * location: "West Europe",
148
- * });
149
- * const exampleInsights = new azure.appinsights.Insights("example", {
150
- * name: "example-ai",
151
- * location: example.location,
152
- * resourceGroupName: example.name,
153
- * applicationType: "web",
154
- * });
155
- * const exampleAccount = new azure.storage.Account("example", {
156
- * name: "examplestorageaccount",
157
- * location: example.location,
158
- * resourceGroupName: example.name,
159
- * accountTier: "Standard",
160
- * accountReplicationType: "GRS",
161
- * });
162
- * const exampleKeyVault = new azure.keyvault.KeyVault("example", {
163
- * name: "example-keyvalut",
164
- * location: example.location,
165
- * resourceGroupName: example.name,
166
- * tenantId: current.then(current => current.tenantId),
167
- * skuName: "premium",
168
- * purgeProtectionEnabled: true,
169
- * });
170
- * const exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity("example", {
171
- * name: "example-identity",
172
- * location: example.location,
173
- * resourceGroupName: example.name,
174
- * });
175
- * const example_identity = new azure.keyvault.AccessPolicy("example-identity", {
176
- * keyVaultId: exampleKeyVault.id,
177
- * tenantId: current.then(current => current.tenantId),
178
- * objectId: exampleUserAssignedIdentity.principalId,
179
- * keyPermissions: [
180
- * "WrapKey",
181
- * "UnwrapKey",
182
- * "Get",
183
- * "Recover",
184
- * ],
185
- * secretPermissions: [
186
- * "Get",
187
- * "List",
188
- * "Set",
189
- * "Delete",
190
- * "Recover",
191
- * "Backup",
192
- * "Restore",
193
- * ],
194
- * });
195
- * const example_sp = new azure.keyvault.AccessPolicy("example-sp", {
196
- * keyVaultId: exampleKeyVault.id,
197
- * tenantId: current.then(current => current.tenantId),
198
- * objectId: current.then(current => current.objectId),
199
- * keyPermissions: [
200
- * "Get",
201
- * "Create",
202
- * "Recover",
203
- * "Delete",
204
- * "Purge",
205
- * "GetRotationPolicy",
206
- * ],
207
- * });
208
- * const test = azuread.getServicePrincipal({
209
- * displayName: "Azure Cosmos DB",
210
- * });
211
- * const example_cosmosdb = new azure.keyvault.AccessPolicy("example-cosmosdb", {
212
- * keyVaultId: exampleKeyVault.id,
213
- * tenantId: current.then(current => current.tenantId),
214
- * objectId: test.then(test => test.objectId),
215
- * keyPermissions: [
216
- * "Get",
217
- * "Recover",
218
- * "UnwrapKey",
219
- * "WrapKey",
220
- * ],
221
- * }, {
222
- * dependsOn: [
223
- * test,
224
- * current,
225
- * ],
226
- * });
227
- * const exampleKey = new azure.keyvault.Key("example", {
228
- * name: "example-keyvaultkey",
229
- * keyVaultId: exampleKeyVault.id,
230
- * keyType: "RSA",
231
- * keySize: 2048,
232
- * keyOpts: [
233
- * "decrypt",
234
- * "encrypt",
235
- * "sign",
236
- * "unwrapKey",
237
- * "verify",
238
- * "wrapKey",
239
- * ],
240
- * }, {
241
- * dependsOn: [
242
- * exampleKeyVault,
243
- * example_sp,
244
- * ],
245
- * });
246
- * const example_role1 = new azure.authorization.Assignment("example-role1", {
247
- * scope: exampleKeyVault.id,
248
- * roleDefinitionName: "Contributor",
249
- * principalId: exampleUserAssignedIdentity.principalId,
250
- * });
251
- * const example_role2 = new azure.authorization.Assignment("example-role2", {
252
- * scope: exampleAccount.id,
253
- * roleDefinitionName: "Storage Blob Data Contributor",
254
- * principalId: exampleUserAssignedIdentity.principalId,
255
- * });
256
- * const example_role3 = new azure.authorization.Assignment("example-role3", {
257
- * scope: exampleAccount.id,
258
- * roleDefinitionName: "Contributor",
259
- * principalId: exampleUserAssignedIdentity.principalId,
260
- * });
261
- * const example_role4 = new azure.authorization.Assignment("example-role4", {
262
- * scope: exampleInsights.id,
263
- * roleDefinitionName: "Contributor",
264
- * principalId: exampleUserAssignedIdentity.principalId,
265
- * });
266
- * const exampleWorkspace = new azure.machinelearning.Workspace("example", {
267
- * name: "example-workspace",
268
- * location: example.location,
269
- * resourceGroupName: example.name,
270
- * applicationInsightsId: exampleInsights.id,
271
- * keyVaultId: exampleKeyVault.id,
272
- * storageAccountId: exampleAccount.id,
273
- * highBusinessImpact: true,
274
- * primaryUserAssignedIdentity: exampleUserAssignedIdentity.id,
275
- * identity: {
276
- * type: "UserAssigned",
277
- * identityIds: [exampleUserAssignedIdentity.id],
278
- * },
279
- * encryption: {
280
- * userAssignedIdentityId: exampleUserAssignedIdentity.id,
281
- * keyVaultId: exampleKeyVault.id,
282
- * keyId: exampleKey.id,
283
- * },
284
- * }, {
285
- * dependsOn: [
286
- * example_role1,
287
- * example_role2,
288
- * example_role3,
289
- * example_role4,
290
- * example_cosmosdb,
291
- * ],
292
- * });
293
- * ```
294
- *
295
- * ## API Providers
296
- *
297
- * <!-- This section is generated, changes will be overwritten -->
298
- * This resource uses the following Azure API Providers:
299
- *
300
- * * `Microsoft.MachineLearningServices` - 2025-06-01
301
- *
302
135
  * ## Import
303
136
  *
304
137
  * Machine Learning Workspace can be imported using the `resource id`, e.g.