@pulumi/azure 6.8.0-alpha.1730527455 → 6.8.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/authorization/roleDefinition.d.ts +28 -6
- package/authorization/roleDefinition.js +22 -0
- package/authorization/roleDefinition.js.map +1 -1
- package/compute/orchestratedVirtualMachineScaleSet.d.ts +18 -0
- package/compute/orchestratedVirtualMachineScaleSet.js +2 -0
- package/compute/orchestratedVirtualMachineScaleSet.js.map +1 -1
- package/containerapp/environment.d.ts +3 -3
- package/containerservice/registry.d.ts +35 -0
- package/containerservice/registry.js +35 -0
- package/containerservice/registry.js.map +1 -1
- package/cosmosdb/account.d.ts +3 -0
- package/cosmosdb/account.js +2 -0
- package/cosmosdb/account.js.map +1 -1
- package/datafactory/linkedServiceAzureSqlDatabase.d.ts +12 -0
- package/datafactory/linkedServiceAzureSqlDatabase.js +2 -0
- package/datafactory/linkedServiceAzureSqlDatabase.js.map +1 -1
- package/index.d.ts +2 -1
- package/index.js +3 -1
- package/index.js.map +1 -1
- package/keyvault/key.d.ts +9 -3
- package/keyvault/key.js.map +1 -1
- package/loadtest/loadTest.d.ts +3 -3
- package/machinelearning/index.d.ts +3 -0
- package/machinelearning/index.js +6 -1
- package/machinelearning/index.js.map +1 -1
- package/machinelearning/workspaceNetworkOutboundRuleFqdn.d.ts +135 -0
- package/machinelearning/workspaceNetworkOutboundRuleFqdn.js +122 -0
- package/machinelearning/workspaceNetworkOutboundRuleFqdn.js.map +1 -0
- package/network/getVirtualNetworkPeering.d.ts +108 -0
- package/network/getVirtualNetworkPeering.js +64 -0
- package/network/getVirtualNetworkPeering.js.map +1 -0
- package/network/index.d.ts +3 -0
- package/network/index.js +6 -3
- package/network/index.js.map +1 -1
- package/oracle/cloudVmCluster.d.ts +8 -0
- package/oracle/cloudVmCluster.js +2 -0
- package/oracle/cloudVmCluster.js.map +1 -1
- package/package.json +2 -2
- package/role/definition.d.ts +28 -6
- package/role/definition.js +22 -0
- package/role/definition.js.map +1 -1
- package/stack/hciExtension.d.ts +182 -0
- package/stack/hciExtension.js +108 -0
- package/stack/hciExtension.js.map +1 -0
- package/stack/hciMarketplaceGalleryImage.d.ts +216 -0
- package/stack/hciMarketplaceGalleryImage.js +137 -0
- package/stack/hciMarketplaceGalleryImage.js.map +1 -0
- package/stack/index.d.ts +6 -0
- package/stack/index.js +11 -1
- package/stack/index.js.map +1 -1
- package/trustedsigning/account.d.ts +121 -0
- package/trustedsigning/account.js +76 -0
- package/trustedsigning/account.js.map +1 -0
- package/trustedsigning/index.d.ts +3 -0
- package/trustedsigning/index.js +22 -0
- package/trustedsigning/index.js.map +1 -0
- package/types/input.d.ts +57 -9
- package/types/output.d.ts +57 -9
|
@@ -0,0 +1,121 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Manages a Trusted Signing Account.
|
|
4
|
+
*
|
|
5
|
+
* ## Import
|
|
6
|
+
*
|
|
7
|
+
* Trusted Signing Accounts can be imported using the `resource id`, e.g.
|
|
8
|
+
*
|
|
9
|
+
* ```sh
|
|
10
|
+
* $ pulumi import azure:trustedsigning/account:Account example /subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/example-rg/providers/Microsoft.CodeSigning/codeSigningAccounts/example-account
|
|
11
|
+
* ```
|
|
12
|
+
*/
|
|
13
|
+
export declare class Account extends pulumi.CustomResource {
|
|
14
|
+
/**
|
|
15
|
+
* Get an existing Account resource's state with the given name, ID, and optional extra
|
|
16
|
+
* properties used to qualify the lookup.
|
|
17
|
+
*
|
|
18
|
+
* @param name The _unique_ name of the resulting resource.
|
|
19
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
20
|
+
* @param state Any extra arguments used during the lookup.
|
|
21
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
22
|
+
*/
|
|
23
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AccountState, opts?: pulumi.CustomResourceOptions): Account;
|
|
24
|
+
/**
|
|
25
|
+
* Returns true if the given object is an instance of Account. This is designed to work even
|
|
26
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
27
|
+
*/
|
|
28
|
+
static isInstance(obj: any): obj is Account;
|
|
29
|
+
/**
|
|
30
|
+
* The URI of the Trusted Signing Account which is used during signing files.
|
|
31
|
+
*/
|
|
32
|
+
readonly accountUri: pulumi.Output<string>;
|
|
33
|
+
/**
|
|
34
|
+
* The Azure Region where the Trusted Signing Account should exist. Changing this forces a new Trusted Signing Account to be created.
|
|
35
|
+
*/
|
|
36
|
+
readonly location: pulumi.Output<string>;
|
|
37
|
+
/**
|
|
38
|
+
* The name which should be used for this Trusted Signing Account. Changing this forces a new Trusted Signing Account to be created.
|
|
39
|
+
*/
|
|
40
|
+
readonly name: pulumi.Output<string>;
|
|
41
|
+
/**
|
|
42
|
+
* The name of the Resource Group where the Trusted Signing Account should exist. Changing this forces a new Trusted Signing Account to be created.
|
|
43
|
+
*/
|
|
44
|
+
readonly resourceGroupName: pulumi.Output<string>;
|
|
45
|
+
/**
|
|
46
|
+
* The sku name of this Trusted Signing Account. Possible values are `Basic` and `Premium`.
|
|
47
|
+
*/
|
|
48
|
+
readonly skuName: pulumi.Output<string>;
|
|
49
|
+
/**
|
|
50
|
+
* A mapping of tags which should be assigned to the Trusted Signing Account.
|
|
51
|
+
*/
|
|
52
|
+
readonly tags: pulumi.Output<{
|
|
53
|
+
[key: string]: string;
|
|
54
|
+
} | undefined>;
|
|
55
|
+
/**
|
|
56
|
+
* Create a Account resource with the given unique name, arguments, and options.
|
|
57
|
+
*
|
|
58
|
+
* @param name The _unique_ name of the resource.
|
|
59
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
60
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
61
|
+
*/
|
|
62
|
+
constructor(name: string, args: AccountArgs, opts?: pulumi.CustomResourceOptions);
|
|
63
|
+
}
|
|
64
|
+
/**
|
|
65
|
+
* Input properties used for looking up and filtering Account resources.
|
|
66
|
+
*/
|
|
67
|
+
export interface AccountState {
|
|
68
|
+
/**
|
|
69
|
+
* The URI of the Trusted Signing Account which is used during signing files.
|
|
70
|
+
*/
|
|
71
|
+
accountUri?: pulumi.Input<string>;
|
|
72
|
+
/**
|
|
73
|
+
* The Azure Region where the Trusted Signing Account should exist. Changing this forces a new Trusted Signing Account to be created.
|
|
74
|
+
*/
|
|
75
|
+
location?: pulumi.Input<string>;
|
|
76
|
+
/**
|
|
77
|
+
* The name which should be used for this Trusted Signing Account. Changing this forces a new Trusted Signing Account to be created.
|
|
78
|
+
*/
|
|
79
|
+
name?: pulumi.Input<string>;
|
|
80
|
+
/**
|
|
81
|
+
* The name of the Resource Group where the Trusted Signing Account should exist. Changing this forces a new Trusted Signing Account to be created.
|
|
82
|
+
*/
|
|
83
|
+
resourceGroupName?: pulumi.Input<string>;
|
|
84
|
+
/**
|
|
85
|
+
* The sku name of this Trusted Signing Account. Possible values are `Basic` and `Premium`.
|
|
86
|
+
*/
|
|
87
|
+
skuName?: pulumi.Input<string>;
|
|
88
|
+
/**
|
|
89
|
+
* A mapping of tags which should be assigned to the Trusted Signing Account.
|
|
90
|
+
*/
|
|
91
|
+
tags?: pulumi.Input<{
|
|
92
|
+
[key: string]: pulumi.Input<string>;
|
|
93
|
+
}>;
|
|
94
|
+
}
|
|
95
|
+
/**
|
|
96
|
+
* The set of arguments for constructing a Account resource.
|
|
97
|
+
*/
|
|
98
|
+
export interface AccountArgs {
|
|
99
|
+
/**
|
|
100
|
+
* The Azure Region where the Trusted Signing Account should exist. Changing this forces a new Trusted Signing Account to be created.
|
|
101
|
+
*/
|
|
102
|
+
location?: pulumi.Input<string>;
|
|
103
|
+
/**
|
|
104
|
+
* The name which should be used for this Trusted Signing Account. Changing this forces a new Trusted Signing Account to be created.
|
|
105
|
+
*/
|
|
106
|
+
name?: pulumi.Input<string>;
|
|
107
|
+
/**
|
|
108
|
+
* The name of the Resource Group where the Trusted Signing Account should exist. Changing this forces a new Trusted Signing Account to be created.
|
|
109
|
+
*/
|
|
110
|
+
resourceGroupName: pulumi.Input<string>;
|
|
111
|
+
/**
|
|
112
|
+
* The sku name of this Trusted Signing Account. Possible values are `Basic` and `Premium`.
|
|
113
|
+
*/
|
|
114
|
+
skuName: pulumi.Input<string>;
|
|
115
|
+
/**
|
|
116
|
+
* A mapping of tags which should be assigned to the Trusted Signing Account.
|
|
117
|
+
*/
|
|
118
|
+
tags?: pulumi.Input<{
|
|
119
|
+
[key: string]: pulumi.Input<string>;
|
|
120
|
+
}>;
|
|
121
|
+
}
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.Account = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Manages a Trusted Signing Account.
|
|
10
|
+
*
|
|
11
|
+
* ## Import
|
|
12
|
+
*
|
|
13
|
+
* Trusted Signing Accounts can be imported using the `resource id`, e.g.
|
|
14
|
+
*
|
|
15
|
+
* ```sh
|
|
16
|
+
* $ pulumi import azure:trustedsigning/account:Account example /subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/example-rg/providers/Microsoft.CodeSigning/codeSigningAccounts/example-account
|
|
17
|
+
* ```
|
|
18
|
+
*/
|
|
19
|
+
class Account extends pulumi.CustomResource {
|
|
20
|
+
constructor(name, argsOrState, opts) {
|
|
21
|
+
let resourceInputs = {};
|
|
22
|
+
opts = opts || {};
|
|
23
|
+
if (opts.id) {
|
|
24
|
+
const state = argsOrState;
|
|
25
|
+
resourceInputs["accountUri"] = state ? state.accountUri : undefined;
|
|
26
|
+
resourceInputs["location"] = state ? state.location : undefined;
|
|
27
|
+
resourceInputs["name"] = state ? state.name : undefined;
|
|
28
|
+
resourceInputs["resourceGroupName"] = state ? state.resourceGroupName : undefined;
|
|
29
|
+
resourceInputs["skuName"] = state ? state.skuName : undefined;
|
|
30
|
+
resourceInputs["tags"] = state ? state.tags : undefined;
|
|
31
|
+
}
|
|
32
|
+
else {
|
|
33
|
+
const args = argsOrState;
|
|
34
|
+
if ((!args || args.resourceGroupName === undefined) && !opts.urn) {
|
|
35
|
+
throw new Error("Missing required property 'resourceGroupName'");
|
|
36
|
+
}
|
|
37
|
+
if ((!args || args.skuName === undefined) && !opts.urn) {
|
|
38
|
+
throw new Error("Missing required property 'skuName'");
|
|
39
|
+
}
|
|
40
|
+
resourceInputs["location"] = args ? args.location : undefined;
|
|
41
|
+
resourceInputs["name"] = args ? args.name : undefined;
|
|
42
|
+
resourceInputs["resourceGroupName"] = args ? args.resourceGroupName : undefined;
|
|
43
|
+
resourceInputs["skuName"] = args ? args.skuName : undefined;
|
|
44
|
+
resourceInputs["tags"] = args ? args.tags : undefined;
|
|
45
|
+
resourceInputs["accountUri"] = undefined /*out*/;
|
|
46
|
+
}
|
|
47
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
48
|
+
super(Account.__pulumiType, name, resourceInputs, opts);
|
|
49
|
+
}
|
|
50
|
+
/**
|
|
51
|
+
* Get an existing Account resource's state with the given name, ID, and optional extra
|
|
52
|
+
* properties used to qualify the lookup.
|
|
53
|
+
*
|
|
54
|
+
* @param name The _unique_ name of the resulting resource.
|
|
55
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
56
|
+
* @param state Any extra arguments used during the lookup.
|
|
57
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
58
|
+
*/
|
|
59
|
+
static get(name, id, state, opts) {
|
|
60
|
+
return new Account(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
61
|
+
}
|
|
62
|
+
/**
|
|
63
|
+
* Returns true if the given object is an instance of Account. This is designed to work even
|
|
64
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
65
|
+
*/
|
|
66
|
+
static isInstance(obj) {
|
|
67
|
+
if (obj === undefined || obj === null) {
|
|
68
|
+
return false;
|
|
69
|
+
}
|
|
70
|
+
return obj['__pulumiType'] === Account.__pulumiType;
|
|
71
|
+
}
|
|
72
|
+
}
|
|
73
|
+
exports.Account = Account;
|
|
74
|
+
/** @internal */
|
|
75
|
+
Account.__pulumiType = 'azure:trustedsigning/account:Account';
|
|
76
|
+
//# sourceMappingURL=account.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"account.js","sourceRoot":"","sources":["../../trustedsigning/account.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;GAUG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IA6D9C,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,iBAAiB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9D,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACpD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;IAxFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;;AA1BL,0BA0FC;AA5EG,gBAAgB;AACO,oBAAY,GAAG,sCAAsC,CAAC"}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.Account = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
exports.Account = null;
|
|
9
|
+
utilities.lazyLoad(exports, ["Account"], () => require("./account"));
|
|
10
|
+
const _module = {
|
|
11
|
+
version: utilities.getVersion(),
|
|
12
|
+
construct: (name, type, urn) => {
|
|
13
|
+
switch (type) {
|
|
14
|
+
case "azure:trustedsigning/account:Account":
|
|
15
|
+
return new exports.Account(name, undefined, { urn });
|
|
16
|
+
default:
|
|
17
|
+
throw new Error(`unknown resource type ${type}`);
|
|
18
|
+
}
|
|
19
|
+
},
|
|
20
|
+
};
|
|
21
|
+
pulumi.runtime.registerResourceModule("azure", "trustedsigning/account", _module);
|
|
22
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../trustedsigning/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAGrE,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,sCAAsC;gBACvC,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,wBAAwB,EAAE,OAAO,CAAC,CAAA"}
|
package/types/input.d.ts
CHANGED
|
@@ -5110,7 +5110,7 @@ export declare namespace appservice {
|
|
|
5110
5110
|
*/
|
|
5111
5111
|
managedPipelineMode?: pulumi.Input<string>;
|
|
5112
5112
|
/**
|
|
5113
|
-
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, and `1.
|
|
5113
|
+
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, `1.2` and `1.3`. Defaults to `1.2`.
|
|
5114
5114
|
*/
|
|
5115
5115
|
minimumTlsVersion?: pulumi.Input<string>;
|
|
5116
5116
|
/**
|
|
@@ -7173,7 +7173,7 @@ export declare namespace appservice {
|
|
|
7173
7173
|
*/
|
|
7174
7174
|
managedPipelineMode?: pulumi.Input<string>;
|
|
7175
7175
|
/**
|
|
7176
|
-
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, and `1.
|
|
7176
|
+
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, `1.2` and `1.3`. Defaults to `1.2`.
|
|
7177
7177
|
*/
|
|
7178
7178
|
minimumTlsVersion?: pulumi.Input<string>;
|
|
7179
7179
|
/**
|
|
@@ -10064,7 +10064,7 @@ export declare namespace appservice {
|
|
|
10064
10064
|
*/
|
|
10065
10065
|
managedPipelineMode?: pulumi.Input<string>;
|
|
10066
10066
|
/**
|
|
10067
|
-
* Configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, and `1.
|
|
10067
|
+
* Configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, `1.2` and `1.3`. Defaults to `1.2`.
|
|
10068
10068
|
*/
|
|
10069
10069
|
minimumTlsVersion?: pulumi.Input<string>;
|
|
10070
10070
|
/**
|
|
@@ -12061,7 +12061,7 @@ export declare namespace appservice {
|
|
|
12061
12061
|
*/
|
|
12062
12062
|
managedPipelineMode?: pulumi.Input<string>;
|
|
12063
12063
|
/**
|
|
12064
|
-
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, and `1.
|
|
12064
|
+
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, `1.2` and `1.3`. Defaults to `1.2`.
|
|
12065
12065
|
*/
|
|
12066
12066
|
minimumTlsVersion?: pulumi.Input<string>;
|
|
12067
12067
|
/**
|
|
@@ -18882,6 +18882,16 @@ export declare namespace compute {
|
|
|
18882
18882
|
*/
|
|
18883
18883
|
regularPercentageAboveBase?: pulumi.Input<number>;
|
|
18884
18884
|
}
|
|
18885
|
+
interface OrchestratedVirtualMachineScaleSetSkuProfile {
|
|
18886
|
+
/**
|
|
18887
|
+
* Specifies the allocation strategy for the virtual machine scale set based on which the VMs will be allocated. Possible values are `LowestPrice` and `CapacityOptimized`.
|
|
18888
|
+
*/
|
|
18889
|
+
allocationStrategy: pulumi.Input<string>;
|
|
18890
|
+
/**
|
|
18891
|
+
* Specifies the VM sizes for the virtual machine scale set.
|
|
18892
|
+
*/
|
|
18893
|
+
vmSizes: pulumi.Input<pulumi.Input<string>[]>;
|
|
18894
|
+
}
|
|
18885
18895
|
interface OrchestratedVirtualMachineScaleSetSourceImageReference {
|
|
18886
18896
|
/**
|
|
18887
18897
|
* Specifies the offer of the image used to create the virtual machines. Changing this forces a new resource to be created.
|
|
@@ -22812,6 +22822,14 @@ export declare namespace containerservice {
|
|
|
22812
22822
|
* Detect similar node groups and balance the number of nodes between them. Defaults to `false`.
|
|
22813
22823
|
*/
|
|
22814
22824
|
balanceSimilarNodeGroups?: pulumi.Input<boolean>;
|
|
22825
|
+
/**
|
|
22826
|
+
* Whether DaemonSet pods will be gracefully terminated from empty nodes. Defaults to `false`.
|
|
22827
|
+
*/
|
|
22828
|
+
daemonsetEvictionForEmptyNodesEnabled?: pulumi.Input<boolean>;
|
|
22829
|
+
/**
|
|
22830
|
+
* Whether DaemonSet pods will be gracefully terminated from non-empty nodes. Defaults to `true`.
|
|
22831
|
+
*/
|
|
22832
|
+
daemonsetEvictionForOccupiedNodesEnabled?: pulumi.Input<boolean>;
|
|
22815
22833
|
/**
|
|
22816
22834
|
* Maximum number of empty nodes that can be deleted at the same time. Defaults to `10`.
|
|
22817
22835
|
*/
|
|
@@ -22820,6 +22838,10 @@ export declare namespace containerservice {
|
|
|
22820
22838
|
* Expander to use. Possible values are `least-waste`, `priority`, `most-pods` and `random`. Defaults to `random`.
|
|
22821
22839
|
*/
|
|
22822
22840
|
expander?: pulumi.Input<string>;
|
|
22841
|
+
/**
|
|
22842
|
+
* Whether DaemonSet pods will be ignored when calculating resource utilization for scale down. Defaults to `false`.
|
|
22843
|
+
*/
|
|
22844
|
+
ignoreDaemonsetsUtilizationEnabled?: pulumi.Input<boolean>;
|
|
22823
22845
|
/**
|
|
22824
22846
|
* Maximum number of seconds the cluster autoscaler waits for pod termination when trying to scale down a node. Defaults to `600`.
|
|
22825
22847
|
*/
|
|
@@ -23755,6 +23777,10 @@ export declare namespace containerservice {
|
|
|
23755
23777
|
serviceCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
23756
23778
|
}
|
|
23757
23779
|
interface KubernetesClusterNetworkProfileLoadBalancerProfile {
|
|
23780
|
+
/**
|
|
23781
|
+
* The type of the managed inbound Load Balancer Backend Pool. Possible values are `NodeIP` and `NodeIPConfiguration`. Defaults to `NodeIPConfiguration`. See [the documentation](https://learn.microsoft.com/en-us/azure/aks/load-balancer-standard#change-the-inbound-pool-type) for more information.
|
|
23782
|
+
*/
|
|
23783
|
+
backendPoolType?: pulumi.Input<string>;
|
|
23758
23784
|
/**
|
|
23759
23785
|
* The outcome (resource IDs) of the specified arguments.
|
|
23760
23786
|
*/
|
|
@@ -40008,11 +40034,13 @@ export declare namespace network {
|
|
|
40008
40034
|
*/
|
|
40009
40035
|
id?: pulumi.Input<string>;
|
|
40010
40036
|
/**
|
|
40011
|
-
* The Secret ID of (base-64 encoded unencrypted pfx)
|
|
40037
|
+
* The Secret ID of the (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for Key Vault to use this feature. Required if `data` is not set.
|
|
40038
|
+
*
|
|
40039
|
+
* > **NOTE:** To implement certificate rotation, `versionlessSecretId` should be used, although `secretId` is also supported.
|
|
40012
40040
|
*
|
|
40013
40041
|
* > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
|
|
40014
40042
|
*
|
|
40015
|
-
* > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
|
|
40043
|
+
* > **NOTE:** For TLS termination with Key Vault certificates to work properly, an existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
|
|
40016
40044
|
*/
|
|
40017
40045
|
keyVaultSecretId?: pulumi.Input<string>;
|
|
40018
40046
|
/**
|
|
@@ -40112,11 +40140,13 @@ export declare namespace network {
|
|
|
40112
40140
|
*/
|
|
40113
40141
|
id?: pulumi.Input<string>;
|
|
40114
40142
|
/**
|
|
40115
|
-
* The Secret ID of (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
|
|
40143
|
+
* The Secret ID of the (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
|
|
40144
|
+
*
|
|
40145
|
+
* > **NOTE:** To implement certificate rotation, `versionlessSecretId` should be used, although `secretId` is also supported.
|
|
40116
40146
|
*
|
|
40117
40147
|
* > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
|
|
40118
40148
|
*
|
|
40119
|
-
* > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
|
|
40149
|
+
* > **NOTE:** For TLS termination with Key Vault certificates to work properly, an existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
|
|
40120
40150
|
*/
|
|
40121
40151
|
keyVaultSecretId?: pulumi.Input<string>;
|
|
40122
40152
|
/**
|
|
@@ -46791,6 +46821,20 @@ export declare namespace stack {
|
|
|
46791
46821
|
*/
|
|
46792
46822
|
nextHopIpAddress: pulumi.Input<string>;
|
|
46793
46823
|
}
|
|
46824
|
+
interface HciMarketplaceGalleryImageIdentifier {
|
|
46825
|
+
/**
|
|
46826
|
+
* The offer of the Azure Stack HCI Marketplace Gallery Image. Changing this forces a new Azure Stack HCI Marketplace Gallery Image to be created.
|
|
46827
|
+
*/
|
|
46828
|
+
offer: pulumi.Input<string>;
|
|
46829
|
+
/**
|
|
46830
|
+
* The publisher of the Azure Stack HCI Marketplace Gallery Image. Changing this forces a new Azure Stack HCI Marketplace Gallery Image to be created.
|
|
46831
|
+
*/
|
|
46832
|
+
publisher: pulumi.Input<string>;
|
|
46833
|
+
/**
|
|
46834
|
+
* The sku of the Azure Stack HCI Marketplace Gallery Image. Changing this forces a new Azure Stack HCI Marketplace Gallery Image to be created.
|
|
46835
|
+
*/
|
|
46836
|
+
sku: pulumi.Input<string>;
|
|
46837
|
+
}
|
|
46794
46838
|
}
|
|
46795
46839
|
export declare namespace storage {
|
|
46796
46840
|
interface AccountAzureFilesAuthentication {
|
|
@@ -48496,7 +48540,7 @@ export declare namespace waf {
|
|
|
48496
48540
|
*/
|
|
48497
48541
|
operator: pulumi.Input<string>;
|
|
48498
48542
|
/**
|
|
48499
|
-
* A list of transformations to do before the match is attempted. Possible values are `HtmlEntityDecode`, `Lowercase`, `RemoveNulls`, `Trim`, `UrlDecode` and `UrlEncode`.
|
|
48543
|
+
* A list of transformations to do before the match is attempted. Possible values are `HtmlEntityDecode`, `Lowercase`, `RemoveNulls`, `Trim`, `Uppercase`, `UrlDecode` and `UrlEncode`.
|
|
48500
48544
|
*/
|
|
48501
48545
|
transforms?: pulumi.Input<pulumi.Input<string>[]>;
|
|
48502
48546
|
}
|
|
@@ -48606,6 +48650,10 @@ export declare namespace waf {
|
|
|
48606
48650
|
* Describes if the policy is in enabled state or disabled state. Defaults to `true`.
|
|
48607
48651
|
*/
|
|
48608
48652
|
enabled?: pulumi.Input<boolean>;
|
|
48653
|
+
/**
|
|
48654
|
+
* Whether the firewall should block a request with upload size greater then `fileUploadLimitInMb`.
|
|
48655
|
+
*/
|
|
48656
|
+
fileUploadEnforcement?: pulumi.Input<boolean>;
|
|
48609
48657
|
/**
|
|
48610
48658
|
* The File Upload Limit in MB. Accepted values are in the range `1` to `4000`. Defaults to `100`.
|
|
48611
48659
|
*/
|
package/types/output.d.ts
CHANGED
|
@@ -10080,7 +10080,7 @@ export declare namespace appservice {
|
|
|
10080
10080
|
*/
|
|
10081
10081
|
managedPipelineMode?: string;
|
|
10082
10082
|
/**
|
|
10083
|
-
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, and `1.
|
|
10083
|
+
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, `1.2` and `1.3`. Defaults to `1.2`.
|
|
10084
10084
|
*/
|
|
10085
10085
|
minimumTlsVersion?: string;
|
|
10086
10086
|
/**
|
|
@@ -12143,7 +12143,7 @@ export declare namespace appservice {
|
|
|
12143
12143
|
*/
|
|
12144
12144
|
managedPipelineMode?: string;
|
|
12145
12145
|
/**
|
|
12146
|
-
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, and `1.
|
|
12146
|
+
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, `1.2` and `1.3`. Defaults to `1.2`.
|
|
12147
12147
|
*/
|
|
12148
12148
|
minimumTlsVersion?: string;
|
|
12149
12149
|
/**
|
|
@@ -15034,7 +15034,7 @@ export declare namespace appservice {
|
|
|
15034
15034
|
*/
|
|
15035
15035
|
managedPipelineMode?: string;
|
|
15036
15036
|
/**
|
|
15037
|
-
* Configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, and `1.
|
|
15037
|
+
* Configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, `1.2` and `1.3`. Defaults to `1.2`.
|
|
15038
15038
|
*/
|
|
15039
15039
|
minimumTlsVersion?: string;
|
|
15040
15040
|
/**
|
|
@@ -17031,7 +17031,7 @@ export declare namespace appservice {
|
|
|
17031
17031
|
*/
|
|
17032
17032
|
managedPipelineMode?: string;
|
|
17033
17033
|
/**
|
|
17034
|
-
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, and `1.
|
|
17034
|
+
* The configures the minimum version of TLS required for SSL requests. Possible values include: `1.0`, `1.1`, `1.2` and `1.3`. Defaults to `1.2`.
|
|
17035
17035
|
*/
|
|
17036
17036
|
minimumTlsVersion?: string;
|
|
17037
17037
|
/**
|
|
@@ -25469,6 +25469,16 @@ export declare namespace compute {
|
|
|
25469
25469
|
*/
|
|
25470
25470
|
regularPercentageAboveBase?: number;
|
|
25471
25471
|
}
|
|
25472
|
+
interface OrchestratedVirtualMachineScaleSetSkuProfile {
|
|
25473
|
+
/**
|
|
25474
|
+
* Specifies the allocation strategy for the virtual machine scale set based on which the VMs will be allocated. Possible values are `LowestPrice` and `CapacityOptimized`.
|
|
25475
|
+
*/
|
|
25476
|
+
allocationStrategy: string;
|
|
25477
|
+
/**
|
|
25478
|
+
* Specifies the VM sizes for the virtual machine scale set.
|
|
25479
|
+
*/
|
|
25480
|
+
vmSizes: string[];
|
|
25481
|
+
}
|
|
25472
25482
|
interface OrchestratedVirtualMachineScaleSetSourceImageReference {
|
|
25473
25483
|
/**
|
|
25474
25484
|
* Specifies the offer of the image used to create the virtual machines. Changing this forces a new resource to be created.
|
|
@@ -30753,6 +30763,14 @@ export declare namespace containerservice {
|
|
|
30753
30763
|
* Detect similar node groups and balance the number of nodes between them. Defaults to `false`.
|
|
30754
30764
|
*/
|
|
30755
30765
|
balanceSimilarNodeGroups?: boolean;
|
|
30766
|
+
/**
|
|
30767
|
+
* Whether DaemonSet pods will be gracefully terminated from empty nodes. Defaults to `false`.
|
|
30768
|
+
*/
|
|
30769
|
+
daemonsetEvictionForEmptyNodesEnabled?: boolean;
|
|
30770
|
+
/**
|
|
30771
|
+
* Whether DaemonSet pods will be gracefully terminated from non-empty nodes. Defaults to `true`.
|
|
30772
|
+
*/
|
|
30773
|
+
daemonsetEvictionForOccupiedNodesEnabled?: boolean;
|
|
30756
30774
|
/**
|
|
30757
30775
|
* Maximum number of empty nodes that can be deleted at the same time. Defaults to `10`.
|
|
30758
30776
|
*/
|
|
@@ -30761,6 +30779,10 @@ export declare namespace containerservice {
|
|
|
30761
30779
|
* Expander to use. Possible values are `least-waste`, `priority`, `most-pods` and `random`. Defaults to `random`.
|
|
30762
30780
|
*/
|
|
30763
30781
|
expander?: string;
|
|
30782
|
+
/**
|
|
30783
|
+
* Whether DaemonSet pods will be ignored when calculating resource utilization for scale down. Defaults to `false`.
|
|
30784
|
+
*/
|
|
30785
|
+
ignoreDaemonsetsUtilizationEnabled?: boolean;
|
|
30764
30786
|
/**
|
|
30765
30787
|
* Maximum number of seconds the cluster autoscaler waits for pod termination when trying to scale down a node. Defaults to `600`.
|
|
30766
30788
|
*/
|
|
@@ -31696,6 +31718,10 @@ export declare namespace containerservice {
|
|
|
31696
31718
|
serviceCidrs: string[];
|
|
31697
31719
|
}
|
|
31698
31720
|
interface KubernetesClusterNetworkProfileLoadBalancerProfile {
|
|
31721
|
+
/**
|
|
31722
|
+
* The type of the managed inbound Load Balancer Backend Pool. Possible values are `NodeIP` and `NodeIPConfiguration`. Defaults to `NodeIPConfiguration`. See [the documentation](https://learn.microsoft.com/en-us/azure/aks/load-balancer-standard#change-the-inbound-pool-type) for more information.
|
|
31723
|
+
*/
|
|
31724
|
+
backendPoolType?: string;
|
|
31699
31725
|
/**
|
|
31700
31726
|
* The outcome (resource IDs) of the specified arguments.
|
|
31701
31727
|
*/
|
|
@@ -50584,11 +50610,13 @@ export declare namespace network {
|
|
|
50584
50610
|
*/
|
|
50585
50611
|
id: string;
|
|
50586
50612
|
/**
|
|
50587
|
-
* The Secret ID of (base-64 encoded unencrypted pfx)
|
|
50613
|
+
* The Secret ID of the (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for Key Vault to use this feature. Required if `data` is not set.
|
|
50614
|
+
*
|
|
50615
|
+
* > **NOTE:** To implement certificate rotation, `versionlessSecretId` should be used, although `secretId` is also supported.
|
|
50588
50616
|
*
|
|
50589
50617
|
* > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
|
|
50590
50618
|
*
|
|
50591
|
-
* > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
|
|
50619
|
+
* > **NOTE:** For TLS termination with Key Vault certificates to work properly, an existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
|
|
50592
50620
|
*/
|
|
50593
50621
|
keyVaultSecretId?: string;
|
|
50594
50622
|
/**
|
|
@@ -50688,11 +50716,13 @@ export declare namespace network {
|
|
|
50688
50716
|
*/
|
|
50689
50717
|
id: string;
|
|
50690
50718
|
/**
|
|
50691
|
-
* The Secret ID of (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
|
|
50719
|
+
* The Secret ID of the (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
|
|
50720
|
+
*
|
|
50721
|
+
* > **NOTE:** To implement certificate rotation, `versionlessSecretId` should be used, although `secretId` is also supported.
|
|
50692
50722
|
*
|
|
50693
50723
|
* > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
|
|
50694
50724
|
*
|
|
50695
|
-
* > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
|
|
50725
|
+
* > **NOTE:** For TLS termination with Key Vault certificates to work properly, an existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
|
|
50696
50726
|
*/
|
|
50697
50727
|
keyVaultSecretId?: string;
|
|
50698
50728
|
/**
|
|
@@ -60420,6 +60450,20 @@ export declare namespace stack {
|
|
|
60420
60450
|
*/
|
|
60421
60451
|
nextHopIpAddress: string;
|
|
60422
60452
|
}
|
|
60453
|
+
interface HciMarketplaceGalleryImageIdentifier {
|
|
60454
|
+
/**
|
|
60455
|
+
* The offer of the Azure Stack HCI Marketplace Gallery Image. Changing this forces a new Azure Stack HCI Marketplace Gallery Image to be created.
|
|
60456
|
+
*/
|
|
60457
|
+
offer: string;
|
|
60458
|
+
/**
|
|
60459
|
+
* The publisher of the Azure Stack HCI Marketplace Gallery Image. Changing this forces a new Azure Stack HCI Marketplace Gallery Image to be created.
|
|
60460
|
+
*/
|
|
60461
|
+
publisher: string;
|
|
60462
|
+
/**
|
|
60463
|
+
* The sku of the Azure Stack HCI Marketplace Gallery Image. Changing this forces a new Azure Stack HCI Marketplace Gallery Image to be created.
|
|
60464
|
+
*/
|
|
60465
|
+
sku: string;
|
|
60466
|
+
}
|
|
60423
60467
|
}
|
|
60424
60468
|
export declare namespace storage {
|
|
60425
60469
|
interface AccountAzureFilesAuthentication {
|
|
@@ -62310,7 +62354,7 @@ export declare namespace waf {
|
|
|
62310
62354
|
*/
|
|
62311
62355
|
operator: string;
|
|
62312
62356
|
/**
|
|
62313
|
-
* A list of transformations to do before the match is attempted. Possible values are `HtmlEntityDecode`, `Lowercase`, `RemoveNulls`, `Trim`, `UrlDecode` and `UrlEncode`.
|
|
62357
|
+
* A list of transformations to do before the match is attempted. Possible values are `HtmlEntityDecode`, `Lowercase`, `RemoveNulls`, `Trim`, `Uppercase`, `UrlDecode` and `UrlEncode`.
|
|
62314
62358
|
*/
|
|
62315
62359
|
transforms?: string[];
|
|
62316
62360
|
}
|
|
@@ -62420,6 +62464,10 @@ export declare namespace waf {
|
|
|
62420
62464
|
* Describes if the policy is in enabled state or disabled state. Defaults to `true`.
|
|
62421
62465
|
*/
|
|
62422
62466
|
enabled?: boolean;
|
|
62467
|
+
/**
|
|
62468
|
+
* Whether the firewall should block a request with upload size greater then `fileUploadLimitInMb`.
|
|
62469
|
+
*/
|
|
62470
|
+
fileUploadEnforcement: boolean;
|
|
62423
62471
|
/**
|
|
62424
62472
|
* The File Upload Limit in MB. Accepted values are in the range `1` to `4000`. Defaults to `100`.
|
|
62425
62473
|
*/
|